Does managing your tech feel like a fight for survival?
Information Privacy
Your control of personally identifiable information (PII) to ensure it is collected, stored, used and shared appropriately.
Security Organization
How you ensure the confidentiality, availability and integrity of IT assets and protect them from cyber attacks.
Information Security
How you prevent unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
Current Loss Information
Your environment’s resiliency. Can it sustain device failures, cyber attacks or protect itself from lost or stolen hardware?
Email Security
The procedures and techniques protecting your email accounts, content and communication against unauthorized access, loss or compromise.
Internal Security
What technology and best practices you are leveraging to protect your environment, such as multi factor authentication and endpoint protection.
Be prepared to talk to potential cyber insurance providers with confidence. Feel secure that you are providing your cyber insurance provider with accurate information. This questionnaire is simple and easy to follow — even if you aren’t a cyber security expert.
Provide the to Potential Cyber Security Insurance Providers With This Questionnaire
It’s free. Download now.