Advantages
With a change in cyber product, we know your clients will want to know the benefits this powerful product provides. Here are just a few advantages of the standalone product:
Your clients serve in community-focused industries and are at significant risk of experiencing a cyber-attack due to the personal and confidential information they store. We're proud to introduce a standalone, non-admitted cyber product to our new and renewal clients designed to meet the growing threat posed by cyber-attacks in today's world.
This product is provided by an A.M. Best A-Rated carrier and is the first product presented by Glatfelter's new wholesale unit, Glatfelter Brokerage Services (GBS). This product will be available to our current clients, as well as prospective clients who fit our programs' appetite. It is also available for other risk classes that Glatfelter distribution partners control or are prospecting, enabling these brokers to round out accounts and have access to additional quality products and tools, promoting new growth.
With a change in cyber product, we know your clients will want to know the benefits this powerful product provides. Here are just a few advantages of the standalone product:
Eligible insureds receive access to critical Cyber Loss Control Services tools, including:
Is your client renewing their Glatfelter package policy that had existing cyber coverage and wanting to obtain a standard coverage quote for cyber insurance? Please complete our brief questionnaire.
Get the QuestionnaireDoes your client not currently have cyber coverage with Glatfelter and want to purchase a new policy with the standalone product? Please complete our full application.
Get the ApplicationAs Glatfelter transitions to a more robust, standalone cyber product, we know that clients will have questions—and we're here to provide you with the information you need to have effective conversations. To best support you, we compiled a list of client FAQs. Please reach out with any additional questions using the contact information below.
Here are two sample scenarios to showcase how a robust cyber product could better protect your clients from today's cybercriminals.
A client’s hospital was notified of a potential HIPAA (Health Insurance Portability and Accountability Act) breach involving the Protected Health Information (PHI) of over 40,000 of their patients. The insurance company acted quickly, contacting the client and retaining breach counsel and a forensic investigator. Based on the findings of this investigation, the insurance company coordinated with the hospital and breach counsel to select specific vendors to help with notifying regulators and patients, and to offer patients access to identity monitoring protection. They established a call center to handle inquiries and registration for this protection both quickly and efficiently. The insurance company reimbursed the hospital $450,000 for Credit Monitoring and ID Theft Insurance, $175,000 in notification and call center costs, $25,000 in forensic costs and $90,000 in legal costs. The policy also covered $500,000 in regulatory fines that the hospital incurred.
A physician’s practice that generated $2,500,000 in revenue was subject to a ransomware attack where a vulnerability in their VPN (Virtual Private Network), which had not yet been patched, was exploited. The attackers were able to access and remove PII (Personal Identifiable Information) and PHI data - approximately 30,000 records in total - before deploying encryption malware across their virtual environment. The cybercriminals initially demanded a ransom of $250,000 in bitcoin for the decryption key in order to prevent a public release of the stolen data. The ransom was negotiated down to $210,000 – which the physician’s office agreed to pay - and they were reimbursed from their insurance coverage. The insurance policy also responded to $75,000 in breach counsel and legal expenses and $90,000 to cover the cost of hiring a forensic investigator to assess the threat and ensure the malware was fully removed.
Cybercrime claims costs are rapidly growing as tactics become more sophisticated. Take a look at these examples of just how costly they can be.
Important Information: The sample costs illustrated above are derived from NetDiligence® Data Breach Cost Calculator estimates and are provided for educational and illustration purposes only. Actual expenses and liability exposures due to identity theft or data breach incident may vary based on variables not considered in this calculator. Numerical results presented in the Data Breach Cost Calculator are based on a proprietary formula developed by NetDiligence and its insurance industry partners. This formula takes into account information available in the public domain and information obtained through various websites that track breach statistics. Please note: This calculator is not intended to predict insurable perils or related costs and has no bearing on any insurance policy. This calculator is not intended to itemize insurable or insured items of loss, nor is it intended to be relied upon for any insurance purchasing decisions including but not limited to any decision on the scope of cover required or the amount of indemnity required under any insurance.