Contact us

(831) 722-3541

Contact us

Contact details:

Message:

Your message has been sent successfully. Close this notice.

Commercial Insurance Quote

Coverage Information

Current Coverage Information

Contact details:

Your Quote Form has been sent successfully. Close this notice.

Auto Insurance Quote

Contact details:

Current Coverage Information

Your car:

Your Quote Form has been sent successfully. Close this notice.

Homeowners Insurance Quote

Your house:

Current Coverage Information

Contact details:

Your Quote Form has been sent successfully. Close this notice.

Life Insurance Quote

Life Insurance Details

Current Coverage Information

Contact details:

Your Quote Form has been sent successfully. Close this notice.

Health Insurance Quote

Coverage Information

Current Coverage Information

Contact details:

Your Quote Form has been sent successfully. Close this notice.
7 years ago · by · 0 comments

A Growing Need for Cyber Liability Insurance

In today’s high-tech world, individuals can carry thousands of client files on flash drives in their pockets or purses. People are conducting business on the go and sensitive information is accessible at the click of a button. Managers are using their laptops or tablets through “hot spots” at local coffee shops to access customer databases. Healthcare professionals shopping at supermarkets can get patient files on their smartphones.

If you think of information security breaches primarily in terms of malicious hackers cracking the networks of big corporations from thousands of miles away, think again.

The hacking of such corporate giants as Global Payments, Epsilon, and Sony prove that size and sophistication can’t stop data thieves. However any company that stores customer information in electronic format is vulnerable to cyber privacy liability exposures than can cost megabucks – or even put a firm out of business – which means they need insurance against these risks.

Cyber Liability coverage can protect your business against breaches of privacy from unauthorized access, physical taking, or the mysterious disappearance of confidential information that leads to third-party losses resulting from identity theft.

Depending on your needs, the policy can also provide a variety of coverages, such as:

  • Business Interruption
  • Cyber Extortion
  • Systems and Data Recovery

Other options can cover the cost of contacting those affected by the data breach, computer forensics to analyze the breach, fines and penalties, potential HIPAA (client medical records) exposures, and online activities on your company site.

The development and expansion of Cyber Liability coverage during the past two decades has paralleled the explosive growth of computer technology: Today’s policies are increasingly comprehensive – and inexpensive. Contact us today to discuss your Cyber Liability Insurance needs.

Read more

8 years ago · by · 0 comments

You’ve Been Hacked! Spread The Word

No matter how prepared you are – or believe you are – you can still suffer a cyber-security breach. What you do next can have a profound impact on the reputation of the business, customer loyalty, employee morale, and, ultimately, your bottom line.

An effective communication strategy should follow these guidelines:

  1. Notify key regulatory and legal authorities as soon as possible, unless this might impede a criminal investigation. Even if notification isn’t required by law, it’s an important courtesy.
  2. Make sure that staff roles and responsibilities for communicating the breach are outlined and understood clearly.
  3. Tailor the notification process to the audience – high-value customers, senior employees, or individuals who might particularly vulnerable (such as the elderly, the disabled, and minors) and to the nature of the breach; handle the theft of confidential client information differently than stealing employees’ Social Security numbers.
  4. Have legal counsel review the method and content of all communications.
  5. Prepare for media inquiries to deliver a clear message for parties affected directly or indirectly. Be sure that your spokesperson is qualified and trained to deal with the media.
  6. Provide ways for victims of the breach to ask additional questions and/or learn how to minimize potential harm.
  7. Test the plan: If you had to execute it, how well did it work, and how did you update it? Many businesses have discovered holes in their response plans after failing to consider the impact of a cyber security breach on daily operations, or underestimating the attention the event drew.

To learn more about spreading the word after a data breach, please get in touch with us.

Read more

9 years ago · by · 0 comments

Personal Cybercrime Risks

Scurich Insurance Services - CABreaches in some worldwide retailers could have you wondering if your personal information is safe. After all, those huge conglomerates that have been targeted recently, such as Zappos and Target, have millions of dollars at stake so why would a cyber-criminal want to target a single person? The answer might surprise you.

Valuable Personal Information

Identity theft is a big business in this day and age of inter-connectivity. Whether a cyber crook is a small-time player and simply looking to have a good time with your credit card or they are part of a larger ring that sells the information they obtain, personally identifiable information such as your birth date, current and former addresses and social security number are all valuable to them. With just a few bits of information, these criminals can easily steal your identity, making your life a nightmare for many months or even years.

Email Addresses Sell

Even if a cyber-criminal is not able to get enough information to assume your identity, they can still steal your email address and sell it. Email addresses are valuable to legitimate businesses and criminals alike. They can easily be sold for a nominal amount that quickly adds up for those crooks who are adept at breaching security parameters.

Fraudulent Credit Card Activity

If you are like many people, you assume that retailers that have an online presence are safe to share your credit card information. While huge businesses such as Target have invested millions of dollars into their cyber security systems, it is still possible for them to be infiltrated. You should always see a lock in the address bar of any website that you are inputting sensitive information. Even with this assurance, though, you need to keep a close eye on your credit card statements each month.

 

 

Read more

Company information

Scurich Insurance Services
Phone: (831) 661-5697
Fax: (831) 661-5741

Physical:
783 Rio Del Mar Blvd., Suite7,
Aptos, Ca 95003-4700

Mailing:
PO Box 1170
Watsonville, CA 95077-1170

Contact details

E-mail address:
[email protected]

(831) 661-5697

Available 8:30am - 5:00pm