Not yet trading admitted with CFC? Find out more about our market-leading admitted products
Sign up for the latest cyber news, tools and resources, straight to your inbox every month!
Explore the latest on Cyber, Emerging risks and Specialist insurance.
See how our cyber product, Cyber Proactive Response, comes to life in these different scenarios and helps to keep businesses one step ahead of cybe...
When a zero-day vulnerability surfaced in a widely used security vendor’s software, our proactive cyber attack prevention services stepped in. This...
CFC cyber policies come with an additional limit, solely for incident response costs. The two towers of cover, along with offering initial incident...
One word can be the difference in comprehensive cyber cover and a policy that falls short. In this case having a 'data recreation' rather than just...
What happens if you suffer multiple cyber attacks within the same policy period? With CFC's unlimited reinstatements, you'll be covered for them all.
Hackers access a bank's system through a vulnerable VPN, holding data for ransom
In this case study, we look at a hospital that very nearly fell victim to a ransomware attack called ‘Cobalt Strike.’
A machinery manufacturer nearly falls victim to malicious software
When a law firm employee fails to recognise a malicious attachment, it prompts a full-blown ransomware attack
When an auto parts dealer gets hit by a ransomware attack, it comes close to wrecking their business
When an employee at a recruitment firm falls for a phishing scam, a significant payment is misdirected
When malicious code impairs a hotel's website, it takes longer than expected to get back on track
After a CEO's email account is hacked, a care home faces huge financial loss from social engineering
A city government falls victim to a fraudster on the watch for sizeable wire transfers
Hackers access a school's systems through remote desktop protocol and hold data to ransom
A haulage firm loses several large tax payments after their accountant's email is spoofed
A charity's payment to a research partner is sent to a fraudulent account after an email account is compromised
An HR service provider loses contracts due to a cyber attack suffered by one of its supply chain partners.