Cyber

Get up to speed with simple breakdowns of key cyber insurance topics.

Filter Clear all

Cyber 25 Sept, 2024

Cyber buzzwords glossary

The world of cyber is an evolving landscape of buzzwords and abbreviations that even the experts struggle to keep up with. At CFC we keep cyber sim...

Article

Cyber 24 Aug, 2024

Staying safe online in 2024

With the growing volume and sophistication of online threats like viruses, ransomware, and phishing scams, it’s important to know the proper practi...

Infographic

Cyber 6 Aug, 2024

Cyber tips: Backup policies

Questions about a businesses network backups are common. But what does a good backup policy include and why it can make or break a businesses capab...

Article

Cyber 4 Aug, 2024

Cyber tips: Passwords and passphrases

Choosing strong passwords is quintessential cyber security. But there are some tweaks you can make to increase your password strength and keep your...

Article

Cyber 2 Aug, 2024

Cyber Tips: Multi-factor authentication

Multi-factor authentication (MFA) is a login verification tool to make sure a user is who they say they are. We'll explain why MFA is vital for bus...

Article

Cyber 25 Jul, 2024

Proactive cyber insurance can save SMEs thousands in outsourced security costs

CFC analysis demonstrates value of proactive cyber protection insurance policies.

News
laptop with little men around it

Cyber 19 Jul, 2024

Protecting your passwords from hackers

While some cyberattacks are intricate and sophisticated, the vast majority start with criminals taking advantage of a relatively small vulnerabilit...

Infographic
Jason Hart headshot on orange background

Cyber 16 Jul, 2024

Meet the expert: Jason Hart, Head of Proactive Insurance

What is proactive cyber insurance? Why would a visionary in the world of cyber security move to insurance? How will the role of head of proactive i...

Article

Cyber 21 May, 2024

Cyber claims case study: Two policies for the price of one

What happens if you suffer multiple cyber attacks within the same policy period? With CFC's unlimited reinstatements, you'll be covered for them all.

Case study
Cybersecurity measures

Cyber 29 Apr, 2024

6 things cyber underwriters love

Businesses often ask what types of cyber security measures they should adopt. Here’s what our underwriters and security team love to see in potenti...

Infographic

Cyber 14 Mar, 2024

Claims expert: 3 ways to make your cyber claims go smoothly

As a broker, what can you do to help the cyber claims process be as smooth as can be? In part two of our claims expert series, discover three top t...

Article

Cyber 4 Dec, 2023

Claims expert: 4 things to avoid if you suffer a cyber incident

What’s the key to a smooth claims process when you suffer a cyber incident? We spoke to Ashley Burdon, Cyber Claims Manager, CFC, to get answers. H...

Article

Cyber 23 Aug, 2023

Insurance Business: Cyber insurance – the "emergency service" for victims of cyberattacks

Mia Wallace, of Insurance Business, sat down with James Burns, head of cyber strategy at CFC, to discuss the need for greater education on the impl...

Article

Cyber 16 Aug, 2023

Insurance Business: CFC's James Burns on the function of proactive cyber solutions

Mia Wallace of Insurance Business sat down with James Burns, head of cyber strategy at CFC for a deep-dive into the power of proactive cyber soluti...

Article

Cyber 9 Aug, 2023

Insurance Business: Beyond the headlines – CFC on the top cyber threats impacting businesses

Mia Wallace, of Insurance Business, sat down with Tom Bennett, cyber threat analysis team leader at CFC to discuss the cyber threats impacting UK b...

Article

Cyber 3 Apr, 2023

Cyber policy encryption

From April 3, 2023, all new and renewing cyber insurance policies will be encrypted. Here's what you need to know.

Article

Cyber 25 Jan, 2023

Turning risk management to attack prevention

Proactive prevention is key and CFC Response – our cyber security and incident response team – have proven this preventive capability through the c...

Article

Cyber 18 Jan, 2023

Vulnerable VPN

Hackers access a bank's system through a vulnerable VPN, holding data for ransom

Case study