<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Liability: Archives - Perrymans</title>
	<atom:link href="https://perrymans.com/category/cyber-liability/feed/" rel="self" type="application/rss+xml" />
	<link>https://perrymans.com/category/cyber-liability/</link>
	<description></description>
	<lastBuildDate>Thu, 14 Dec 2017 03:23:20 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Social Engineering Losses and Insurance</title>
		<link>https://perrymans.com/social-engineering-losses-insurance/</link>
					<comments>https://perrymans.com/social-engineering-losses-insurance/#respond</comments>
		
		<dc:creator><![CDATA[CSV]]></dc:creator>
		<pubDate>Mon, 18 Sep 2017 01:35:22 +0000</pubDate>
				<category><![CDATA[Cyber Liability:]]></category>
		<category><![CDATA[fraudulent activity]]></category>
		<category><![CDATA[Social engineering losses]]></category>
		<guid isPermaLink="false">http://www.perrymans.com/?p=1136</guid>

					<description><![CDATA[<p>The Problem The latest cyber risk causing significant losses to businesses is social engineering. A social engineering loss is one whereby a party, through the use of deception, manipulates another party into divulging confidential or personal information that may be used for fraudulent purposes. An example of this is where a company employee is tricked &#8230; <a href="https://perrymans.com/social-engineering-losses-insurance/" class="more-link">Continue reading<span class="screen-reader-text"> "Social Engineering Losses and Insurance"</span></a></p>
<p>The post <a href="https://perrymans.com/social-engineering-losses-insurance/">Social Engineering Losses and Insurance</a> appeared first on <a href="https://perrymans.com">Perrymans</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The Problem</h2>
<p>The latest cyber risk causing significant losses to businesses is social engineering.</p>
<p>A social engineering loss is one whereby a party, through the use of deception, manipulates another party into divulging confidential or personal information that may be used for fraudulent purposes.</p>
<p>An example of this is where a company employee is tricked into transferring funds into a fraudster’s account, under direction from what is assumed to be a vendor, client or one of the company’s supervisors. The fraudster will usually send an email claiming to be one of the above-listed people and will then ask the email’s recipient to change banking details where company funds are currently being transferred.</p>
<p>On the surface, these types of fraudulent emails appear to be authentic, with all of the correct company information and logos being displayed. Only careful inspection of the email and the account details listed within the communication will reveal the scam. However, unsuspecting and trusting employees have already unwittingly cost their companies millions of dollars by actioning the instructions of these emails.</p>
<h2>Don’t Assume it is Covered by Your Insurance</h2>
<p>Contrary to what a lot of business owners think, losses incurred through this particular type of scam aren’t always covered under traditional insurance policies including cyber and crime policies.</p>
<p>There have been a number of cases where Insurers have rejected claims made by businesses that have fallen victim to this particular type of social engineering because the loss did not result from “direct fraud”.</p>
<p>As a general rule, insurance policies providing cover for fraudulent behaviour only apply if a fraudster directly penetrates the company’s systems and illegally accesses the businesses money without consent. However given a social engineering loss occurs with knowledge and consent, albeit via fraudulent methods, insurance policies may contain exclusions in relation to such voluntary parting of funds or property.</p>
<p>Alternatively, they may contain outright social engineering exclusions.</p>
<p>We, therefore, recommend that insureds assume there is no cover unless specifically specified and that you <strong>contact Perrymans on 08 8362 7127</strong> to discuss how to protect yourself or your company from this risk.</p>
<p>The post <a href="https://perrymans.com/social-engineering-losses-insurance/">Social Engineering Losses and Insurance</a> appeared first on <a href="https://perrymans.com">Perrymans</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://perrymans.com/social-engineering-losses-insurance/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyber Liability:  What if you couldn’t access your data tomorrow?</title>
		<link>https://perrymans.com/cyber-liability-couldnt-access-data-tomorrow/</link>
					<comments>https://perrymans.com/cyber-liability-couldnt-access-data-tomorrow/#respond</comments>
		
		<dc:creator><![CDATA[CSV]]></dc:creator>
		<pubDate>Thu, 15 Jun 2017 07:19:25 +0000</pubDate>
				<category><![CDATA[Cyber Liability:]]></category>
		<category><![CDATA[Cyber Liability]]></category>
		<guid isPermaLink="false">http://www.perrymans.com/?p=941</guid>

					<description><![CDATA[<p>Australia continues to be a target of persistent and sophisticated cyber attacks and data breaches. Our dependence on technology such as mobile devices, online banking, computer networking and electronic filing makes an attractive target for serious and increasingly sophisticated cyber criminals. Data is increasingly being compromised through human/software errors, rogue employees and lost/stolen devices further …</p>
<p>The post <a href="https://perrymans.com/cyber-liability-couldnt-access-data-tomorrow/">Cyber Liability:  What if you couldn’t access your data tomorrow?</a> appeared first on <a href="https://perrymans.com">Perrymans</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Australia continues to be a target of persistent and sophisticated cyber attacks and data breaches. Our dependence on technology such as mobile devices, online banking, computer networking and electronic filing makes an attractive target for serious and increasingly sophisticated cyber criminals. Data is increasingly being compromised through human/software errors, rogue employees and lost/stolen devices further increasing your cyber risk.</p>
<p>No business is immune from of a data breach or cyber attack and the probability of your business being impacted is increasing dramatically. According to PWC’s 2016 Global Economic Crime Survey 65% of Australian businesses responded that they had experienced a cybercrime, having increased from 33% in 2014. The Australian Institute of criminology found that in 2015 the average cost in Australia of a cyber crime was $276,323. Such incidents are increasingly impacting the profitability, competitiveness and reputation of Australian businesses. According to a study by the U.S. National Cyber Security Alliance 60% of small companies are unable to sustain their businesses over 6 months after a cyber attack.</p>
<p>While it is imperative that you consult with your IT provider and implement appropriate security protocols, cyber liability insurance offers an additional layer of protection for your data. Cover extends to a broad range of network, privacy and multimedia related exposures and is an essential component of your business cyber risk management. Some of the key benefits of a Cyber Liability Policy include:</p>
<ul>
<li><b>Business Interruption Loss &#8211;</b> Coverage for income loss or loss of profits as a result of interruption to your computer system.</li>
<li><b>Data Recovery Expenses &#8211;</b> Coverage to recover and/or replace data that is damaged, altered, corrupted, distorted, stolen, misused or destroyed.</li>
<li><b>Privacy Regulatory Costs and Penalties &#8211;</b> Coverage for defence costs and fines/penalties (where insurable) as a result of a privacy/security breach or breach of privacy regulations.</li>
<li><b>Cyber Extortion</b> <b>&#8211;</b> Extortion monies and expenses as a result of an extortion threat.</li>
<li><b>Liability</b> &#8211; Coverage for third party claims arising from transmission of malware, alleged infringement of intellectual property, defamation, invasion of privacy, denial of service and privacy breaches.</li>
</ul>
<p>In this increasingly hostile environment the two main questions to ask yourself are ‘Could my business continue trading without its IT systems’ and ‘Can I afford to not have cyber insurance to protect my business’?</p>
<p>For more than 40 years Perrymans have been delivering insurance broking services to professionals, business and corporate sectors. Perrymans are specialist insurance brokers for cyber liability and continue to develop a range of innovative, cost effective insurance and risk management solutions that also address market, environmental and regulatory changes.</p>
<p><a href="http://www.perrymans.com/contact-us/">Contact Perrymans</a> about Cyber Liability insurance today.</p>
<p>The post <a href="https://perrymans.com/cyber-liability-couldnt-access-data-tomorrow/">Cyber Liability:  What if you couldn’t access your data tomorrow?</a> appeared first on <a href="https://perrymans.com">Perrymans</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://perrymans.com/cyber-liability-couldnt-access-data-tomorrow/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Object Caching 0/147 objects using APC
Page Caching using Disk: Enhanced 
Database Caching using APC

Served from: perrymans.com @ 2026-05-04 11:26:01 by W3 Total Cache
-->