CyberBreach Program

Did you know that as a client of In-Touch Computer Services, with the correct security posture in place, you qualify for up to a 30% discount on Cyber Liability Insurance? In addition to saving money, you also receive the below exclusive techrug Cyberbreach program features:

Get a personal quote

"*" indicates required fields

Step 1 of 2

This field is for validation purposes and should be left unchanged.
Name*

Dual Claims Coverage

techrug’s “dual claim coverage” is a cyber insurance model designed to eliminate conflicts of interest and speed up the payout process in the event of a cyberattack.

Unlike standard insurance where different companies typically insure the IT Service Provider and their client, this model insures both parties under the techrug/Lloyds of London Coverholder program.

Two policies working in tandem.

istockphoto 1312330537 1024x1024

Leverage AI-driven solutions to optimize workflows, reduce costs, and unlock new growth opportunities for your business.

Digital Forensics and Incident Response (DFIR)

If your IT Service Provider is certified through techrug’s DFIR accreditation levels, their organization will be an endorsed panel list vendor on your cyber policy.

They are now equipped with the skills needed to handle Severity level 4 (Low/SEV4) + Severity level 5 (Informational/SEV5) security events.​

Responding swiftly and effectively to unforeseen circumstances will minimize downtime and damage that could lead to significant financial loss and reputational damage

istockphoto 1045002714 1024x1024

Cyber Claims

“40% of cyber insurance claims filed in 2024 got rejected because businesses didn’t meet requirements they barely knew existed”.

techrug is happy to share that in 2024 & 2025, 100% of claims turned in under our Cyber Liability Coverholder program were COVERED.

This article explains why cyber insurance claims are often denied.

istockphoto 1360520492 1024x1024

Leverage AI-driven solutions to optimize workflows, reduce costs, and unlock new growth opportunities for your business.

Questionnaire

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
Name*
How did you hear about us?
Optional. This question is used for marketing research purposes only. Your data is private, secure, and will never be sold.

Be Prepared Before the Next Cyber Incident

In-Touch IT’s Cyber Breach Program helps organizations prepare for, respond to, and recover from cyber incidents. Our team supports breach response planning, real-time incident handling, and post-incident recovery to strengthen your security posture and reduce future risk.

Partner with IT’s best
to power your business