{"id":2080,"date":"2023-02-04T19:49:04","date_gmt":"2023-02-04T19:49:04","guid":{"rendered":"https:\/\/twv.okp.mybluehost.me\/samplesample\/?page_id=2080"},"modified":"2023-02-05T07:29:26","modified_gmt":"2023-02-05T07:29:26","slug":"cyber-risks","status":"publish","type":"page","link":"https:\/\/dhaifre.com\/samplesample\/cyber-risks\/","title":{"rendered":"Cyber Risks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2080\" class=\"elementor elementor-2080\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c4e222a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c4e222a\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-12dc2fc\" data-id=\"12dc2fc\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61e37b6 elementor-widget elementor-widget-heading\" data-id=\"61e37b6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cyber Risks<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2e9c99e elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2e9c99e\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e1eba92\" data-id=\"e1eba92\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ebff624 elementor-widget elementor-widget-text-editor\" data-id=\"ebff624\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #272b2e; font-family: Arial, sans-serif;\"><span style=\"font-size: 18px;\">Cyber threat is one of the main problems that most companies face nowadays. In addition\u00a0<\/span><\/span><span style=\"font-size: 18px; color: #272b2e; font-family: Arial, sans-serif; font-style: inherit; font-weight: inherit; background-color: var( --e-global-color-astglobalcolor4 );\">to the loss or disclosure of personal and confidential data, companies are increasingly faced\u00a0<\/span><span style=\"font-size: 18px; color: #272b2e; font-family: Arial, sans-serif; font-style: inherit; font-weight: inherit; background-color: var( --e-global-color-astglobalcolor4 );\">with threats and risks to perform normal operations in their daily activity that ultimately\u00a0<\/span><span style=\"font-size: 18px; color: #272b2e; font-family: Arial, sans-serif; font-style: inherit; font-weight: inherit; background-color: var( --e-global-color-astglobalcolor4 );\">affect both the growth and reputation of the company.<\/span><\/p><p><span style=\"color: #272b2e; font-family: Arial, sans-serif;\"><span style=\"font-size: 18px;\">Dhaif Re\u2019s Global Cyber markets provide the necessary security to carry out any type of\u00a0<\/span><\/span><span style=\"font-size: 18px; color: #272b2e; font-family: Arial, sans-serif; font-style: inherit; font-weight: inherit; background-color: var( --e-global-color-astglobalcolor4 );\">professional activity and comprehensively protect the data of both companies and their\u00a0<\/span><span style=\"font-size: 18px; color: #272b2e; font-family: Arial, sans-serif; font-style: inherit; font-weight: inherit; background-color: var( --e-global-color-astglobalcolor4 );\">customers with a complete list of worldwide coverage.<\/span><\/p><p><span style=\"color: #272b2e; font-family: Arial, sans-serif;\"><span style=\"font-size: 18px;\"><b>PRODUCTS<\/b><\/span><\/span><\/p><ul><li><span style=\"color: #272b2e; font-family: Arial, sans-serif;\"><span style=\"font-size: 18px;\">Personal Liability derived from the Security and Data Privacy<\/span><\/span><\/li><li><span style=\"color: #272b2e; font-family: Arial, sans-serif;\"><span style=\"font-size: 18px;\">Response Services for incidents related to data privacy<\/span><\/span><\/li><li><span style=\"color: #272b2e; font-family: Arial, sans-serif;\"><span style=\"font-size: 18px;\">Administrative Sanctions and Defense Cost<\/span><\/span><\/li><li><span style=\"color: #272b2e; font-family: Arial, sans-serif;\"><span style=\"font-size: 18px;\">Personal Liability derived from Content on Web Pages<\/span><\/span><\/li><li><span style=\"color: #272b2e; font-family: Arial, sans-serif;\"><span style=\"font-size: 18px;\">Fines arising from non-compliance with PCI security standards, Costs and Expenses<\/span><\/span><\/li><li><span style=\"color: #272b2e; font-family: Arial, sans-serif;\"><span style=\"font-size: 18px;\">Damages due Business Interruption due to failures in network systems<\/span><\/span><\/li><li><span style=\"color: #272b2e; font-family: Arial, sans-serif;\"><span style=\"font-size: 18px;\">Cyber Extortion<\/span><\/span><\/li><li><span style=\"color: #272b2e; font-family: Arial, sans-serif;\"><span style=\"font-size: 18px;\">Own Damages coverage related to Data Protection<\/span><\/span><\/li><li><span style=\"color: #272b2e; font-family: Arial, sans-serif;\"><span style=\"font-size: 18px;\">Defense and Claims Transactions<\/span><\/span><\/li><\/ul><p><span style=\"color: #272b2e; font-family: Arial, sans-serif;\"><span style=\"font-size: 18px;\">A policy designed so that with an agile and fast contracting, our Partners brokers can offer\u00a0<\/span><\/span><span style=\"font-size: 18px; color: #272b2e; font-family: Arial, sans-serif; font-style: inherit; font-weight: inherit; background-color: var( --e-global-color-astglobalcolor4 );\">it to their clients as an additional product to the traditional Liability and Property.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber Risks Cyber threat is one of the main problems that most companies face nowadays. In addition\u00a0to the loss or disclosure of personal and confidential data, companies are increasingly faced\u00a0with threats and risks to perform normal operations in their daily activity that ultimately\u00a0affect both the growth and reputation of the company. Dhaif Re\u2019s Global Cyber &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/dhaifre.com\/samplesample\/cyber-risks\/\"> <span class=\"screen-reader-text\">Cyber Risks<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":""},"class_list":["post-2080","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/dhaifre.com\/samplesample\/wp-json\/wp\/v2\/pages\/2080","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dhaifre.com\/samplesample\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dhaifre.com\/samplesample\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dhaifre.com\/samplesample\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dhaifre.com\/samplesample\/wp-json\/wp\/v2\/comments?post=2080"}],"version-history":[{"count":5,"href":"https:\/\/dhaifre.com\/samplesample\/wp-json\/wp\/v2\/pages\/2080\/revisions"}],"predecessor-version":[{"id":2226,"href":"https:\/\/dhaifre.com\/samplesample\/wp-json\/wp\/v2\/pages\/2080\/revisions\/2226"}],"wp:attachment":[{"href":"https:\/\/dhaifre.com\/samplesample\/wp-json\/wp\/v2\/media?parent=2080"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}