We are now offering two exciting new lines of insurance: Health Insurance and Watercraft Insurance!

Hometest form

test form

1
2
3
4
5
6
7
8
Last Page

Cyber Insurance Form

Company Name *
Type of Business *
Zip Code *
State *
City *
Address *
Contact Person *
Email *
Phone
Website *
Date Business Established  *
Total number of employees  *
Description of Operations  *
1
2
3
4
5
6
7
8
Last Page

Revenues

Current Fiscal Year ending (Projected)  *
Last Fiscal Year ending  *
Two Fiscal Years ago ending  *
1
2
3
4
5
6
7
8
Last Page

Records

Do you collect, store, host, process, control, use or share any private or sensitive information* in either paper or electronic form?  *
*Private or sensitive information includes any information or data that can be used to uniquely identify a person, including, but not limited to, social security numbers or other government identification numbers, payment card information, drivers’ license numbers, financial account numbers, personal identification numbers (PINs), usernames, passwords, healthcare records and email addresses.

Provide the approximate number of unique records:

Paper records
Electronic records
Do you collect, store, host, process, control, use or share any biometric information or data, such as fingerprints, voiceprints, facial, hand, iris or retinal scans, DNA, or any other biological, physical or behavioral characteristics that can be used to uniquely identify a person? *
Have you reviewed your policies relating to the collection, storage and destruction of such information or data with a qualified attorney and confirmed compliance with applicable federal, state, local and foreign laws? *
Do you process, store, or handle credit card transactions? *
Are you PCI-DSS Compliant?
1
2
3
4
5
6
7
8
Last Page

IT Department

Within the Applicant’s organization, who is responsible for network security?

Name *
Title *
Phone *
Email *
IT Security Designation(s)  *
The Applicant’s network security is *
Provide the name of your network security provider *
Are you the main contact for the network security provider named
Provide the name and email address for the main contact
How many IT personnel are on your team? *
How many dedicated IT security personnel are on your team? *
1
2
3
4
5
6
7
8
Last Page

Information and network security controls

Do you use a cloud provider to store data or host applications? *
Provide the name of the cloud(s) provider(s): *
Do you use Multi-Factor Authentication (MFA) to secure all cloud provider services that you utilize (e.g. Amazon Web Services (AWS), Microsoft Azure, Google Cloud)?  *
Do you encrypt all sensitive and confidential information stored on your organization’s systems and networks? *
Access control with role-based assignments?
Segregation of servers that store sensitive information?
1
2
3
4
5
6
7
8
Last Page

Ransomware controls

Do you pre-screen emails for potentially malicious attachments and links? *
Provide the name of your email security provider
Do you have the capability to automatically detonate and evaluate attachments in a sandbox to determine if they are malicious prior to delivery to the end-user?
Can your users access email through a web application or a non-corporate device? *
Do you enforce MFA?
Do you allow remote access to your network? *
Do you use MFA to secure all remote access to your network, including any remote desktop protocol (RDP) connections? *
Select your MFA provider
Provide the name of your MFA provider
Select your MFA type
Describe your MFA type
Does your MFA configuration ensure that the compromise of a single device will only compromise a single authenticator?
Do you use a next-generation antivirus (NGAV) product to protect all endpoints across your enterprise? *
Select your NGAV provider
Provide the name of your NGAV provider
Do you use an endpoint detection and response (EDR) tool that includes centralized monitoring and logging of all endpoint activity across your enterprise? *
Do you enforce application whitelisting/blacklisting?
Select your EDR provider
Provide the name of your NGAV provider
Is EDR deployed on 100% of endpoints?
Can users access the network with their own device (“Bring Your Own Device”)?
Is EDR required to be installed on these devices?
Do you use MFA to protect all local and remote access to privileged user accounts? *
Select your MFA type
Describe your MFA type
Do you use a data backup solution? *
Which best describes your data backup solution?
Describe your data backup solution
Check all that apply
How frequently are backups run?
Estimated amount of time it will take to restore essential functions using backups in the event of a widespread malware or ransomware attack within your network?
1
2
3
4
5
6
7
8
Last Page

Phising controls

Do any of the following employees at your company complete social engineering training:

Employees with financial or accounting responsibilities? *
Employees without financial or accounting responsibilities? *
Does your social engineering training include phishing simulation?
Does your organization send and/or receive wire transfers? *

Does your wire transfer authorization process include the following:

A wire request documentation form?
A separation of authority protocol?
A protocol for obtaining proper written authorization for wire transfers?
A protocol for confirming all payment or funds transfer instructions/requests from a new vendor, client or customer via direct call to that vendor, client or customer using only the telephone number provided by the vendor, client or customer before the payment or funds transfer instruction/request was received?
A protocol for confirming any vendor, client or customer account information change requests (including requests to change bank account numbers, contact information or mailing addresses) via direct call to that vendor, client or customer using only the telephone number provided by the vendor, client or customer before the change request was received?
1
2
3
4
5
6
7
8
Last Page

Loss History

In the past 3 years, has the Applicant or any other person or organization proposed for this insurance:

Received any complaints or written demands or been a subject in litigation involving matters of privacy injury, breach of private information, network security, defamation, content infringement, identity theft, denial of service attacks, computer virus infections, theft of information, damage to third party networks or the ability of third parties to rely on the Applicant’s network? *
Been the subject of any government action, investigation or other proceedings regarding any alleged violation of privacy law or regulation? *
Notified customers, clients or any third party of any security breach or privacy breach? *
Received any cyber extortion demand or threat? *
Sustained any unscheduled network outage or interruption for any reason? *
Sustained any property damage or business interruption losses as a result of a cyber-attack? *
Sustained any losses due to wire transfer fraud, telecommunications fraud or phishing fraud? *
Do you or any other person or organization proposed for this insurance have knowledge of any security breach, privacy breach, privacy-related event or incident or allegations of breach of privacy that may give rise to a claim? *
In the past 3 years, has any service provider with access to the Applicant’s network or computer system(s) sustained an unscheduled network outage or interruption lasting longer than 4 hours? *
Did the Applicant experience an interruption in business as a result of such outage or interruption?