{"id":8555,"date":"2025-10-15T12:13:17","date_gmt":"2025-10-15T05:13:17","guid":{"rendered":"https:\/\/ligaasuransi.com\/?p=8555"},"modified":"2025-10-15T12:13:17","modified_gmt":"2025-10-15T05:13:17","slug":"informasi-dan-dokumen-yang-diperlukan-untuk-penerbitan-polis-cyber-insurance","status":"publish","type":"post","link":"http:\/\/ligaasuransi.com\/en\/informasi-dan-dokumen-yang-diperlukan-untuk-penerbitan-polis-cyber-insurance\/","title":{"rendered":"Information and Documents Required for Issuing a Cyber \u200b\u200bInsurance Policy"},"content":{"rendered":"<p><\/p>\n<h3><span style=\"font-weight: 400;\">Cyberattacks Are Rising Dramatically, But Many Companies Are Still Unprepared<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">In the last 5 years, the number of cyber attacks against companies in Indonesia has increased sharply.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">From hacking of government websites, ransomware that paralyzes public services, to customer data leaks from various sectors \u2014 all show that digital threats are now a real risk, not just a potential one.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unfortunately, most companies still don&#8217;t understand that cyber insurance is not just about compensation, but also about business resilience.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, before an insurance policy is issued, the company must go through an important stage that is often overlooked, namely the underwriting and information gathering process.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is where PT. Liberty and General Insurance Broker (L&amp;G Insurance Broker) plays a crucial role\u2014helping clients prepare the correct data and documents so that the policy issuance process runs smoothly, quickly, and provides optimal protection.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Why the Cyber \u200b\u200bInsurance Underwriting Process is So Important<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Unlike conventional insurance such as fire or vehicle insurance, the risks in cyber insurance are very dynamic and complex.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Insurance companies not only value physical assets, but also:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Digital infrastructure,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Data security process,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Legal compliance,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">And preparedness to face incidents.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">This process is called underwriting assessment \u2014 the risk assessment stage to determine whether a company qualifies for insurance, as well as what the appropriate premium and coverage limits are.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Without accurate information, companies could:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Charged too high premiums,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Get a policy with limited coverage,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Or even rejected by the insurer because it is considered too risky.<\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">The Strategic Role of Brokers in the Underwriting Stage<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Brokers like L&amp;G Insurance Broker act as professional bridges between clients and insurance companies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At the underwriting level, L&amp;G helps:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Identifying clients&#8217; digital risk needs and exposures.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prepare information and supporting documents systematically.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Explain to the underwriter the nature of the client&#8217;s business and the risk mitigation measures that have been implemented.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Negotiate the best terms and premiums based on risk profile.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ensure data confidentiality during the assessment process.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">With broker assistance, the company not only looks \u201cready,\u201d but also gains more trust from insurers due to its complete and professional documentation.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Types of Information Required by Underwriters<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Each insurance company has a slightly different format, but in general, there are five major groups of information that must be prepared before a cyber policy is issued.<\/span><\/p>\n<ol>\n<li><b> General Company Information<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">This basic information is used to understand the business context and scale of the company&#8217;s operations.<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Requested Data<\/b><\/td>\n<td><b>Information<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Name, address and field of business<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Including main office and branch locations.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Number of employees<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Total and number of IT system users.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Country or region of operation<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Is the business only in Indonesia or international.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Annual turnover and net profit<\/span><\/td>\n<td><span style=\"font-weight: 400;\">To determine financial exposure.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Use of customer data<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Whether managing personal data (B2C) or internal data (B2B).<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">\ud83d\udccc<\/span><span style=\"font-weight: 400;\">L&amp;G Note: Companies that manage large amounts of personal data such as e-commerce, fintech, hospitals, or universities require higher coverage limits.<\/span><\/p>\n<ol>\n<li><b> IT Infrastructure and Security Systems<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">This section is the core of the cyber risk assessment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Underwriters want to know how strong a company&#8217;s digital defenses are.<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Aspect<\/b><\/td>\n<td><b>Sample Questions<\/b><\/td>\n<\/tr>\n<tr>\n<td>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">System Access<\/span><\/li>\n<\/ol>\n<\/td>\n<td><span style=\"font-weight: 400;\">Is the system protected with multi-factor authentication (MFA)?<\/span><\/td>\n<\/tr>\n<tr>\n<td>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Firewall and Antivirus<\/span><\/li>\n<\/ol>\n<\/td>\n<td><span style=\"font-weight: 400;\">The type of software used, as well as the last update.<\/span><\/td>\n<\/tr>\n<tr>\n<td>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Backup and Disaster Recovery<\/span><\/li>\n<\/ol>\n<\/td>\n<td><span style=\"font-weight: 400;\">Is data backed up regularly and tested for recovery?<\/span><\/td>\n<\/tr>\n<tr>\n<td>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enkripsi Data<\/span><\/li>\n<\/ol>\n<\/td>\n<td><span style=\"font-weight: 400;\">Is sensitive data encrypted during transmission and storage?<\/span><\/td>\n<\/tr>\n<tr>\n<td>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Third Party Vendor Management<\/span><\/li>\n<\/ol>\n<\/td>\n<td><span style=\"font-weight: 400;\">Do vendors have the same security standards?<\/span><\/td>\n<\/tr>\n<tr>\n<td>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Security Audit<\/span><\/li>\n<\/ol>\n<\/td>\n<td><span style=\"font-weight: 400;\">When was the last time an audit or penetration test was performed?<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">\ud83d\udccc<\/span><span style=\"font-weight: 400;\">L&amp;G Note: If your company does not yet have a formal security policy, L&amp;G can assist in drafting a summary IT Risk Statement to ensure compliance with underwriting requirements.<\/span><\/p>\n<ol>\n<li><b> History of Cyber \u200b\u200bIncidents and Preventive Actions<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Underwriters will assess how the company learns from past experiences.<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Requested Data<\/b><\/td>\n<td><b>Explanation<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Incident history<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Have there ever been data leaks, malware, or phishing?<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Loss value<\/span><\/td>\n<td><span style=\"font-weight: 400;\">How much financial loss resulted from the incident.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Corrective steps<\/span><\/td>\n<td><span style=\"font-weight: 400;\">What actions have been taken post-incident.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">\ud83d\udccc<\/span><span style=\"font-weight: 400;\">L&amp;G Note: If there was a previous incident, L&amp;G assisted the client in preparing a remediation report to demonstrate security improvements.<\/span><\/p>\n<ol>\n<li><b> Compliance and Regulation<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Regulatory compliance has become an important indicator for underwriters, especially since the enactment of Law No. 27 of 2022 concerning Personal Data Protection (PDP Law).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Aspect<\/span> <span style=\"font-weight: 400;\">Question<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Privacy Policy<\/b><\/td>\n<td><b>Does the company have a personal data protection policy (Privacy Policy)?<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Appointment of Data Protection Officer (DPO)<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Who is responsible for data security in the company?<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">ISO\/IEC 27001 Compliance<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Does the security system follow international standards?<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Report to regulator<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Are companies required to report data breaches?<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">\ud83d\udccc<\/span><span style=\"font-weight: 400;\">L&amp;G Note: Good compliance can lower premiums as it is considered an effective risk mitigation.<\/span><\/p>\n<ol>\n<li><b> Insurance Requirements (Insurance Specification)<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The latest information relates to financial needs and desired policy limits.<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Component<\/b><\/td>\n<td><b>Explanation<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Coverage Limit (Sum Insured)<\/span><\/td>\n<td><span style=\"font-weight: 400;\">The maximum total claims expected to be covered.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Deductible \/ Retention<\/span><\/td>\n<td><span style=\"font-weight: 400;\">The risk value that will be borne by the company itself.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Coverage Type<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Is it just first-party cover or does it include third-party liability?<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Coverage Countries<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Desired jurisdiction area (e.g. Asia, global, etc.).<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Optional Extensions<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Additional guarantees such as Social Engineering, Business Interruption, etc.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">\ud83d\udccc<\/span><span style=\"font-weight: 400;\">L&amp;G Note: L&amp;G will help adjust limits to realistic risks to keep premiums efficient.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Supporting Documents That Must Be Prepared<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In addition to the above data, several formal documents are often requested by insurance companies, especially for medium and large corporate clients.<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Document Type<\/b><\/td>\n<td><b>Information<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">\ud83d\udcd8<\/span><span style=\"font-weight: 400;\">Company Profile<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Summary of the company&#8217;s business and main activities.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">\ud83d\udda5\ufe0f<\/span><span style=\"font-weight: 400;\">IT Network Structure (Network Diagram)<\/span><\/td>\n<td><span style=\"font-weight: 400;\">To understand system infrastructure and critical points.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">\ud83e\udde9<\/span><span style=\"font-weight: 400;\">Information Security Policy<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Official internal policy document regarding data security.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">\ud83d\udcc4<\/span><span style=\"font-weight: 400;\"> Laporan Audit IT \/ Penetration Test Report<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Evidence that the system is tested regularly.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">\ud83e\uddfe<\/span><span style=\"font-weight: 400;\">Latest Financial Report<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Demonstrates the company&#8217;s financial capabilities.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">\ud83e\udde0<\/span><span style=\"font-weight: 400;\"> Business Continuity Plan (BCP)<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Strategies for dealing with operational disruptions and recovery.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">\ud83d\udccc<\/span><span style=\"font-weight: 400;\">L&amp;G Note: If some documents are not available, the broker can help prepare a condensed version or executive summary to avoid delaying the underwriting process.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Cyber \u200b\u200bInsurance Application Process with L&amp;G Insurance Broker Assistance<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The following are the general steps implemented by PT. Liberty and General Insurance Broker:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Level<\/b><\/td>\n<td><b>Description<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">1. Kick-off Meeting<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Initial discussions with clients to understand business models and digital risks.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">2. Risk Profiling &amp; Data Collection<\/span><\/td>\n<td><span style=\"font-weight: 400;\">L&amp;G assists in completing the insurer&#8217;s Cyber \u200b\u200bRisk Questionnaire.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">3. Gap Analysis<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Identifying areas of weakness in IT security.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">4. Market Placement<\/span><\/td>\n<td><span style=\"font-weight: 400;\">L&amp;G submitted proposals to several insurers (market comparison).<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">5. Negotiation &amp; Binding<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Negotiate the best limits, deductibles, premiums, and policy wording.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">6. Policy Delivery<\/span><\/td>\n<td><span style=\"font-weight: 400;\">The policy is issued and delivered to the client, complete with claims guidelines.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">With a professional approach and neat documentation, L&amp;G ensures clients get the best deals from the insurance market, both local and international.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Challenges Companies Often Face<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Based on L&amp;G&#8217;s experience, there are several common mistakes that often cause cyber policy applications to be delayed or rejected:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u274c<\/span><span style=\"font-weight: 400;\">Incomplete or inconsistent data between answers in the questionnaire and IT reports.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u274c<\/span><span style=\"font-weight: 400;\">Lack of evidence of security systems such as firewalls, MFA, or activity logs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u274c<\/span><span style=\"font-weight: 400;\">There is no documented disaster recovery plan.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u274c<\/span><span style=\"font-weight: 400;\">Underestimation of the risk value, for example, only requesting a small limit even though there are millions of customer data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u274c<\/span><span style=\"font-weight: 400;\">Not using a broker, so communication with the insurer is inefficient.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">\ud83d\udccc<\/span><span style=\"font-weight: 400;\">Solution: With L&amp;G assistance, all of the above can be anticipated through a pre-assessment meeting before the documents are submitted to the insurer.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Case Study: Successful Application Due to Complete Documentation<\/span><\/h3>\n<p><b>\ud83c\udfe2<\/b><b>Case 1 \u2013 National Fintech Company<\/b><\/p>\n<p><span style=\"font-weight: 400;\">L&amp;G helps fintech companies prepare complete underwriting documents, including penetration test reports.And incident response plan.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As a result, premiums can be reduced by 20% compared to other insurers&#8217; initial offers.<\/span><\/p>\n<p><b>\ud83c\udfed<\/b><b>Case 2 \u2013 Multinational Automotive Manufacturer<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Initially, it was rejected because the system didn&#8217;t have MFA. After L&amp;G helped develop a policy improvement plan, the insurer approved the policy with a three-month implementation timeline.<\/span><\/p>\n<p><b>\ud83c\udfe5<\/b><b>Case 3 \u2013 Private Hospital<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Because it stored patient data, the underwriter requested data encryption proof. L&amp;G helped the client create database encryption documentation. The policy was ultimately approved with a limit of IDR 50 billion.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Tips from L&amp;G Insurance Broker: Prepare Now<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">\u2705<\/span><span style=\"font-weight: 400;\">Conduct an IT security audit at least once a year.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2705<\/span><span style=\"font-weight: 400;\">Establish documented data security policies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2705<\/span><span style=\"font-weight: 400;\">Use multi-factor authentication across critical systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2705<\/span><span style=\"font-weight: 400;\">Backup data regularly and test recovery.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2705<\/span><span style=\"font-weight: 400;\">Involve the broker from the start so that documents are prepared according to the insurer&#8217;s needs.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Conclusion: Good Documentation = More Efficient Premiums<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The better your digital security documentation and preparedness, the lower your risk in the eyes of underwriters \u2014 and the more competitive your premiums will automatically be.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cyber \u200b\u200bInsurance is not just a financial product, but part of a company&#8217;s digital risk management strategy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With the assistance of PT. Liberty and General Insurance Broker (L&amp;G Insurance Broker), every company can navigate the underwriting process easily, quickly, and professionally\u2014without wasting time due to technical or administrative errors.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Want to know what documents you need to prepare to get your Cyber \u200b\u200bInsurance application approved quickly and efficiently?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Consult directly with PT. Liberty and General Insurance Broker (L&amp;G Insurance Broker) \u2014 a trusted independent broker for your business&#8217;s digital risk protection.<\/span><\/p>\n<hr \/>\n<p><b>HOTLINE L&amp;G 24 JAM:<\/b><a href=\"https:\/\/wa.me\/628118507773?text=Halo%20Liberty,%20Saya%20sudah%20berkunjung%20ke%20website%20lngrisk.co.id.%20Boleh%20saya%20tanya%20lebih%20jauh?\"> <b>0811-8507-773<\/b><\/a> <b>(PHONE \u2013 WHATSAPP \u2013 SMS)<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Website: lngrisk.co.id<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Email: halo@lngrisk.co.id<\/span><\/p>\n<hr \/>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Cyberattacks Are Rising Dramatically, But Many Companies Are Still Unprepared In the last 5 years, the number of cyber attacks against companies in Indonesia has increased sharply. From hacking of government websites, ransomware that paralyzes public services, to customer data leaks from various sectors \u2014 all show that digital threats are now a real risk, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":8556,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[129,357],"class_list":{"0":"post-8555","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-asuransi-cyber","8":"tag-asuransi-cyber","9":"tag-cyber-insurance"},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/8555","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/comments?post=8555"}],"version-history":[{"count":1,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/8555\/revisions"}],"predecessor-version":[{"id":8557,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/8555\/revisions\/8557"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/media\/8556"}],"wp:attachment":[{"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/media?parent=8555"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/categories?post=8555"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/tags?post=8555"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}