Information Technology Module



In our recent SME Ponemon survey, we asked about emerging threats in the next 12-24 months. Ninety-eight percent (98%) of small business said that an accidental download of malware, virus, worm...would occur and would penetrate their network.  

Information Technology Module

The Information Technology Module provides important proactive prevention technologies to help stop breaches from occurring. It is combined with other prevention components that collectively make up our risk mitigation benefits. Certainly, taking proactive steps to reduce risks is important. An ounce of prevention is worth a pound of cure. However, with data thefts and ransomware being difficult to stop, it is also important to have financial protection in place before a breach actually occurs. That way, when a breach does occur, the insurance protection can help ensure that you actually survive the breach. 

There are numerous technologies that exist to support your information security and computer operating needs. With our BIZLock programs, we feel it is vitally important to not only increase your education on certain "layered" technologies, but also provide you with select layers and help you understand where, how and why these and other layered technologies are relevant. While our deliverables help mitigate risks, by any means, they are not all encompassing. We aim to help you locate these layered technologies and/or provide access to purchase certain technologies from one or several sources. In some cases, the best solution might be a free download or an existing technology solution already bundled together with your program.

We provide various risk mitigation benefits that tend to increase as the limit of your coverage increases. Our lowest cost program provides Basic Risk Mitigation benefits and is followed by our increasingly more robust Bronze, Silver, Gold and Platinum levels. The following programs have different levels of benefits. (Please note: Not all program options may be available or presented as an option to you) 

Summary information includes: 

  • Bronze Level Risk Mitigation - ​Enrollees obtain access to our Technology Module and receive our Keystroke Encryption Software. The Basic Technology Module and submodules include education and access to certain free security software resources for anti-virus/anti-malware and encryption. Bronze Level program benefits already include the Human Resources and Information Security Modules.
  • Silver Level Risk Mitigation - ​In addition to the above, our Silver program adds PCI mandated Internal Vulnerability Scans and PAN Scans and reports as provided on a quarterly basis. This tool alone is valued highly. It generates meaningful reports that allow you to identify and proactively remedy vulnerabilities. Silver Level program benefits already include the Human Resources and Information Security Modules.  and collectively, the benefits are combined with our Breach Expense Protection providing up to $125,000 for certain information security breach related expenses*.
  • Gold Level Risk Mitigation - In addition to the above, enrollees obtain our 24/7 Tech Support Hotline. You will have up to eight (8) hours of services for General or Emergency I.T. needs for items like Diagnostics, Basic Network Setup & Support, PC & Mac Maintenance & Optimization, Virus & Spyware Removal, Data Backup Assistance, WiFi, Router, Internet & Email Issues & More! Gold Level program benefits already include the HR and Information Security Modules.  
  • Platinum Level Risk Mitigation - ​In addition to the above, the Platinum Level adds an extra eight (8) hours (16 total) of 24/7 Tech Support and access to our eRisk Hub online platform where you can access i) risk manager tools, ii) law firm breach coach, iii) learning center, iv) eRisk resources, and v) news center - cyber risk stories, security and compliance blogs, news, events and more.

Computer security is often referred to and viewed as an ‘onion’. The onion has multiple layers. At the core of the onion resides your information. To protect the core, you need to consider the various layers of the onion or security that will help your business identify vulnerabilities and defend against the threats. In all cases, we recommend that you only engage technology modifications or deployments with the assistance of an information technology professional. Your I.T. professional will know whether or not it is acceptable to use technologies different than those we use or present.