© IDT911, LLC. All Rights Reserved — Confidential 0 Cyber and Privacy Breach Coverages
© IDT911, LLC. All Rights Reserved — Confidential 1 Hacking SQL Injection Phishing Spear Phishing Denial of Service attack Keyloggers Ransomware
© IDT911, LLC. All Rights Reserved — Confidential 2 Storage Devices Lost, Stolen, or Accessed Laptop Cell phone or Tablet Flash drive Data Servers or Tapes Printer/Copier/Scanner
© IDT911, LLC. All Rights Reserved — Confidential 3 Breaches Caused by Vendors Payroll Employee Benefits Outsourced IT Cloud Provider HVAC Cleaning Services
© IDT911, LLC. All Rights Reserved — Confidential 4 Employees Unintentional Clicking on bad link Visiting bad websites Leaving Access Open BYOD - Virus Intentional Rogue Employees Fraud Rings Unauthorized Access Criminal Activity
© IDT911, LLC. All Rights Reserved — Confidential 5 Paper Files
© IDT911, LLC. All Rights Reserved — Confidential 6 Breach Cost Examples
© IDT911, LLC. All Rights Reserved — Confidential 7 Breach Cost Examples