Cyber Risk Management Resources

🔒 NetDiligence® eRiskHub through MEARIE

This program has become more sophisticated over the years with expanding coverage, services and the ability to adapt to the changing needs of its customers.

Access Cyber Risk Tools

🔒 Cyber Defence Endorsement

As part of MEARIE's Liability Insurance Program, this optional endorsement complements your policy. It provides protection against claims of damage resulting from cyber risks such as a privacy breach or a network security failure.

Learn How We Can Help

Cyber Risk Referral Program

Need Cyber support? Our program gives you access to reliable cyber risk mitigation services to safeguard your organization from cyber threats. MEARIE has partnered with these vendors, so be sure to check them out for preferred pricing.  

Learn About This Program

Additional Cyber Risk Resources

Download these resources from the Canadian Centre for Cyber Security and the Cybersecurity and Infrastructure Security Agency (CISA) to develop prevention strategies, best practices and respond to incidents by developing and preparing your organization and employees. Take steps to be secure online today and protect your data.


Heightened Cyber Exposure due to a Convergence of Three Trends

  1. Increasing reliance on technology - digitization of business
  2. Increasing value of non-physical assets - relationship between cyber risks and multiple classes of insurance
  3. Increasing moral and legal obligation - from the public, regulator, insurer
    • Regulators' intensified focus on protecting consumer data
    • Regulation not moving as quickly as cyber criminals

Privacy remains the prevalent exposure and has historically driven the purchase of insurance.


Impact on Your Company

Cost & Disruption

An incident can create downtime to internal systems, and require staff attention and effort, without ever causing disruption to actual revenue flow - but creating disruption and additional expense for the company related to:

  • Internal Resources
  • External Resources
  • Communication & Notification
  • Customer Demands - Short & Long Term
  • Regulators - OEB & Privacy

What Makes Up the Cost of Loss?

Whether an incident originates from a technology-based source or just an employee's physical mishandling or private information, the result is the same: private information gets exposed and/or your computer system environment is compromised. 
 
 

 


Direct Costs

Involves funds spend to accomplish a given activity such as engaging forensic experts, hiring a law firm or offering victims identify protection services.

Involves the allocation of resources, such as an employee's time and effort to notify victims and investigate the breach. Indirect costs also include the loss of goodwill and customer churn.

Includes forensic and investigative activities, assessment and audit services, crisis team management and communications to execute management and board of directors.

Includes the creation of contact databases, determination of all regulatory requirements, engagement of outside experts, postal expenditures, email bounce-backs and inbound communication set up.

Includes help desk activities, inbound communications, special investigative activities, remediation, legal expenditures, product discounts, identifying protection services, and regulatory interventions.

Learn more about our Products & Services


Contact us with your questions and a member of our team will reach out.

Contact Us