Modern businesses rely heavily on the use of computers and their networks, thereby running the risk of cyber attacks and most general business insurance policies do not cover such losses.  Our experts have compiled the below documents to help you understand the importance of properly protecting your business from cyber intrusion.  At HWP Insurance we take cyber exposure seriously and believe that cyber liability insurance is an essential piece of a comprehensive business insurance portfolio.


Download All 4 Cyber Liability Documents   Contact Us

International Coverages

Cyber Risk Exposure Scorecard

The first step in managing cyber risk is understanding your specific exposures. Learn more about your cyber exposure by completing our Cyber Risk Scorecard.


Professional Liability Insurance

Cyber Liability Insurance

A traditional business liability policy is extremely unlikely to protect against most cyber exposures. Standard commercial policies do little, if anything, to shield you from electronic damages and the associated costs they may incur.  This document helps explain the exposures a typical cyber liability policy covers.

Property Coverages

Four Components of Cyber Risk Management

If your company stores data and information digitally, you should have a cyber risk management program that addresses prevention, disclosure, crisis management and insurance coverage in the event of a data breach. Effective cyber risk management requires the planning and execution of all four of these components.  This document explains the importance of each of these components.

Fiduciary & Crime Coverages

Cyber Security for Small Businesses

It has been estimated that the average annual cost of cyber-attacks to small and medium-sized businesses is over $200,000. Most small businesses don’t have that kind of money lying around, and as a result, nearly 60 percent of the small businesses victimized by a cyber-attack close permanently within six months of the attack.  Download now to learn more about protecting your business from cyber intrusion.