Far broader than the name cyber would imply, our policy
extends to cover numerous incidents including but not
limited to:
• Cyber extortion and malware (viruses, ransomware, or
publishing of stolen data).
• Denial of service (disruption to operations).
• Downstream attack (a compromise of your environment
resulting in damages to others).
•Hacking.
• Insider and privilege misuse (unauthorised access and use
of systems and data by employees and service providers).
• Physical theft and loss (both devices and physical hard
copy data).
• Threats posed by third party access into a client
environment.