Cyber Insurance
Readiness Assessment

Welcome to our Cyber Liability Assessment page. At Moruga®, we understand the paramount importance of safeguarding your business against the ever-evolving threats in the digital landscape. As cyberattacks become more sophisticated and prevalent, it is crucial to take proactive measures to protect your valuable assets and mitigate potential risks. Our expert team specializes in providing comprehensive Cyber Liability Assessments tailored to your specific needs. By filling out the form below, you can kickstart the process of fortifying your organization’s cyber defenses and ensuring your insurance coverage aligns with the latest industry standards. With our in-depth knowledge and advanced methodologies, we are committed to helping you navigate the complex cybersecurity landscape and safeguard your business’s future.

Step 1 of 6

IT Policy and Documentation

IT policies and documentation are critical to Cyber Security as they provide clarity to everyone in an organization regarding information technology.  IT policies work to combat threats, manage risk, and ensure efficient, effective, and consistent operations.  These policies define how people or systems can access a corporate network and data, how that network and data is to be protected from internal and external risks and how to recover in the event of an attack and/or outage.

Acceptable Use Policy

An acceptable use policy is a document defining practices and constraints that a user is required to agree to for access to a corporate network, corporate Internet connection or other corporate resources.

Asset Management Policy

An asset management policy is a document that defines the process of receiving, tagging, documenting, and eventually disposing of corporate equipment.  It is very important to maintain an up-to-date asset inventory to ensure computer equipment locations are known.

Business Continuity Plan (BCP)

A business continuity plan (BCP) is a document that consists of the critical information and organization needs to continue to operate during and unplanned event such as a cyber security attack. A BCP details the essential functions of the business, identifies which systems and processes must be operational, details how to maintain them and assigns who is responsible for doing so.

Code of Conduct Policy

A code of conduct policy is a collection of rules and principles intended to assist employees and directors in making decision regarding their conduct in relation to the company’s business. details how to maintain them and assigns who is responsible for doing so.

Data Classification Policy

A data classification policy is a document that outlines a comprehensive plan used to categorize a company’s stored information based on its sensitivity level, ensuring proper handling, and lowering organizational risk.

Data Protection Policy

A data protection policy is a document that defines how your organization protects personal data. It is a set of principles, rules, and guidelines that outlines how you will ensure ongoing compliance with data protection laws and regulations.

Disaster Recovery Plan (DRP)

A disaster recovery plan is a document that outlines detailed instructions on how to respond to unplanned incidents such as natural disasters, power outages, cyber security attacks or any other event that disrupts business operations.

Encryption Policy

An encryption policy is a document that defines what and when data needs to be encrypted. This includes both data at rest encryption and data in transit encryption.