Cyber Lev
Cyber Lev Insurance provides proactive protection from hackers’ attacks and data theft. The insurance is intended for small and medium sized enterprises that would like to minimize risks and guarantee cybersecurity and peace in the digital space for themselves and their clients.
With Cyber Lev Insurance you receive for free specialized software for proactive protection and monitoring built by Oren Elimelech and his team. This way, your business will be protected day and night by two Security Operation Centers (SOCs) – in Bulgaria and in Israel.
Who is thе insurance designed for?
Cyber Lev Insurance is a product for insurance and cyber protection of computer configurations that belong to small and medium-sized enterprises operating on the territory of the Republic of Bulgaria.
The insurance contract is in force if the Insured allow Lev Ins’ specialists, or people authorized by them, to install specialized software for monitoring of the Insured’s computer configurations, in order to prevent the risk. The policy is active after the insurance premium is paid and the specialized software is activated.
Territorial scope of coverage:
Lev Ins provides insurance coverage of harmful actions, caused to legal entities registered in the Republic of Bulgaria and are operating on the territory of the Republic of Bulgaria.
What risks are covered by the insurance?
- Damage by a data breach in the information systems of the Insured caused by outsiders with harmful intentions;
- Damage, destruction, altering, distortion, or abusing the computer configurations of the Insured;
- Unauthorized using of the computer systems;
- Compromising of functionalities;
- Abuse of rights;
- Information theft;
- Data loss depending on the origin of the threat;
- Data breach caused by unauthorized access to systems;
- Unauthorized alteration of data.
Why should I take out Cyber Lev Insurance with Lev Ins?
- 24/7 emergency assistance in the event of a hackers’ attack;
- 2 Security Operational Centers – in Israel and Bulgaria;
-
EDR - Endpoint Detection and Response (EDR) security management service
- A team of cybersecurity experts to take care of your protection.
Free 24/7 assistance line
0800 10 200
With Cyber Lev Insurance Lev Ins provides prevention from hackers’ attacks, instant discovery and investigation of successful data breaches, without payment of additional premium through specialized software developed by Israeli specialists.
- Non-stop monitoring of the information systems of your company;
- Database with the most current threats in Internet;
- Technical expertise of two teams of specialists;
- Immediate incidents reaction.
Frequently Asked Questions
What is the specialized monitoring software?
The specialized monitoring software is SIEM (Security Information and Event Management). It processes, analyzes, and alarms for all events related to the security of your information systems. In the occurrence of a cyber incident, Lev Ins’ specialists from the Security Operations Center immediately notify you and check the event. If there are serious concerns, we forward the incidents to the third level of protection – the Security Operations Center in Israel.
What is necessary for installing the specialized monitoring software?
The specialized monitoring software (SIEM) that Lev Ins in collaboration with its Israeli partners provides to its clients, requires a HostIDS (HostIntrusionDetectionSystem) installation on each device. This is a software tool which, similarly to an immobilizer for a car, gets activated by a hackers’ attack or another cybersecurity problem of your computer systems. In the event of an incident, it sends data to the monitoring software which is processed by the information security experts from the Security Operations Center.
What requirements do my computer systems need to comply with for the insurance to be valid?
For your insurance policy to be valid, it is necessary that all your software products on your work stations are updated to the last version. After making the policy, the experts from Lev Ins’ Security Operations Center inspect your work stations for harmful software. They remove it for free and then install HostIDS – a software tool necessary in order to be switched into the specialized monitoring software.
What should I do in case of a hackers’ attack?
Through the specialized monitoring software SIEM, the information security specialists from the Security Operations Center are able to instantly identify data breach attempts in your information systems. At every incident attempt, you will be warned by phone immediately and our experts will take the necessary measures to prevent a hackers’ attack.
If you notice something wrong or unusual, you can signal the Security Operations Center at any time. Our experts will check for free any unusual events that concern the security of your information systems.
How is a claim proved?
The Israeli model of proactive security that Lev Ins implements, is minimizing the risk of a successful hackers’ attack. In the space of possibilities, a chance of a breach still exists. If hypothetically there is a breach, the experts from the Security Operations Center are conducting an investigation (cyberforensics) and send a report to claim handling department.