Marsh works with leading cyber risk insurers to develop cyber risk insurance protection for a wide range of Internet and network exposures.

Marsh helps organizations like yours address their needs in this area. Tailored solutions are described below. For more information on all our offerings on this topic plus reports, articles and press releases, visit our Cyber Risk homepage.


Cyber Risk

Internet and networked technologies have changed many aspects of how business operates. The ability to readily store and share data across interconnected networks has created new efficiencies in sales and marketing, data access and retrieval, and vendor relations and interaction.

While the benefits of using Internet-based and other technologies are numerous, so are the inherent risks, creating exposures that were virtually unheard of two decades ago. These include:

  • theft or manipulation of sensitive or private information, such as financial or health records;
  • computer viruses that can destroy data, damage hardware, cripple systems and disrupt a business' operations; and
  • computer fraud.

Unfortunately, Internet and network exposures are increasingly subject to exclusion from "traditional" insurance policies since commercial general liability and property policies were originally designed to respond to liabilities and natural perils that damage physical assets. With Internet-based technologies, "i-exposures" are largely intangible, the result of human error, or deliberate malicious attacks and crimes.

To protect against these and similar exposures, Marsh offers risk management and insurance solutions to address these complex risks, including:

  • detailed insurance gap analysis;
  • network security survey to assess vulnerability;
  • security policy review and development;
  • network vulnerability scans; and
  • assessment of internet connectivity vulnerability.

Marsh works with leading cyber risk insurers to develop cyber risk insurance protection for Internet and network exposures, including:

  • liability: privacy and confidentiality;
  • copyright, trademark, defamation;
  • malicious code and viruses;
  • business interruption: network outages, computer failure;
  • attacks, unauthorized access, theft, Web site defacement and cyber extortion;
  • technology errors & omissions; and
  • intellectual property infringement.
ERM Risk Assessment
Views: 19011  |  Comments: 0  |  Category: Solutions  |  Published: 22-Mar-2013
ERM Risk Assessment
Marsh Risk Consulting’s (MRC) highly efficient ERM risk assessment process can help organizations quickly understand and prioritize critical, enterprise-wide risks and develop plan  Read More >>
Marsh CloudProtect—A Cyber Policy Enhancement
Views: 23464  |  Comments: 1  |  Category: Solutions  |  Published: 02-Jun-2012
Marsh CloudProtect—A Cyber Policy Enhancement
Marsh’s CloudProtect is a scalable risk transfer solution customized for each client based on its unique exposures, defined through Marsh’s comprehensive risk analyses.  Read More >>
Intellectual Property and Critical Information Protection
Views: 21976  |  Comments: 0  |  Category: Solutions  |  Published: 17-Jun-2011
Intellectual Property and Critical Information Protection
Marsh Risk Consulting (MRC) has developed a comprehensive methodology to help organizations protect their IP and critical information.  Read More >>