Claim
Claims Handling Proposition
Claims Leader – Astaara
  • A positive claims handling experience is core to the Astaara offering
  • Astaara is experienced in managing complex claims in step with our clients
First Response service and Loss Adjusting
  • Market leading cyber and marine loss adjusting specialists
  • Providers of first response service 365 / 24 / 7 globally
Dedicated Astaara
365 / 24 / 7 Hotline number:
Local Toll Free Number: 080 0852 6477
International Line: +1 404 905 8292
and
claims@astaaragroup.com
Support & design for rebuild
  • The maritime cyber risk management specialists
  • Claims leadership experience and excellence
  • Vendor management and leadership
Legal coverage matters
  • Top tier marine / energy law firm
  • Global reach which mirrors Astaara’s client locations
  • Marine cyber leaders on advisory and casualty /claims handling
Astaara overview of claim notification and triage process
Claims stages and how we expect to work together
Your obligations under the Astaara policy
  1. Notify us within 72 hours of incident.
  2. Implement your approved business continuity plan
  3. Advise in notification of:
    • What has happened
    • Who you have reported the incident to
    • How far incident response has been implemented
Triage
We will work with the Insured to establish what is required to:
  1. Analyse the issue
  2. Contain the infection
  3. Eradicate the malware
  4. Recover the data
  5. Restore systems
Assembling the team to respond
Astaara will work with you to appoint a team that is proportionate to the size of your business and the severity of incident
Guidance to Insureds on how to approach incident management
Analyse the issue
  • identify the Threat Actor: who/what they want
  • Understand how they achieved entry
  • undertsna d where they have go to
  • understand where they might wish to attack/encrypt
  • establish location of data and status
Contain the infection
  • isolate from the network
  • scan for malware or other compromise
  • analyse results and review system behaviour
  • quarantine infected devices or network segments
  • test for malware again
Eradicate
  • rebuild / reload software,data and configurations
  • renew systems where necessary
  • scan with more than one reputable AV
  • re-load with new OS and software
  • re-scan with AV prior to network connection
Recover the data
  • identify what has been used to encrypt and whether back ups are affected
  • review back up status
  • understand extent of dataset compromise
  • understand configuration issues
  • check back ups for virus load and integrity
Restore systems
  • ensure back ups are clean
  • ensure operating enironment is clean and both AV and firewalls are up and up to date
  • establish clean back up and configuration files
  • document new data stores and back up procedures
  • bring back on line
Please Click Here for more information
Please access the website using a computer