Home Cyber Protection
Cyber insurance coverage for homeowners
properties.trackTitle
properties.trackSubtitle
Home Cyber Protection is a suite of unique, innovative cyber insurance coverages, to protect anyone who uses computers and connected home devices, stores information electronically, and accesses data online.
Typical personal line policies do not cover these types of cyber threats.
Cloud services, computers, mobile devices, smart TVs, game consoles, connected appliances, and other equipment have become essential, but they also create avenues for cyber attackers to infiltrate a network and cause data and systems damage, steal information, extort money, and commit fraud.
Being hacked could create major expenses, such as damage from cyber attacks, demand for ransom, loss from fraud, and notification of those affected.
What does cyber insurance for homeowners include?
Computer attack
Removes malware and restores software on computers, tablets, Wi-Fi routers, or other internet access points.
Removes malware and restores software on computers, tablets, Wi-Fi routers, or other internet access points.
Identity recovery
Combines identity theft expense reimbursement coverage with full-service ID theft restoration services to save time for customers who experience identity theft
Combines identity theft expense reimbursement coverage with full-service ID theft restoration services to save time for customers who experience identity theft
Social media income interruption
Includes coverage for social media income loss resulting from a cyber attack or the account takeover of a social media influencer
Includes coverage for social media income loss resulting from a cyber attack or the account takeover of a social media influencer
Home title recovery expenses
Coverage for home title recovery expenses resulting from identity theft includes lawyer & court filing fees for recovery of the title
Coverage for home title recovery expenses resulting from identity theft includes lawyer & court filing fees for recovery of the title
Home systems attack
Restores devices connected to the internet, including smartphones, thermostats, smart appliances, and security and monitoring systems
Restores devices connected to the internet, including smartphones, thermostats, smart appliances, and security and monitoring systems
Data breach
Includes costs associated with forensic IT and legal reviews as well as notification and recovery services when private non-business data entrusted to an individual is lost, stolen, or published
Includes costs associated with forensic IT and legal reviews as well as notification and recovery services when private non-business data entrusted to an individual is lost, stolen, or published
Cyber extortion
Provides professional assistance on how to respond to a ransomware attack and payment of the ransom (when approved)
Provides professional assistance on how to respond to a ransomware attack and payment of the ransom (when approved)
Online fraud
Pays for losses resulting from identity theft, phishing schemes, illegal bank and credit card transfers, forgery, counterfeit currency, and other deceptions
Pays for losses resulting from identity theft, phishing schemes, illegal bank and credit card transfers, forgery, counterfeit currency, and other deceptions
Cyberbullying
Pays for the costs of recovering from a cyberbullying attack, from psychiatric counseling services and legal expenses to temporary relocation expenses, social media monitoring software, and more
Pays for the costs of recovering from a cyberbullying attack, from psychiatric counseling services and legal expenses to temporary relocation expenses, social media monitoring software, and more