Claim Center
We're in the business of helping people, providing prompt and personal claims service when you need us the most.
Call 877-242-2544 anytime, day or night, to report claims. You may also contact your independent agent to report a claim.
Plan & Protect
Reduce risks and enjoy peace of mind with these tips and insights to protect what matters most.
Corporations are no longer the only ones looking at cybersecurity. Increasingly, homeowners whose networks can make them vulnerable to cyber extortion, cyberattack and online fraud are seeing cybersecurity as a necessity.
Smart home technology – once out of reach to all but the most affluent homeowners – is becoming more affordable and prevalent. Now just a click of a button or swipe of a finger on a phone can allow most anyone to view home security camera images, monitor front-door access and control home heating and cooling systems. The networks that keep homeowners connected to their homes also make them potential targets of cyberattack.
Cyber extortion, one of the most common cyberattacks, can occur when personal information or a network is locked and held for ransom. Extortionists often demand payment in bitcoin or other digital currency. Theoretically, after the payment is made, the extortionist will supply a code or cipher to unlock personal data or a network. However, many times the extortionists take the currency and do not unlock the data.
Cyber extortion could include holding the smart home system ransom, not just the homeowner’s personal data on a server. After the home is hijacked, the consequences could be endless, including physical damage to the home. For example, while a family is away in the winter, a northern climate home could have the heat turned off, resulting in a large water claim from frozen pipes. The consequences can be substantial for a single action taken by a criminal, let alone when these individuals attack multiple aspects of the smart home system.
Sometimes criminals hack into a system with the goal of spying on the home to identify opportune moments to commit burglaries or other crimes. Criminals may not reveal themselves immediately, and their presence within the network may not be detected without firewalls or network security devices. Even with security in place, networks can be attacked, but the devices may mitigate the severity. To be as effective as possible, all network security should be updated as suggested by the manufacturer and must be kept up to date with the technology available.
Insurance companies are responding to cyber threats by adding coverages for these new risks. Not only do these coverages provide assistance at the time of the attack, but many include access to specialized resources to help mitigate the risk or prevent these crimes from occurring.
For your protection:
This loss control information is advisory only. The author assumes no responsibility for management or control of loss control activities. Not all exposures are identified in this article. Contact your local, independent insurance agent for coverage advice and policy service.