Why home cyber protection? Because we’ve all experienced it. An email arrives from a company you seem to know and trust but has an attached file from an unknown email address. Your gut tells you something may be wrong— and it’s right.
Phishing emails like this are just one of many ways cybercriminals attempt to gain access to vital personal and financial information. Fortunately, you can lower the risk of cyber theft with these quick tips. Keep them handy for the next time you receive an unknown email:
Don’t Click It – Weird email, strange website, or odd text message? Never click an attachment or link unless you are absolutely sure where it came from.
Beef Up Your Password – Simple passwords are like an unlocked door to cyber criminals. Make yours more complex than just your pet’s name. HINT: A sentence can be a password!
Cyber Insurance – Some insurance companies have added cyber coverage as an add-on to their homeowners’ policies.
A few simple practices can limit the chances of a cyber-attack. And finally, stay smart and consider adding home cyber protection coverage.
What coverage can you add?
Cyberattack
• Data Recovery Costs: Cost of professional firm hired to replace electronic data that has been lost or corrupted.
• System Restoration Costs: Pays for professional firm to restore the computing or connected home device to its level of functionality before the cyber attack. This includes the replacement or reinstallation of software programs removal of malicious code and the configuration of the device or system.
Cyber Extortion
• Professional assistance from a subject matter expert for advice and consultation on how to best respond to a threat.
• Cyber Extortion Response Costs: Payment as directed to the extortion threat, when payment is approved in advance and
incurred as the direct result of a cyber extortion event.
Fraud
• The direct financial loss to an insured as the result of a fraud event including, but not limited to, identity theft, unauthorized use of a card, card number, or account number in an insured’s name, or forgery of a check.
Data Breach
• Forensic IT Review: Covers a professional information technologist to review the nature and extent of the breach event, the number and identities of the affected individuals.
• Legal Review: Provides professional legal counsel to review and develop a response for the personal data compromise.
• Notification to Affected Individual: Necessary and reasonable costs to provide notification of the personal data compromise to affected individuals.
• Service to Affected Individual: Cost to provide informational materials and telephone helpline to affected individuals. Credit report and monitoring and identity restoration case management services provided for breaches involving personally identifying information.
Source: agencyrevolution.com, auto-owners.com






