Cyber Insurance will provide coverage for an insured’s 1st Party and 3rd Party losses associated with network security breaches or the loss, theft or unauthorized disclosure of Personally Identifiable Information (PII) or confidential corporation information. This coverage could include expenses related to breach notification, extortion threats, public relations, credit monitoring, forensic investigation, defence costs and the costs of judgments or settlements.

Every business, regardless of size or industry, has an exposure and should be protected accordingly. Exposures come in the form of employee information, customer information, internet access, electronic and network activities and the overall use of technology.


Our suite of Cyber products provides us with the flexibility to tailor the coverage to fit each specific class of business that we insure. Whether it is a standalone Cyber policy or an endorsement for 1st Party or 3rd Party coverage, the policyholder can feel confident with the quality of coverage and the access to our breach experts. Trisura provides that insurance expertise and handles the claim professionally and quickly so that the policyholder can get back to business.

Trisura provides the first line of defence in privacy breach preparation, damage control and resolution. This coverage helps businesses stand up to the risks and cope with the rising costs of a breach, and offers both proactive and reactive assistance to businesses.



  • Cyber Liability Policy including:
    • Network Security and Privacy Liability
    • Media and Advertising Liability
    • Network Extortion Threat
    • Breach Event Services and Expenses
    • Corporate Brand Protection / Crisis Management Expenses
    • Business Interruption
    • Data Protection and System Restoration
    • Reward Expenses

Appetite and Capacity

Trisura underwrites all Cyber risks on an account by account basis taking into consideration the unique risk characteristics of each applicant. We underwrite Canadian domiciled risks with international exposures. Our working capacity is $20 million. We can participate on standard excess towers, or unique quota share arrangements.

Classes of Business

We apply our underwriting expertise to all risks, however, the following is a guide to some classes we write:

  • Accounting Firms
  • Advertising Firms
  • Agriculture
  • Construction
  • Consulting Firms
  • Entertainment Industry
  • Human Resources Firms
  • Law Firms
  • Manufacturing
  • Media Firms
  • Not-for-Profit Organizations
  • Payroll Processing
  • Publishing Firms
  • Transportation Companies
  • Unions

1. It’s only a matter of time

The frequency and severity of cyber breaches is on the rise. Our increased dependence on technology has also created vulnerability. Computers are used for everything from housing staff employment records to customer phone numbers to company strategic planning. Any data gathering network used by you or your company could be a target.

2. Any business could be at risk

While most media attention is given to companies dealing with financial or health records, any business that uses electronic equipment is at risk. This ranges from a manufacturing plant with automated equipment to a consulting firm with confidential corporate information to an insurance brokerage with client files on their computer network. Although the type of cyber incident may vary from business to business, any company that relies on computers or a body of data is vulnerable.

3. Several exposure points

When most people think of cyber attacks, they picture the faceless hacker online trying to get into your system. In reality, there are multiple areas where a breach could occur – from unwanted access to your network or website, system glitches, viruses corrupting your files, to theft or a lost laptop with confidential financial records.

4. Breaches are expensive

It pays to be diligent. Privacy and data breaches hurt the bottom line and can affect your reputation. Imagine a hacker gaining access to your client files but won’t give you the password to your own network until a ransom is paid. Loss of customer data can also halt the operation of your business or lead to costly litigation if it breaches privacy legislation. That could hurt your company’s reputation, causing distrust with customers and in turn hurting your revenue.

5. Response time is crucial

When you notice a cyber attack, the first reaction may be to panic. Don’t! With access to our response team, they will guide you through the appropriate steps during the entire process. They can help determine the cause of the breach, assist you in notifying the appropriate parties and aid in data restoration. The goal is to get your company back up and running as quickly as possible.