No

Cyber risk management portal

cyber security lock

Being informed is the first step to being prepared.

Hanover cyber policyholders receive complimentary access to numerous eRiskHub tools, including access to an online education portal powered by NetDiligence®. The hanover's eRiskHub® provides tools and resources to help yu understand your exposures, establish a response plan, and minimize the effects of an attack.


Key features of The Hanover's eRiskHub® Portal

 

  • Incident roadmap — includes suggested steps to take following a network or data breach incident, free consultation with a Breach Coach® and access to a breach response team
  • News center — cyber risk stories, security and compliance blogs, security news, risk management events and helpful industry links
  • Learning center — best-practices articles, white-papers and webinars from leading technical and legal practitioners
  • Risk manager tools — assists you in managing your cyber risk including a self-assessment and state breach notification laws
  • eRisk resources — a directory to quickly find external resources with expertise in pre- and post-breach disciplines

The eRiskHub® portal is an effective way to combat cyber losses with minimal, controlled and predictable costs.

eRisk Hub graphic

 

Get started today.

Current Hanover cyber policyholders can get started today by visiting www.eriskhub.com/hanover.php and using the New User Registration form.*

Note that you will need to locate the access code, which is included within the IMPORTANT POLICYHOLDER INFORMATION of your Hanover Cyber Advantage or Hanover Cyber Advantage Premier policy.

*Upon initial login, there will be instructions to create a new password and login credentials.


Online tools and resources

Hanover data breach policyholders will also have access to numerous CyberScout tools, including access to an online portal and a 24/7 hotline:

  • Data risk learning management system (LMS)  — on demand, web-based training platform on important privacy issues such as compliance, data risk management and privacy.
  • Incidence response plan  — access a customizable data breach incident response plan template, essential to minimizing the impact and potential fallout of a datahbreach.
  • Breach management Hotline  access to breach management professionals who are ready to help if a breach event is suspected or has occurred.

Breach protection tips

Use enterprise-grade Wi-Fi in your office

It must be secure, encrypted and behind a firewall. Access should require a unique username and password centrally controlled through the Wi-Fi hardware or an external directory authentication service. Integrating Wi-Fi with a directory service such as Microsoft Active Directory provides improved security. That’s because the credentials provided are the same as the standard network logon credentials. They must follow the same complexity and rotation rules.

Install antivirus, anti-spyware and firewalls

Help prevent the mining of sensitive information by worms, Trojan horses, viruses and more, by installing the most recent enterprise-level antivirus, antispyware and anti-malware applications. Use firewalls to lock out hackers.

 

Regularly update all systems and software

Keep protection up-to-date by downloading recently issued system “patches” from antivirus and anti-malware registries, to defend against the latest forms of viruses, Trojan horses and other malicious software.

Evaluate contractor access to information

Evaluate whether contractors and vendors need access to any sensitive data. For example, employee personally identifiable information should only be accessed for payroll or benefit purposes. Your vendor agreements should provide adequate safeguards and ask vendors to: (a) abide by reasonable industry safeguards, (b) cover the costs and handling of any misuse or loss of sensitive data by their employees, and (c) have the financial capability to cover the costs to restore loss or damage, including remediation, by insurance coverage or bond.

Properly dispose of technology tools

Establish policies on how to destroy old computers, disks, tapes, CDs, memory devices and any other equipment that may contain sensitive information to prevent access by thieves. Don’t rely on the delete or trash functions to remove confidential files. To ensure complete destruction of the files, destroy the device.

 

 

 

No

Cyber risk management portal

cyber security lock

Being informed is the first step to being prepared.

Hanover cyber policyholders receive complimentary access to numerous eRiskHub tools, including access to an online education portal powered by NetDiligence®. The hanover's eRiskHub® provides tools and resources to help yu understand your exposures, establish a response plan, and minimize the effects of an attack.


Key features of The Hanover's eRiskHub® Portal

 

  • Incident roadmap — includes suggested steps to take following a network or data breach incident, free consultation with a Breach Coach® and access to a breach response team
  • News center — cyber risk stories, security and compliance blogs, security news, risk management events and helpful industry links
  • Learning center — best-practices articles, white-papers and webinars from leading technical and legal practitioners
  • Risk manager tools — assists you in managing your cyber risk including a self-assessment and state breach notification laws
  • eRisk resources — a directory to quickly find external resources with expertise in pre- and post-breach disciplines

The eRiskHub® portal is an effective way to combat cyber losses with minimal, controlled and predictable costs.

eRisk Hub graphic

 

Get started today.

Current Hanover cyber policyholders can get started today by visiting www.eriskhub.com/hanover.php and using the New User Registration form.*

Note that you will need to locate the access code, which is included within the IMPORTANT POLICYHOLDER INFORMATION of your Hanover Cyber Advantage or Hanover Cyber Advantage Premier policy.

*Upon initial login, there will be instructions to create a new password and login credentials.


Online tools and resources

Hanover data breach policyholders will also have access to numerous CyberScout tools, including access to an online portal and a 24/7 hotline:

  • Data risk learning management system (LMS)  — on demand, web-based training platform on important privacy issues such as compliance, data risk management and privacy.
  • Incidence response plan  — access a customizable data breach incident response plan template, essential to minimizing the impact and potential fallout of a datahbreach.
  • Breach management Hotline  access to breach management professionals who are ready to help if a breach event is suspected or has occurred.

Breach protection tips

Use enterprise-grade Wi-Fi in your office

It must be secure, encrypted and behind a firewall. Access should require a unique username and password centrally controlled through the Wi-Fi hardware or an external directory authentication service. Integrating Wi-Fi with a directory service such as Microsoft Active Directory provides improved security. That’s because the credentials provided are the same as the standard network logon credentials. They must follow the same complexity and rotation rules.

Install antivirus, anti-spyware and firewalls

Help prevent the mining of sensitive information by worms, Trojan horses, viruses and more, by installing the most recent enterprise-level antivirus, antispyware and anti-malware applications. Use firewalls to lock out hackers.

 

Regularly update all systems and software

Keep protection up-to-date by downloading recently issued system “patches” from antivirus and anti-malware registries, to defend against the latest forms of viruses, Trojan horses and other malicious software.

Evaluate contractor access to information

Evaluate whether contractors and vendors need access to any sensitive data. For example, employee personally identifiable information should only be accessed for payroll or benefit purposes. Your vendor agreements should provide adequate safeguards and ask vendors to: (a) abide by reasonable industry safeguards, (b) cover the costs and handling of any misuse or loss of sensitive data by their employees, and (c) have the financial capability to cover the costs to restore loss or damage, including remediation, by insurance coverage or bond.

Properly dispose of technology tools

Establish policies on how to destroy old computers, disks, tapes, CDs, memory devices and any other equipment that may contain sensitive information to prevent access by thieves. Don’t rely on the delete or trash functions to remove confidential files. To ensure complete destruction of the files, destroy the device.