network security

CyberScout Data Breach Services

It’s no longer a matter of if, but when a business will experience a data breach. That’s why The Hanover has partnered with CyberScout, a leader in identity management and data breach services. CyberScout combines breach prevention services with effective breach consulting and response services, giving you the expert support you need to help prepare for a breach, manage the crisis, and control the damage. Best of all, it’s automatically included for Hanover policyholders with Data Breach Coverage.

Data Breach Services

CyberScout is able to provide proactive, comprehensive data breach protection and remediation services that help defend businesses against inadvertent data exposures and identity theft, including:

Proactive Breach Preparation Services

Online breach preparedness portal, risk analysis tools, best practices and breach preparation templates to help protect data and identities.

Breach Response Services

Access to breach response experts who are standing by, ready to provide trusted guidance, reassuring support, and full remediation services. The remediation services include:

  • Breach assessments and next steps
  • Interaction with the policyholder and claims department
  • Help and support in developing breach victim notifications and breach response plans, using best practices
  • Organization of media response
  • Complete handling of cases from first call to remediation with built in identity theft resolution for affected individuals

Get Started Today.

For more information, check out our CyberScout information sheet or access the Breach Preparedness site.

User name: hanover
Password: Hanover4BR

Upon initial log-in, there will be instructions to create a new password and login credentials.

Visit Site

Online Tools & Resources

Hanover policyholders will also have access to numerous CyberScout tools, including access to an online portal and a 24/7 hotline:

  • Data Risk Learning Management System (LMS) – On demand, web-based training platform on important privacy issues such as compliance, data risk management and privacy.
  • Incidence Response Plan – Access a customizable data breach incident response plan template, essential to minimizing the impact and potential fallout of a data breach.
  • Breach Management Hotline – Access to breach management professionals who are ready to help if a breach event is suspected or has occurred.

Breach Protection Tips

Limit the use of portable technology

Restrict the “Bring Your Own Device” (BYOD) trend to the most secure devices. To reduce risks, don’t store non-confidential data on these devices. If your IT policy allows confidential information to be shared on BYOD devices, make sure the information that’s transferred and stored is encrypted and password-protected.

Use enterprise-grade Wi-Fi in your office

It must be secure, encrypted and behind a firewall. Access should require a unique username and password centrally controlled through the Wi-Fi hardware or an external directory authentication service. Integrating Wi-Fi with a directory service such as Microsoft Active Directory provides improved security. That’s because the credentials provided are the same as the standard network logon credentials. They must follow the same complexity and rotation rules.

Ban public use of company devices

Public Wi-Fi hotspots such as those in hotel lobbies, coffee shops or airports can put your laptop or device in a network that can give hackers and thieves access to your data. Wireless and hard-wired connections in hotel rooms should not be trusted to access company email and servers. Instead require employees to use a company-provided wireless broadband card to ensure data security.

Install antivirus, anti-spyware and firewalls

Help prevent the mining of sensitive information by worms, Trojan horses, viruses and more, by installing the most recent enterprise-level antivirus, antispyware and anti-malware applications. Use firewalls to lock out hackers.

Regularly update all systems and software

Keep protection up-to-date by downloading recently issued system “patches” from antivirus and anti-malware registries, to defend against the latest forms of viruses, Trojan horses and other malicious software.

Evaluate contractor access to information

Evaluate whether contractors and vendors need access to any sensitive data. For example, employee personally identifiable information should only be accessed for payroll or benefit purposes. Your vendor agreements should provide adequate safeguards and ask vendors to: (a) abide by reasonable industry safeguards, (b) cover the costs and handling of any misuse or loss of sensitive data by their employees, and (c) have the financial capability to cover the costs to restore loss or damage, including remediation, by insurance coverage or bond.

Properly dispose of technology tools

Establish policies on how to destroy old computers, disks, tapes, CDs, memory devices and any other equipment that may contain sensitive information to prevent access by thieves. Don’t rely on the delete or trash functions to remove confidential files. To ensure complete destruction of the files, destroy the device.