1 (833) US-Flood

Personal CYBER PROTECTION

protection

We are excited to announce that “Cyberman365” from Node International in partnership with Flood Risk Solutions is available to you and offers up to $1 Million in ID Theft Insurance and Restoration Support. In the unfortunate event of an Identity Theft incident Node International’s U.S.-based Fraud Resolution Agent will provide step-by-step assistance to investigate and restore your identity in the event of a claim. With a Limited Power of Attorney, Node International can manage the recovery process on your behalf and provide extra protection at no additional cost after a claim.

Additionally, as a standalone, subscription-based service, Cyberman365 React offers far more robust coverage than what is otherwise available in the marketplace. For only $175 per year for the family, this policy provides one of the most comprehensive and cost effective programs available in the marketplace. 

Key elements of their coverage offerings include:

  • ID Theft

  • CyberAgent Dark Web Monitoring

  • Credit Monitoring

  • Cyber Bullying

  • Online Fraud

  • Child Social Network Monitoring

How Cyber Scams Can Happen

how icon

Malware & Viruses

Criminals use tactics to infiltrate your devices and may steal information and hold your device and files for ransom until you pay a fee.

how icon

Data Breaches

Unfortunately companies often fall victim to data breaches where customers’ personal information is exposed. This means criminals can get hold of your data.

how icon

Mail Theft

If you have an unlocked mailbox, identity thieves can easily steal your mail containing your personal information. This also applies to your garbage so make sure you shred any personal data.

how icon

Change of Address

With just a name and address someone can divert your mail. They can then collect additional information about you such as credit card information or your Social Security Number.

how icon

Wallet Theft

If someone gets hold of your wallet, think about how much information they would have on you, SSN, name, age, bank accounts, health insurance details and more.

how icon

Oversharing on Social Media

Always be aware of what you are sharing, if strangers can predict your movements it’s easy for them to steal your identity or belongings.

Claim EXAMPLES

ID Theft
Discovering your personal info stolen, leading to fraudulent credit cards, loans, and government benefits in your name, damages your credit score. Struggling to clear your name, you face endless calls with creditors, battling to prove your innocence. The emotional toll is heavy, leaving you violated and powerless.
Social Engineering Attack
You get a call from a supposed tech company rep, claiming your computer has a virus. They instruct you to download remote access software to fix it. But instead, it gives them unrestricted access, letting them monitor, steal sensitive info, and launch cyber attacks using your device. Feeling violated, you’re now wary of unsolicited communication via phone, email, or text.
Phishing Scams
You get an email resembling your bank’s official communication, asking urgently to verify your account details via a link. Despite your caution, you’re caught off guard and click, entering your login info. Soon, you receive another email confirming changes to your account, and your balance is emptied. Panic ensues as you realize you’ve fallen for a phishing scam, scrambling to freeze your accounts and contact your bank to prevent further damage.
Data Breaches
Your healthcare provider notifies you of a breach, revealing your personal health info, including medical history and insurance details, might be compromised. Anxiety grips you, fearing the consequences for your privacy and financial security. You ponder how the breach happened and what measures you can take to safeguard against identity theft and fraud.
Ransomware Attack
Imagine finding all your files encrypted one morning—a ransomware attack demands a hefty Bitcoin payment for access. As a freelancer, losing these files threatens your livelihood. Desperate to retrieve them, you contemplate paying the ransom, but fear dealing with cybercriminals and uncertain if they’ll decrypt your files. With looming deadlines and demanding clients, stress mounts in an already dire situation.
Unauthorized Access
You notice unusual activity on your social media—posts and messages you didn’t make. Investigation reveals your accounts are hacked, spreading spam and phishing links. Feeling violated and embarrassed, you worry about reputation damage. After regaining control with new passwords and two-factor authentication, you wonder how they accessed your accounts and how to prevent future breaches.
Online Fraud
You’ve saved for months to buy a designer handbag from an online store you found on social media. Despite its professional appearance and reasonable prices, your order never arrives. Frantic emails to the company go unanswered, and you realize too late that it’s a scam. Losing money, you feel foolish and vow to be more cautious with online retailers, even if it means passing up good deals.
Online Extortion
You get an email demanding money in exchange for not releasing intimate photos and videos of you. Shocked, you realize someone has compromising material without your consent, using it to blackmail you. Fearful of public exposure, you debate paying to protect your privacy or refusing the demands. Feeling ashamed and vulnerable, you dread the possibility of your private moments being exposed against your will.
Cyber Bullying
Your teenage daughter confides in you about cyberbullying, receiving cruel messages from classmates on social media, hurting her confidence and well-being. Despite efforts with school administrators, the cyberbullying persists, leaving you feeling helpless and frustrated with inadequate measures against online harassment.
Online Scams
You spot an appealing online ad for a work-from-home gig, pledging big earnings with little effort. Hoping to boost income, you sign up, investing heavily in training and fees. But as you explore further, you find the returns unrealistic and the focus on recruiting, not genuine work. Realizing it’s a pyramid scheme, you’re frustrated and vow to be cautious with online opportunities.

Cyberman365 REACT

Home and Family Cyber Risk Insurance Protection

Cyberman365 React, will provide up to $1 Million in ID Theft coverage and ID Restoration Support services to you and your family in the aftermath of a cyber incident.

A U.S. based Fraud Resolution agent will be available to deliver step by step support to investigate and restore your identity. With our limited power of attorney, we can manage the recovery on your behalf to help alleviate a stressful situation.

Following a cyber event, you will benefit from continued extra protection through our active ID Theft and Credit Monitoring services. You will also have access to a variety of enhanced cybersecurity services provided in partnership with Cyberman365, a leading provider of cybersecurity prevention and detection tools.

Coverage Overview

Claim Up to $1 Million
Your aggregate limit is $1,000,000 per policy period
Zero Deductible
You don’t need to pay anything out of pocket before your coverage kicks in
ID Restoration Support
A Fraud Resolution Agent will deliver step-by-step support to restore your identity. Our Limited Power of Attorney option allows our agents to manage recovery on your behalf.
Change of Address
If your mail is redirected through the U.S. Postal Service, you will receive an alert. This is an easy way for fraudsters to collect your data and abuse your identity.
ID Theft Insurance
You are covered up to $1 Million for certain eligible expenses associated with ID theft. including lost wages, legal fees and electronic fund transfers.
Online Fraud
Coverage for necessary and reasonable fraud costs (including direct financial loss), so long as it has been reported in writing to the Police.
CyberAgent Dark Web Monitoring
We scan the dark web, known for illegally buying and selling personal data and alert you if your identity may be at risk. We will assist you in securing any breached data.
Child Social Network Monitoring
Scans your child’s social media accounts and informs you if privacy or reputational risks are spotted on their profile. Includes Twitter, Facebook, lnstagram and Linkedln
Credit Monitoring
We will alert you to any critical changes by constantly monitoring your credit(s) reports. You will also receive a credit report upon enrollment.
Social Security Number Trace
If a new name or alias is added to your SSN we will alert you, we also generate a report of all the names and aliases already associated with your SSN.
Bank Account Takeover
We alert you if your identity is used to open new bank accounts or if unauthorized changes are made to existing accounts. We will then help you resolve the problem.
Child Internet Surveillance Report
We scan the dark web, known for illegally buying and selling personal data, and alert you if your child's identity may be at risk. We will assist you in securing any breached data.
Cyber Bullying
Coverage for necessary and reasonable cyber bullying expenses i.e. counselling, replacement wages, educational relocation expenses and legal services.
Cyber Extortion
Coverage for the costs of an expert to help with a cyber extortion event, as well as reasonable costs to respond to an extortion threat.
Internet of Things Compromise
Coverage for necessary and reasonable costs for data recovery and system restoration following a “cyber-attack” (defined as unauthorized access or use and/or a malware attack).
Social Media Monitoring
Scans your social media accounts and informs you if privacy or reputational risks are spotted on your profile.

What Can I Do To Avoid Identity Theft?

how icon

Be Proactive

Recognize that your private information has likely been made public through countless data breaches. Consider putting in place credit freezes and fraud alerts with the credit bureaus to prevent new lines of credit from being opened in your name.

how icon

Never Recycle Passwords

Using the same password for multiple online accounts and devices is a common mistake made when account takeovers occur. Consider a reputable password manager that will generate long and unique passwords for each online account.

how icon

Read Your Credit Report

Request a free copy of your credit report from annualcreditreport.com. This will allow you to receive one report every 12 months from each credit reporting company. Reviewing this information consistently will help spot signs of identity theft.

how icon

Invest in a Shredder

Make sure you properly dispose of sensitive data such as receipts, package labels with contact information, credit card statements, and financial records.

how icon

Think Before You Share

Fuel for social engineering attacks often comes from the information we willingly give away. Review privacy settings on social media accounts and think before you post pictures and personally identifiable information. You never know who might be looking.

how icon

Isolate Online Activity

Consider creating unique email addresses for the variety of online accounts used. Do not link an email address from less critical activity such as social media use or online publications to more sensitive accounts like banking or investments.

Frequently ASKED QUESTION

What What is identity theft? What should I do if I believe I am a victim of identity theft?
Identity theft occurs when someone acquires your personal information and uses it without your permission, usually for financial gain. An identity thief may use your personally identifiable information to take out loans, obtain new credit cards, rent an apartment, purchase a car, open an online account, run up debt, and other criminal activities.
How can I tell if I am a victim of identity theft?
Below is a list of indicators which could be a result of identity theft. Always follow up with the business or institution to find out it if it is caused by a simple clerical error or fraudulent activity.
  • Unfamiliar court records, address information or bankruptcies

  • Failing to receive bills or other mail — this may signal an address change initiated by an identity thief

  • Being served court papers or arrest warrants for actions you did not commit

  • Receiving credit cards for which you did not apply or being denied credit for no apparent reason

  • Unknown charges or withdrawals from bank accounts

  • Receiving calls or letters from debt collectors or businesses about merchandise or services you did not buy

How is financial fraud different from identity theft?
The term “financial fraud” covers common credit card, check, and debit card fraud. When a criminal uses your credit cards or debit cards to make a purchase, he or she usually hasn’t assumed your identity. Recovering from financial fraud is relatively easy, since most creditors don’t hold you liable for fraudulent charges.
What is a data breach and what personal information is taken when one occurs?
A data breach is a security incident where protected information has been accessed or disclosed in an unauthorized manner. The most common includes personal data such as name, email, passwords, Social Security number, driver’s license number, biometric, medical record, as well as financial information like debit and credit card numbers.
How will Cyberman365 React help me restore my identity if I become a victim of identity theft?
Our specialist partner, TransUnion, will help you determine if an identity theft event has occurred and guide you through any necessary restoration activities. They may take the following actions on your behalf:
  • Contact your credit card issuer or banking institution

  • Review your credit report for indications of identity theft

  • Place a fraud alert or security freeze with the three credit bureaus

  • Execute a limited power of attorney agreement and take care of the time consuming work.

What Are Some Of The Risks WHEN USING INTERNET OF THINGS DEVICES?

how icon

Password Recycling and Weak Credentials

Reusing passwords across multiple devices and services provides criminals easy access for account takeover attacks. No sophistication here. Create long and unique passwords for every device and account used online.

how icon

Malware and Ransomware

Cyber criminals can lock you out of a device holding all of your digital contents hostage. Family pictures, important documents and more become encrypted with threats to release it publically unless the monetary demand is paid.

how icon

Data Protection and Security Challenges

More people are now working remotely than ever before. Sensitive information is passed between personal and business computers and many are sharing devices at home for a variety of purposes. This puts data and devices at a greater risk.

how icon

Set Up Multiple Networks

Consider creating a "guest" network to separate non-essential connected devices such as smart appliances or visitors from the network you access your personal computer. This segmentation can help protect the primary network from malware or viruses spreading.

how icon

Isolate Online Outdated Hardware and Software

From performance to cybersecurity, not all lot devices are created equally. Connected devices have grown in popularity creating "smart" but vulnerable homes. Not all manufacturers provide needed firmware updates and many users fail to apply software patches placing homes at risk.

How Iot Devices Can Be Hacked

how icon

Password Recyling and Weak Credentials

Reusing passwords across multiple devices and services provides criminals easy access for account takeover attacks. No sophistication here. Create long and unique passwords for every device and account used online.

how icon

Unaware of Compromised Devices

Most users don't realise they have been hacked until it's too late. Slow reactions means the hacker has time to abuse your data and asc even more of your devices on the same network.

how icon

Data Protection and Security Challenges

More people are now working and learning remotely than ever before. Sensitive Information is passed between personal and business computers and many are sharing devices at home for a variety of purposes. This puts data and devices at a greater risk for compromise.

how icon

Malware and Ransomware

Cyber criminals can lock you out of a device holding all of your digital contents hostage. Family pictures, important documents and more become encrypted with threats to release it publicly unless the demand is paid. Cameras and monitors are also at risk giving prying eyes access to intimate parts of your home.

how icon

Outdated Hardware and Software

From performance to cybersecurity, not all loT devices are created equally. Connected devices have exploded in popularity creating "smart" but vulnerable homes all over the world. Not all manufacturers provide needed firmware updates and many users fail to apply software patches placing individuals and homes at risk.

Contact us

  • Toll Free (833) US-Flood [833-873-5663], Office (813) 336-8226

    Chat Online – click on chat icon (bottom right) (business hours only)

    Get Appointed. Click on link or email info@floodsol.com
    Lender proof of coverage email support@floodsol.com
    New Quote - single location risk Login 
    New Quote – schedule email submission to quote@floodsol.com

    Accounting - info@floodsol.com
    Press Inquiries - info@floodsol.com

  • Mail:
    Flood Risk Solutions, Inc. 
    360 Central Avenue, Suite 1260
    St. Petersburg, FL 33701

  • Our Payment Processing Address:
    Flood Risk Solutions, Inc.
    Department 3480
    PO Box 986500
    Boston, MA, 02298-6500

    Our Overnight Payment Processing Address:
    Flood Risk Solutions, Inc. / XPT Partners, LLC
    338 East Montpelier Road
    Barre, VT 05641

For any inquiries, please call or email us. Alternatively you can fill in the following contact form.
Email field is required The field 'Email' has the wrong format
Thank you for contacting us. We will get back to you shortly.
{{Error}}