Resources

Filter Clear all

Cyber 20 Nov, 2018

Gotcha! Three cyber policy traps to look out for

Cyber insurance is projected to experience major growth in the years ahead and new insurers are regularly entering the market. While this is creati...

Article

Cyber 16 Nov, 2018

Business interrupted: Part three (1)

Following on from our previous articles on indemnity periods and time retentions, we are concluding our business interruption series by looking at...

Article

Cyber 16 Nov, 2018

Business interrupted: Part three

Following on from our previous posts on indemnity periods and time retentions, we're concluding our business interruption series by looking at the...

Article

Cyber 12 Nov, 2018

Registration: Top cyber insurance myths debunked

Due to popular demand, we are re-running our webinar on debunking the top six cyber myths.

Webinar
Cyber claims case study - Malware mayhem

Cyber 6 Nov, 2018

Cyber claims case study: Malware mayhem

A technology software provider that fell victim to a targeted cyber extortion attack, in which their data and applications were encrypted and held...

Case study

Cyber 6 Nov, 2018

Business interrupted: Part two

Following on from the first installment of our cyber BI series which focused on the issue of indemnity periods, this time we will take a look at th...

Article

Cyber 19 Oct, 2018

Beware the data breach bear trap

Over the course of 2018, we have seen numerous pieces of data breach legislation come into force. However, while all this legislation is undoubtedl...

Article

Cyber 9 Oct, 2018

Cyber claims case study: Software shutdown

Cyber attack results in contractual complications for property management firm

Case study

Cyber 9 Oct, 2018

Business interrupted: Part one

Today, business interruption in cyber insurance policies is back in a big way. This blog series explores the many ways in which BI cover is essenti...

Article

Cyber 21 Sept, 2018

Funds Transfer Fraud - Old tricks, new tactics

Social engineering involves the use of deception to manipulate individuals into carrying out a particular act, such as transferring money, handing...

Article

Cyber 10 Sept, 2018

Cyber claims case study: Reputational repercussions

Online retailer grapples with data breach aftermath

Case study

Cyber 15 Aug, 2018

Webinar Registration: Backup Breakdown

Join us on Wednesday 29 August as we explore how an engineering firm lost access to all of its data – including technical drawings, prints and complex design specifications – as the result of a cyber incident in this deep dive of our cyber claims...

Webinar

Cyber 15 Aug, 2018

Webinar: Top Cyber Insurance Myths Debunked

Today, Lindsey Nelson, International Cyber Team Leader at CFC, held a webinar on debunking the top six cyber myths.

Webinar

Cyber 13 Aug, 2018

Cyber insurance myths debunked - client edition

Cyber is one of the hottest topics in insurance and, as a line of business, it’s projected to experience phenomenal growth in the years ahead.

Article

Cyber 6 Aug, 2018

Cyber claims case study: Quick fix complication

Healthcare provider avoids large-scale notification

Case study

Cyber 1 Aug, 2018

Webinar: Beyond the Breach

Yesterday James Burns, Cyber Product Leader at CFC, held a webinar focusing on one of our cyber claims case studies.

Webinar

Financial institutions 6 Jul, 2018

Is this the perfect modern-age insurance model?

In the heart of London’s historic insurance district and nestled in the shade of the iconic Lloyd’s building lies the office of CFC Underwriting – a bright and busy space home to more than 200 staff selling commercial insurance products to thousan...

Article

Cyber 2 Jul, 2018

Cyber claims case study: Beyond the breach

Small hospital faces huge operational disruption

Case study