- ID Restoration Support
A Fraud Resolution Agent will deliver step-by-step support to restore your identity. Our Limited Power of Attorney option allows our agents to
manage recovery on your behalf. - ID Theft Insurance
You are covered up to $1 million for certain eligible expenses associated with ID theft. including lost wages, legal fees and electronic fund transfers. - Home Network Monitoring
When activated we will scan and monitor your external home network. The provided report will outline any security issues with your connected hardware and IOT devices. - Data Scrub
Our expert data removal agents will identify and remove personal data from data brokers reducing the number of unwanted spam and scam communications. - Fast Claims Processing
Submit a claim by calling 800 0320402 or by sending an email to claims@cyberman365.com - ID Theft Insurance
You are covered up to $1 million for certain eligible expenses associated with ID theft. including lost wages, legal fees and electronic fund transfers. - Home Network Monitoring
When activated we will scan and monitor your external home network. The provided report will outline any security issues with your connected hardware and IOT devices. - Cyber Bullying
Coverage for necessary and reasonable cyber bullying expenses i.e. counselling, replacement wages, educational relocation expenses and legal services. - Online Fraud
Coverage for necessary and reasonable fraud costs (including direct financial loss), so long as it has been reported in writing to the Police. - Cyber Extortion
Coverage for the costs of an expert to help with a cyber extortion event, as well as reasonable costs to respond to an extortion threat. - Cyber Bullying
Coverage for necessary and reasonable cyber bullying expenses i.e. counselling, replacement wages, educational relocation expenses and legal services. - Internet of Things Compromise
Coverage for necessary and reasonable costs for data recovery and system restoration following a cyber-attack (defined as unauthorised access or use and/or a malware attack).
