Cyber Insurance Glossary

Understanding the world of cyber insurance can feel daunting, especially with the growing array of technical terms related to cyber risks and protection. Whether you're exploring coverage options or managing existing policies, grasping the terminology is key to making informed choices. This Cyber Insurance glossary simplifies complex concepts, providing clear definitions to help you confidently address the challenges of protecting your business in the digital age.

Read more
cyber insurance

Get right expert advice

Hassle-free policy

Speedy Claims

Get Free Access to Report: Cyber Breaches in Industry

Fast-track your search with instant quotes from prominent insurers

Get ₹5 crore insurance cover starting at ₹3 lakh/year+

Get ₹5 crore insurance cover starting at ₹3 lakh+

Are you buying the policy for?
We don't spam
Get Updates on WhatsApp
View Plans

Get ₹5 crore insurance cover starting at ₹3 lakh/year+

Fast-track your search with instant quotes from prominent insurers
Expert advice

Buy right

Instant policy

Quick & Hassle free

Dedicated team

Speedy Claims

Get Free Access to Report: Cyber Breaches in Industry

A

  • Advanced Persistent Threat (APT): A long-term, targeted attack where attackers infiltrate a network and remain undetected to gather sensitive information.
  • Antivirus Software: A tool designed to identify and eliminate malicious software like viruses, worms, and Trojans.
  • Authentication: The process of confirming a user's identity, such as with passwords or biometric scans.

B

  • Botnet: A group of devices infected with malware, controlled remotely to perform malicious activities like sending spam or launching attacks.
  • Brute Force Attack: A hacking method where all possible password combinations are tried to gain access to a system.
  • Business Email Compromise (BEC): A cyber fraud where attackers use fake emails to deceive employees into transferring money or data.
  • Business Interruption Loss: Revenue loss caused by downtime following a cyber event, often covered by insurance.

C

  • Cloud Security: Practices and tools designed to protect cloud-based systems and data from unauthorised access.
  • Credential Stuffing: Cybercriminals use stolen login details to access accounts on multiple platforms.
  • Cyber Extortion: Threats to compromise or release sensitive data unless a ransom is paid.
  • Cyber Hygiene: Maintaining good security habits to minimise vulnerabilities, such as updating software and using strong passwords.
  • Cyber Insurance: A policy providing financial coverage for losses due to cyber incidents like breaches or ransomware attacks.
  • Cyber Attacks: Malicious attempts to compromise systems, steal data, or disrupt operations through methods like phishing, ransomware, or DDoS.
  • Cybersecurity: The practice of protecting systems, networks, and data from cyber threats using tools like firewalls, encryption, and threat detection.

D

  • Data Breach: The unauthorised release or theft of private or confidential information.
  • Denial of Service (DoS) Attack: An attack that floods a system with requests, making it unavailable to users.
  • Distributed Denial of Service (DDoS) Attack: A large-scale DoS attack from multiple devices simultaneously.
  • Dark Web: A hidden part of the internet often used for illegal activities and data trade.
  • Domain Spoofing: Impersonating a legitimate domain to deceive recipients into trusting a fake email.
  • Data Security: Safeguarding digital information from unauthorized access, theft, or corruption through encryption, access controls, and secure backups.

E

  • Encryption: Transforming data into unreadable code to prevent unauthorised access.
  • Endpoint Security: Protecting devices connected to a network, such as laptops and mobile phones, against cyber threats.
  • Exfiltration: The act of stealing data from a network without authorisation.
  • Email Encryption: Securing email contents to ensure only authorized recipients can read them.
  • Email Spoofing: Forging the "From" field in an email to make it appear as if it came from a trusted source.
  • Email Gateway: A security system that filters and scans incoming and outgoing emails for threats.

F

  • Firewall: A system that monitors and controls network traffic to block malicious access.
  • First-Party Coverage: Insurance that covers the policyholder's direct losses, such as data restoration or extortion costs.
  • False Positive: A legitimate email incorrectly marked as spam or malicious.

G

  • GDPR (General Data Protection Regulation): A European Union law regulating data protection and privacy for individuals.
  • Gray Hat Hacker: A hacker who exploits vulnerabilities without permission but often reports them instead of causing harm.

H

  • Hacktivism: Using hacking to promote social or political causes.
  • Honey Pot: A fake system set up to attract cyber attackers and study their behaviour.
  • Hybrid Cloud Security: Security measures designed to protect data and applications across both private and public cloud environments.

I

  • Incident Response Plan (IRP): A documented guide for managing and recovering from cyber incidents.
  • Insider Threat: Risks caused by employees or contractors misusing their access to sensitive systems.
  • Internet of Things (IoT): A network of internet-connected devices, such as smart appliances, that requires robust security.

J

  • Jailbreaking: Removing software restrictions from a device's operating system, making it vulnerable to threats.

K

  • Keylogger: A malicious program that tracks and records every keystroke to steal sensitive data like passwords.

L

  • Least Privilege: A principle ensuring users only have access to the systems or data necessary for their tasks.
  • Log Management: Collecting and analysing system logs to detect and prevent cyber threats.

M

  • Malware: Malicious software, such as viruses or spyware, designed to damage or steal data.
  • Man-in-the-Middle (MitM) Attack: An attack where the hacker intercepts communication between two parties.
  • Multi-Factor Authentication (MFA): Using multiple forms of verification, like passwords and biometrics, to secure access.
  • Malicious Attachments: Files attached to emails containing malware or viruses.

N

  • Network Segmentation: Dividing a network into smaller sections to reduce the risk of cyber threats spreading.
  • Next-Generation Firewall (NGFW): An advanced firewall that includes intrusion detection and deep packet inspection.

O

  • Open Port: A network entry point that allows communication, which can be exploited if left unsecured.
  • Operational Technology (OT): Systems used to control industrial processes that need special security measures.

P

  • Patch Management: The regular updating of software to fix vulnerabilities and improve security.
  • Phishing: A scam where attackers trick individuals into sharing personal or financial information.
  • Privilege Escalation: Gaining higher-level access than originally authorised within a system.

Q

  • Quarantine: Isolating a suspected threat or infected system to prevent further damage.

R

  • Ransomware: Malware that locks or encrypts files, demanding payment for their release.
  • Risk Assessment: Evaluating a system to identify potential vulnerabilities and prioritise their mitigation.
  • Ransom: A sum of money demanded by cybercriminals in exchange for stopping a cyberattack or restoring access to encrypted data, typically used in ransomware attacks.

S

  • Social Engineering: Manipulating individuals into divulging confidential information.
  • SQL Injection: An attack where malicious SQL commands are used to access or manipulate a database.
  • Spyware: Malware designed to secretly gather information from a system.
  • Spear Phishing: A targeted phishing attack aimed at specific individuals or organisations.

T

  • Third-Party Coverage: Insurance that covers legal claims or damages affecting third parties due to the policyholder's cyber incident.
  • Threat Actor: An individual or group responsible for initiating cyber attacks.
  • Typosquatting: Using domains with slight misspellings of legitimate addresses to trick users into responding to fake emails.

U

  • Unauthorised Access: Accessing systems or data without proper authorisation.
  • User Awareness Training: Education programs to help individuals recognise and prevent cyber risks.

V

  • Virtual Private Network (VPN): A secure network connection that encrypts data and masks the user's location.
  • Vulnerability: A weakness in a system or software that can be exploited by attackers.
  • Vishing: A phishing variant using voice or phone calls in combination with email scams.
  • Vendor Email Compromise (VEC): Targeting vendors’ emails to manipulate billing or transaction details.

W

  • Whaling: A phishing attack that targets high-profile individuals like executives.
  • Worm: Self-replicating malware that spreads across networks without user intervention.
  • Web Application Firewalls (WAF): A security tool that monitors and filters incoming and outgoing traffic to protect web applications from attacks like SQL injection and cross-site scripting.
  • Website Security: The protection of a website and its data from cyber threats like hacking, malware, and DDoS attacks using tools like firewalls, SSL certificates, and regular updates.

X

  • XML Injection: An attack that targets XML-based systems by injecting malicious code.

Y

  • Yield Farming Exploit: Attacks that exploit vulnerabilities in decentralised finance systems to steal assets.

Z

  • Zero-Day Exploit: An attack that targets software vulnerabilities before they are publicly known or fixed.
  • Zombie Device: An infected device controlled by hackers, often used in botnet attacks.
Cyber Insurance Companies
Disclaimer: Above mentioned insurers are arranged in alphabetical order. Policybazaar.com does not endorse, rate, or recommend any particular insurer or insurance product offered by an insurer.

Now help your friend get Business Insurance

Your referral is greatly appreciated!

Our team will reach out to your friend soon to help with their business insurance requirements.

Cyber Insurance News

Global Cyber Threats: India Emerges as a Key Target in 2024
Global Cyber Threats: India Emerges as a Key Target in 2024
According to a report by cyber intelligence firm CloudSEK, India ranked as one of the top nations globally affected by cyberattacks in 2024, with 95...Read more
Payment Gateway Company Reports Massive ₹16,180 Crore Cyber Theft
Payment Gateway Company Reports Massive ₹16,180 Crore Cyber Theft
In a startling revelation, the Thane Police have exposed a massive cyber heist, with cybercriminals pilfering an astonishing ₹16,180 crore. This...Read more
Cybercriminals Target Former Union Minister Dayanidhi Maran's Savings...
Cybercriminals Target Former Union Minister Dayanidhi Maran's Savings...
In a concerning development, cybercriminals managed to siphon off ₹99,999 from the personal savings account of Dayanidhi Maran, the former Union...Read more
Mumbai Police Nab Four Cyber Fraudsters in Extensive 22-Day Operation
Mumbai Police Nab Four Cyber Fraudsters in Extensive 22-Day Operation
In a 22-day operation spanning four states, including Uttar Pradesh, Rajasthan, Delhi and Madhya Pradesh, a Mumbai Police task force comprising seven...Read more
India Grapples with Mounting Cybersecurity Risks, According to Palo...
India Grapples with Mounting Cybersecurity Risks, According to Palo...
India is confronting a significant threat of cyberattacks aimed at its critical infrastructure, public sector, and essential services, as per a report...Read more
Pune-Based Engineering Supplies Firm Loses Over 22 Lakh in Cyber Scam
Pune-Based Engineering Supplies Firm Loses Over 22 Lakh in Cyber Scam
Pune City police uncovered a suspected 'man-in-the-middle' cyber attack that cost a Pune-based engineering supplies firm more than 24,000 Euros...Read more
AIIMS Delhi Hit by Cyber Attack for Second Time in a Year
AIIMS Delhi Hit by Cyber Attack for Second Time in a Year
All India Institute of Medical Sciences (AIIMS) in New Delhi faced a new cyberattack on Monday. The premier medical institution promptly responded...Read more
Mumbai Woman Falls Victim to Cyber Fraudsters While Helping an...
Mumbai Woman Falls Victim to Cyber Fraudsters While Helping an...
A Mumbai woman's act of kindness towards an injured bird took an unexpected turn when she became a target of cyber fraud.Dhwani Mehta works at Famous...Read more
Scammers Exploit 'Man-in-the-Middle' Technique, Pune Construction...
Scammers Exploit 'Man-in-the-Middle' Technique, Pune Construction...
Prominent Construction Technology Company falls victim to cyber attack, losing Rs 13.8 Lakh in Pune, India. The investigators described it as a...Read more
Reddit Hacked in a Targeted Phishing Attack
Reddit Hacked in a Targeted Phishing Attack
Finance minister Nirmala Sitharaman presented the Union Budget FY 2023 on February 1, 2023. Christopher Slowe, CTO of Reddit, revealed the company was...Read more
FM Nirmala Sitharaman announces Set up of 3 Artificial Intelligence...
FM Nirmala Sitharaman announces Set up of 3 Artificial Intelligence...
Finance minister Nirmala Sitharaman presented the Union Budget FY 2023 on February 1, 2023. The Finance Minister announced the establishment of 3...Read more
Cyber Fraudster Target Customer under Disguise of Insurance Officer
Cyber Fraudster Target Customer under Disguise of Insurance Officer
Cyber fraudsters are targeting customers under the disguise of not a bank official but an insurance company official. In one such event, a 67 year old...Read more
Sensitive Data of 6 Lakh Indians Stolen by Hackers and Sold at Rs...
Sensitive Data of 6 Lakh Indians Stolen by Hackers and Sold at Rs...
Out of 5 million people globally, 6 lakhs Indians have had their sensitive data stolen and sold on the bot market making India, the worst affected...Read more
AIIMS Cyber Breach: Attackers Demand Rs 200 Crore in Crypto
AIIMS Cyber Breach: Attackers Demand Rs 200 Crore in Crypto
All India Institute of Medical Sciences, New Delhi, India reported a cyberattack on November 23, 2022. Later, the statement released by AIIMS said that...Read more
Cyber Criminals Sending Phishing Links to Twitter Users
Cyber Criminals Sending Phishing Links to Twitter Users
Cyber criminals are targeting twitter Verified Twitter user by sending them phishing links. The cyber criminals send the phishing link to steal their...Read more
Cyber Insurance Articles
As per the Indian Computer Emergency Response Team, 12.67 lakh cyber-attacks were registered by November 2022....Read more
21 Mar 2023 by Policybazaar 17451 Views
We live in the digital era. Now, almost everything is possible online as every other organization is going digital...Read more
12 Apr 2022 by Policybazaar 14053 Views
Every shop owner must put in extra efforts to make their retail store as safe as possible. To create a secure...Read more
29 Apr 2022 by Policybazaar 7527 Views
Cybercrime involves criminal activities targeting or utilizing computers, computer networks, or interconnected...Read more
25 Jun 2024 by Policybazaar 1060 Views
The cyber risks have increased after the outbreak of Covid-19. One of the main reasons behind the increment in...Read more
31 Mar 2022 by Policybazaar 5833 Views
Cybersecurity legislation in India is a critical line of defence in safeguarding the nation's digital...Read more
12 Jun 2024 by Policybazaar 999 Views
Cyber security is one of the critical issues in India with the sudden development in digitalization. The...Read more
07 Apr 2023 by Policybazaar 2520 Views
Cyber insurance for the banking finance & insurance industry offers financial protection against potential...Read more
28 Feb 2023 by Policybazaar 3159 Views
The ever-advancing realm of technology has afforded cybercriminals new avenues to exploit unsuspecting victims...Read more
09 Oct 2023 by Policybazaar 1535 Views
Email spoofing, a tactic where attackers send emails with forged sender addresses, poses a significant...Read more
20 Nov 2024 by Policybazaar 256 Views
With the emergence of new technology, industries are prone to the risk of cyber-attacks.. Upon imposing the...Read more
11 Apr 2023 by Policybazaar 2740 Views
In this ever-evolving and the technologically-driven world, cyber-attacks have been increasingly common and a...Read more
29 Nov 2022 by Policybazaar 2603 Views
In today's digital age, the need for cyber insurance as a mandatory cybersecurity tool has become increasingly...Read more
23 Jan 2023 by Policybazaar 2254 Views
Finance minister Nirmala Sitharaman presented the Union Budget FY 2023 on February 1, 2023. The Finance Minister...Read more
03 Feb 2023 by Policybazaar 600 Views
With the increased usage of the Internet, the number of cyberattacks has increased as well. Since retail shops...Read more
06 May 2022 by Policybazaar 2728 Views
According to a report by cyber intelligence firm CloudSEK, India...Read more
13 Jan 2025 by Policybazaar 62 Views
Distributed Denial of Service (DDoS) attacks are an urgent...Read more
10 Jan 2025 by Policybazaar 96 Views
Email spoofing, a tactic where attackers send emails with forged...Read more
20 Nov 2024 by Policybazaar 259 Views
Cybersecurity threats are evolving rapidly, and one of the most...Read more
04 Nov 2024 by Policybazaar 330 Views
As ransomware attacks continue to escalate globally, they pose a...Read more
04 Nov 2024 by Policybazaar 81 Views
Malware, or malicious software, refers to programs intentionally...Read more
30 Oct 2024 by Policybazaar 266 Views
Phishing is one of the most common cyberattacks in today’s...Read more
21 Oct 2024 by Policybazaar 297 Views
Spear phishing is a highly targeted and sophisticated...Read more
21 Oct 2024 by Policybazaar 248 Views
As cyberattacks become more frequent and sophisticated...Read more
15 Oct 2024 by Policybazaar 363 Views
As our world becomes increasingly digital, the need for robust...Read more
15 Oct 2024 by Policybazaar 308 Views
Ransomware has emerged as one of the most menacing cyber threats...Read more
04 Oct 2024 by Policybazaar 329 Views
Cybercrime involves criminal activities targeting or utilizing...Read more
25 Jun 2024 by Policybazaar 1068 Views
Cybersecurity legislation in India is a critical line of defence...Read more
12 Jun 2024 by Policybazaar 1004 Views
India's growing reliance on digital infrastructure has brought...Read more
11 Jun 2024 by Policybazaar 538 Views
In recent years, India has witnessed a remarkable surge in...Read more
11 Jun 2024 by Policybazaar 629 Views
Policybazaar for Business - Cyber Insurance - Customer Reviews
View all
4.5/5
Based on 47 reviews
4.5
out of 5
Based on 47 reviews
12 users
34 users
1 users
0 users
0 users
4.3 October 11, 2022
Aarti Singh
Knowledegable Team
The representatives at PolicyBazaar were knowledgeable, patient and genuinely committed to helping me find the best insurance policy for my requirements. They took the time to answer all my questions and provide valuable guidance, ensuring that I had a thorough understanding of the coverage details and terms. THANKS.
Agra
4.3 October 06, 2022
Amit
Quick And Hassle Free
After seeing a rise in cyber attacks in many of the companies, i decided to purchase a cyber insurance policy for my start up. I went on the Policy Bazaar website and learned about the coverage in detail and purchased it from their website only. It was quick and hassle-free purchase.
Nashik
4.5 October 04, 2022
Pinku
Paperless Process
We bought the contractual liability insurance from policybazaar and received the best overall package. The process was paperless as we applied for insurance online and the support was amazing.
Surat
4.5 October 03, 2022
Aashish
Extensive Coverage
We thoroughly checked all the benefits and features and decided to buy a contractual liability policy from Policybazaar. It provides all the necessary features to safeguard our business against any loss.
Ahemdabad
4.5 October 02, 2022
Nishant
Easy To Buy
It was easy to buy insurance from Policybazaar and customer support was also amazing to clear all the doubts. Contractual liability insurance is essential for my business and I could not get a better deal than this.
Udaipur
4.5 October 01, 2022
Puneet
Easy Plan Comparision
An ideal Contractual Liability Insurance policy purchased to protect our business that we ecounter in our everyday operations. Policybazaar offers a platform to compare multiple plans.
Assam
4.5 September 30, 2022
Govind
No Broker And Paper Work
Great experience at Policybazaar. We did not know that buying Contractual Liability Insurance could be that easy. Also there is no broker and paperwork.
Jharkhand
4.8 September 29, 2022
Rinku
Perfect Insurance Coverage
I purchased Contractual Liability Insurance from Policybazaar and the coverage they provided is perfect to keep my hardware business safe various unforeseen instances.
New Delhi
4.5 March 18, 2022
Ishan
Cloud Storage Cover
I wanted to purchase a cyber insurance policy could provide coverage for the data stored in cloud network. I went on the Policybazaar website and look up for plans that would provide me with this coverage. I compared different plans and in a matter of minutes i found the right cyber insurance plan that would fit my requirement.
Ajmer
4.5 March 17, 2022
Anurag
Good User Interface
I was looking for a cyber insurance policy online. After looking for the insurance plan online I landed on the Policybazaar website. Trust me, the user interface of the website is so good that i was able to locate the cyber insurance plan and purchase it in not more than 10 minutes. Thanks Policybazaar.
Delhi