Working with Australian businesses of all sizes, Emergence equips brokers with the tools and technology to protect their clients with ease and efficiency.
The local experts
in global cyber
- Summary of Key Changes from CEP003 to CEP003.1
- Summary of Key Changes from CEP002 to CEP003
- No Claims Declaration
- Cyber Event Protection Policy CEP003.1 – pre 6 April 2020
- Cyber Event Protection Policy CEP003 – pre 6 May 2019
- Cyber Event Protection Policy CEP002 – pre 20 Aug 2018
- Cyber Event Protection Policy CEP001 – pre 1 April 2017
- Cyber 1st Aid Policy 001 – pre 20 Aug 2018
Extortion AttemptClaim scenario
A malicious actor pretending to be tech support gained access to a manufacturing plant’s computer systems. This enabled them to pose as an insider, eventually gaining access to highly restricted information including customer trade secrets, bank details and other sensitive personal information. The hacker threatened to sell trade secrets to competitors and banking details on the black market, and make sensitive personal information public – unless the insured paid.Cyber event protection solution
Cyber Event Protection covers key response costs including: IT forensics, crisis management and public relations, notification costs, credit and identity monitoring and pursuit costs against the perpetrator. It also covers mandatory data breach notifications, including notice to regulators because of the manufacturer’s failure to keep information secure. Defence and settlement costs for third party claims made against the insured are also covered.
Cryptolocker AttackClaim scenario
An employee clicked on a plausible email attachment which unleashes a CryptoLocker virus. This prevented the nursing home from operating their systems.Cyber event protection solution
Cyber Event Protections provides coverage for IT forensic technicians to remove the virus, restore the data and secure the IT systems. Resulting loss to the business from decreased revenue or increased costs is also covered.
A retail clothing store operated an E-commerce website which became infected with malicious code. As a result the website showed black screens to customers and staff were unable to access orders in the system.Cyber event protection solution
The policy covers removal of the malware and restoration of the website. Lost revenue and extra operating expense caused by the attack are also covered.
Tangible PropertyClaim scenario
A property manager’s servers suffers heat damage during a cyber attack and was no longer suitable for commercial service.Cyber event protection solution
Optional Tangible Property coverage covers the cost of repair or replacement of the damaged equipment.
Contingent Business InterruptionClaim scenario
An external supplier of a bedding manufacturer suffered a CryptoWall malware attack. Their ‘Just In Time’ manufacturing plant grinds to a halt for three weeks while engineers and IT experts scramble to restore systems and production. As a result of the supplier’s cyber event, the insured could not source critical components and manufacturing operations were interrupted.Cyber event protection solution
If Contingent Business Interruption cover is applicable, we would pay the bedding manufacturer’s impact on business costs arising from an outage at the external suppliers’ business.
Socially Engineered Theft 1st Party LossClaim scenario
An accountant’s employee receives a request from a regular supplier’s email address for payment of an outstanding invoice. The employee pays the supplier in good faith and in reliance upon the received invoice.
As it turns out, the supplier’s invoicing system was hacked and the supplier’s bank account details were changed to the hacker’s account. The paid amount is unrecoverable as a result.Cyber event protection solution
If the accountant’s policy includes Optional Cover for Criminal Financial Loss including Socially Engineered Theft, the direct financial loss to the accountant is covered, including investigation costs.
Socially Engineered Theft 3rd Party LossClaim scenario
A real estate agent holds third party money in trust. The agent receives instructions from a lookalike email address to transfer money to the third party’s bank account. The email is fraudulent. The agent transfers the money and, as a result, the third party funds are lost irrecoverably.Cyber event protection solution
If Criminal Financial Loss coverage including Socially Engineered Theft is applicable, the lost third party funds are covered. Investigation costs are also covered.
Socially Engineered Theft 1st Party LossClaim scenario
A medical centre received communications from a fraudster impersonating the ATO requiring urgent payment of outstanding taxes.
The medical centre paid the ‘outstanding’ taxes in good faith having believed the demand was genuine.Cyber event protection solution
If Criminal Financial Loss coverage including Socially Engineered Theft is applicable, the lost funds are covered including investigation costs.
Cyber Theft Business Email CompromiseClaim scenario
The CFO received a fraudulent email from the CEO, whose e-mail account has been compromised due to a Cyber Event, requesting the transfer of a large sum of money. The email convinced the CFO to transfer money to a third party bank account. Later its determined that the email was not authored by the CEO, but it’s too late for the bank to stop the transfer.Cyber event protection solution
Cyber Event Protection will cover forensic investiga-tion of the crime as well as response costs to remove the threat and secure the e-mail system.
If Cyber Theft coverage is applicable, the direct financial loss the insured suffered will be covered as well.
Telephone PhreakingClaim scenario
A marketing firm’s phone system gets hacked. The hacker creates a mailbox to route calls overseas. The unauthorised international calls result in thousands of dollars in call charges.Cyber event protection solution
The policy covers the cost to investigate and remove the threat to firm’s telephone system. Our optional Cyber Theft and Telephone Phreaking Cover pays the direct financial loss to the insured.
The insured notices their computers are running slower than usual. Upon further investigation, someone has hacked into their IT infrastructure to utilise the processing power to mine cryptocurrency.Cyber event protection solution
Cyber Event Protection will cover response costs to remove the virus.
If Criminal Financial Loss coverage is applicable, the increased bandwidth and electricity costs are also covered.
Be at your best - protect your clients with Emergence today.
Providing specialist risk protection and smart risk prevention from a dedicated team of experts.
Discover what drives Emergence and our team of experts – making a difference to you and your clients, every day. Get to know the team, our values and the award-winning approach we take to protecting you clients business online.