Affordable cyber protection for small and medium-sized businesses.
What does the insurance cover:
  • Expert advice and assistance in the event of a cyberattack or cyber threat;
  • Assistance in limiting damage during an ongoing cyberattack;
  • Investigation and identification of cyber risk. 
Who can benefit:

Cyber Lev insurance is specially designed to protect small and medium-sized companies with up to 20 work computers. Cyber Lev insurance is preventive in nature, and for the contract to take effect, you need to install and activate specialized software for comprehensive protection (Malwarebytes EndPoint Protection), which we provide free of charge.

Additional advantages:
  • Free license for Malwarebytes Endpoint Protection—leading enterprise protection software;
  • 24/7 access to the Security Operations Center (SOC);
  • Rapid response, investigation, and incident assistance;
  • Team of international experts with years of experience. 
Why should I take out insurance:
  • Simplified procedure for taking out insurance;
  • Provides 24/7 protection for computer equipment;
  • Emergency telephone number for assistance in the event of a hacker attack.
  • Security for personal and business data and information;
  • Specialized DNS software for filtering Internet traffic and blocking dangerous websites;
  • Two cybersecurity operations centers – in Bulgaria and Israel.

Covered risks

Breach of the Insured's network security through the use of malicious software that:

Violates the integrity and causes malfunction of digital assets stored on the Insured's computer systems;
It aims to destroy, damage, and/or steal information and digital assets stored in the Insured's computer systems;
It aims to steal the identification parameters of computer system users;
It aims at unauthorized use of the Insured's computer systems.

Cyber extortion threat – a single threat or a series of related threats made by a third party and directed at the Insured, characterized by the following actions:

Threat of disclosure of commercial information;
Threat to restrict and impede access to Computer Systems;
Threat of information extraction from digital assets.

Necessary expenses related to the occurrence of an insured event:

Expenses related to the restoration of the Insured's digital assets;
Costs related to the unblocking of Digital Assets;
Costs related to notifying individuals whose data has been compromised and stolen;
Expenses related to legal protection against administrative bodies and administrative penalties;
Expenses related to restoring the reputation of the Insured.

Media liability to third parties:

The Insured's liability to third parties for defamation or insult.
Claims for liability for media publications by its current or former employees and consultants.
The Insured's liability to third parties for disclosure of secrets, damage to commercial reputation and prestige.

Frequently Asked Questions

Malwarebytes Endpoint Protection is a comprehensive solution for protecting against and removing malware with predictable threat detection, proactive threat blocking, and integrated end-to-end protection. In the event of a cyber incident, information security specialists at the Security Operations Center of ZK Lev Ins AD immediately notify you and investigate the incident. More serious incidents are sent to the third level of protection – the Security Operations Center in Israel. 

Malwarebytes' specialized software can be installed on all known operating systems—Windows, MacOS, and Linux. If you need assistance during installation, our experts are available to help you. The software client has low resource requirements on your device and quickly identifies and blocks malicious code without affecting device performance. 

For your insurance policy to be valid, all software products on your workstations must be updated to their latest version. You must then install the Malwarebytes Endpoint Protection software client. 

Through the software client, information security specialists at the Security Operations Center will be able to immediately identify attempts to breach your information systems. You will be notified immediately by phone of any attempt or incident, and our experts will take the necessary measures to prevent the attempted hacker attack. If you notice anything unusual or out of the ordinary, you can alert the Security Operations Center 24/7. Our experts will investigate, free of charge, any unusual event that affects the security of your information systems. 

The Israeli model for proactive security, which LEV INS applies, minimizes the risk of a successful hacker attack. The possibility of a breach remains within the realm of probability. If such a breach hypothetically occurs, experts from the Security Operations Center conduct an investigation (cyberforensics) and submit a report, which is sent for damage mitigation. 

Related products

Safe Internet is a flexible and convenient solution that protects you and your loved ones online.
0/0