top of page
![](https://static.wixstatic.com/media/074d96_c7254df61982428dbc3ea98d2486985d~mv2.png/v1/fill/w_251,h_67,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/074d96_c7254df61982428dbc3ea98d2486985d~mv2.png)
![molecula2@2x-min.jpg](https://static.wixstatic.com/media/074d96_9f934275206f4724b502e34033f084fb~mv2.jpg/v1/fill/w_1241,h_595,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/molecula2%402x-min.jpg)
Don't face cyber threats alone!
Surance’s Holistic Cyber Defense (™) service is
designed to keep you safe, backed by 24/7 expert support whenever you need it.
Prevent, Repair, and Recover from cyber attacks, with coverage of up to 50,000 USD for damages resulting from a cyber attack.
![yuca_Picture_a_scene_in_a_modern_office_where_a_cyber_security__99ffb894-01f5-4a36-92bd-1b](https://static.wixstatic.com/media/59858b_6f3abb8d78724e41995c19bfc6abb4b5~mv2.png/v1/fill/w_511,h_511,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/yuca_Picture_a_scene_in_a_modern_office_where_a_cyber_security__99ffb894-01f5-4a36-92bd-1b.png)
Cyber attack response & prevention
![01@2x.png](https://static.wixstatic.com/media/074d96_32a442b3bace42aca979a79d22b60c52~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/01%402x.png)
State-of-the-art household cyber protection and prevention toolkit
![02@2x.png](https://static.wixstatic.com/media/074d96_36dc03fff1f54b6e9444522bd1cb447f~mv2.png/v1/fill/w_56,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/02%402x.png)
24/7 recovery services and cyber response experts
![03@2x.png](https://static.wixstatic.com/media/074d96_133892c2457f4694b2419287587c1ef9~mv2.png/v1/fill/w_55,h_55,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/03%402x.png)
Low number of integrations, highly secured and regulated
![hacker-min-min.png](https://static.wixstatic.com/media/074d96_fc953474b42a4ff09999d374f85dbf90~mv2.png/v1/fill/w_300,h_300,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/hacker-min-min.png)
Top 5 concerns for cyber coverage and the insured
![05@2x-min.png](https://static.wixstatic.com/media/074d96_86cb863f5fc145d3b3106ecf1bfed402~mv2.png/v1/fill/w_49,h_49,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/05%402x-min.png)
1. Cyber extortion (Ransomware)
![06@2x-min.png](https://static.wixstatic.com/media/074d96_275855bb676f491ea524218b3e09005d~mv2.png/v1/fill/w_51,h_49,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/06%402x-min.png)
4. Identity theft and financial fraud
![07@2x-min.png](https://static.wixstatic.com/media/074d96_c26b1d6d6df44ab291f9484056300fdf~mv2.png/v1/fill/w_49,h_51,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/07%402x-min.png)
2. Valuable data loss
![08@2x-min.png](https://static.wixstatic.com/media/074d96_055522c0f30449728810aa519b3ef52a~mv2.png/v1/fill/w_51,h_51,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/08%402x-min.png)
5. Personal information (e.g. photos) breach and reputational harm
![09@2x-min.png](https://static.wixstatic.com/media/074d96_2c888e6dc4514851ae3c2fbffe688934~mv2.png/v1/fill/w_49,h_49,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/09%402x-min.png)
3. Cyberbullying
Surance.io App
![11@2x-min.png](https://static.wixstatic.com/media/074d96_c7d079d55a654d24aa6300f482f84d28~mv2.png/v1/fill/w_70,h_124,al_c,q_85,usm_0.66_1.00_0.01,blur_2,enc_auto/11%402x-min.png)
![10@2x-min.png](https://static.wixstatic.com/media/074d96_343b63b1f6714bf2a6c2466517307c4a~mv2.png/v1/fill/w_49,h_49,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/10%402x-min.png)
Discover the digital assets
Home network, mobile device and dark web scan and monitoring
![39@2x-min.png](https://static.wixstatic.com/media/074d96_6d39cd94d1e5465c9eca45b1e3b75571~mv2.png/v1/fill/w_49,h_49,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/39%402x-min.png)
IoT devices protection and recommendations
Learn if your IoT devices need a firmware upgrade or a password change
![34@2x-min.png](https://static.wixstatic.com/media/074d96_1c2deb2f3bbe44e9a5af729367a16510~mv2.png/v1/fill/w_49,h_49,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/34%402x-min.png)
Recovery services and cyber expert response team
Professional team is ready to assist in case of a cyber attack
![14@2x-min.png](https://static.wixstatic.com/media/074d96_840303c7526047b6a0b764f714427ec9~mv2.png/v1/fill/w_49,h_49,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/14%402x-min.png)
Secure data backup solutions
Protect valuable documents and pictures
![15@2x-min.png](https://static.wixstatic.com/media/074d96_b4bfa9e1a3eb427f8c23202b1f71ad9c~mv2.png/v1/fill/w_49,h_49,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/15%402x-min.png)
Vulnerability assessment
Detect and warn about potential points for remote attack
![36@2x-min.png](https://static.wixstatic.com/media/074d96_df54ec7cc5db4f2cae9a871e6f678530~mv2.png/v1/fill/w_70,h_124,al_c,q_85,usm_0.66_1.00_0.01,blur_2,enc_auto/36%402x-min.png)
![16@2x-min.png](https://static.wixstatic.com/media/074d96_5eb10b2972734dd7b2a88d16f3891610~mv2.png/v1/fill/w_49,h_49,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/16%402x-min.png)
24/7 AI and live agent support
Receive instant help in case of any issues
![17@2x-min.png](https://static.wixstatic.com/media/074d96_f9cbb46e3beb45859b73f2c33f51ab46~mv2.png/v1/fill/w_49,h_49,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/17%402x-min.png)
Dark web monitoring
Learn if your personal data has been exposed and/or abused
![37@2x-min.png](https://static.wixstatic.com/media/074d96_514920d60ef5486aa75ecf8de9c4f2dc~mv2.png/v1/fill/w_70,h_124,al_c,q_85,usm_0.66_1.00_0.01,blur_2,enc_auto/37%402x-min.png)
![dna%402x%20(1)-min_edited.png](https://static.wixstatic.com/media/074d96_63899f439d0e456192ef63ef6f7dfb9d~mv2.png/v1/fill/w_47,h_23,al_c,q_85,usm_0.66_1.00_0.01,blur_2,enc_auto/dna%25402x%2520(1)-min_edited.png)
Full Protection
![31@2x-min.png](https://static.wixstatic.com/media/074d96_78bc0783bb9346738c4e921d71771ea6~mv2.png/v1/fill/w_49,h_49,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/31%402x-min.png)
Financial fraud
![33@2x-min.png](https://static.wixstatic.com/media/074d96_a9dc76d2ace24533822230bf2dc1077b~mv2.png/v1/fill/w_49,h_49,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/33%402x-min.png)
Identity theft
![35@2x-min.png](https://static.wixstatic.com/media/074d96_346d2d02f70f4b38bf3e5dd18bf119de~mv2.png/v1/fill/w_49,h_49,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/35%402x-min.png)
Cyber extortion
![41@2x-min.png](https://static.wixstatic.com/media/074d96_0fb27a1a572b4abb83dc5218c7f6d42b~mv2.png/v1/fill/w_49,h_49,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/41%402x-min.png)
Reputational harm
![32@2x-min.png](https://static.wixstatic.com/media/074d96_88de6b83ad854f349259f70a82f894e6~mv2.png/v1/fill/w_49,h_49,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/32%402x-min.png)
Online shopping
![34@2x-min.png](https://static.wixstatic.com/media/074d96_1c2deb2f3bbe44e9a5af729367a16510~mv2.png/v1/fill/w_49,h_49,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/34%402x-min.png)
Data restoration
![40@2x-min.png](https://static.wixstatic.com/media/074d96_d6db4d0e8cc1467188820133fdb24cc2~mv2.png/v1/fill/w_49,h_49,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/40%402x-min.png)
Digital media liability
Cyberbullying
![38@2x-min.png](https://static.wixstatic.com/media/074d96_9063bd2f1c81437eb39c7387fea3b1b1~mv2.png/v1/fill/w_49,h_49,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_auto/38%402x-min.png)
Read our white paper on cyber risks
Learn more about the latest cyber risks, the opportunities and the challenges
![Group 553@2x-min.png](https://static.wixstatic.com/media/074d96_2431589ebb504e7c9c1a2aef3e4cd4d0~mv2.png/v1/fill/w_73,h_43,al_c,q_85,usm_0.66_1.00_0.01,blur_2,enc_auto/Group%20553%402x-min.png)
USA
6246 Sunnycrest dr, Oakpark, Ca, USA
Canada
30 Macintosh blv, Vaughan, Ontario, Canada
Israel
Deborah Hanevia, Ramat Hasharon 47430, Israel
Surance.io
Cyberman365
Ayalon
Copyright © 2023 Surance.io. All rights reserved.
bottom of page