Cyber Insurance with Placement Services
In today's digital age, cyber threats are evolving rapidly. At Placement Services, we understand the importance of safeguarding your digital assets and provide tailored solutions to mitigate cyber risks.
Choosing the right cyber insurance can be the difference between a minor disruption and a major catastrophe for your business. With our expertise and extensive network, we ensure that your digital vulnerabilities are adequately covered, offering comprehensive protection at competitive rates.
Target Business
- Professionals (special rates apply to SME professionals less than $1,250,000 revenue)
- Abattoirs
- Healthcare (special rates apply to SME healthcare less than $2,000,000 revenue)
- Retail and Hospitality
- Miscellaneous business
Referral List
- SME technology businesses
- Media trades
- Revenue over $50,000,000
- Data records over 250,000
- Claims over $10,000 within the past 3 years
- Any operations outside Australia
Decline List
- Software Development
- IT security and Application development
- Debt Collectors and Payday Loans
- Stock Currency Exchange
- Gaming
- Crypto
- NFT's
- Clinical Trials
- Drug Manufacturers
- Airlines
- Background and Credit Screening
- Medical Devices
- Dating Services
- Gambling/Betting
Start Cyber Insurance Quote
- You encrypt sensitive information stored on portable media devices or laptops.
- You have access control procedures around critical data stored on your network.
- You have (either) encryption of hard drives and/or databases containing critical data.
- You have Multi Factor Authentication (with a randomly generated token) enabled for remote access including for Microsoft Office 365 (if used).
- You conduct phishing exercises/training with your employees annually.
- At least two members of staff review and authorise any transfers of funds, signing of cheques or for the issuance of instructions for the disbursement of assets, funds or investments above AUD $10,000.
- You verify all requests to change customer/vendor/supplier details by confirming via a direct call, using the existing contact information previously provided and on file from the entity requesting the change.
- If online banking software or systems are used to perform wire or banking transfer functions, you use multi-factor authentication in order to gain access to the banking portal and also for any transfers.
- Your back-ups are done on a weekly basis, stored off-site and segregated from your corporate environment.
- You have firewalls and anti-virus in-place and they are updated in line with software recommendations.
- You or your IT outsourced service provider have a patch management policy in place to implement critical patches within 30 days of their release.
- You encrypt sensitive information stored on portable media devices or laptops.
- You have access control procedures around critical data stored on your network.
- You have (either) encryption of hard drives and/or databases containing critical data.
- You have Multi Factor Authentication (with a randomly generated token) enabled for remote access including for Microsoft Office 365 (if used).
- You or your email provider scan all incoming emails for malicious links and attachments.
- You use endpoint malware detection software such as Carbon Black, AMP, Sophos, Falcon, EDR or Defender.
- You conduct phishing exercises/training with your employees annually.
- At least two members of staff review and authorise any transfers of funds, signing of cheques or the issuance of instructions for the disbursement of assets, funds or investments above AUD $10,000.
- You verify all requests to change customer/vendor/supplier details by confirming via a direct call, using the existing contact information previously provided and on file from the entity requesting the change.
- If online banking software or systems are used to perform wire or banking transfer functions, you use multi-factor authentication in order to gain access to the banking portal and also for any transfers.
- Your back-ups are done on a weekly basis, stored off-site and segregated from your corporate environment.
- You test the implementation of your computer system and network data backups on at least a quarterly basis.
- You have firewalls and anti-virus in-place and they are updated in line with software recommendations.
- You or your IT outsourced service provider have a patch management policy in place to implement critical patches within 30 days of their release.
- You or your IT outsourced service provider apply critical patches as soon as possible and no later than 14 days from release.