{"id":7699,"date":"2025-09-09T08:04:30","date_gmt":"2025-09-09T01:04:30","guid":{"rendered":"https:\/\/ligaasuransi.com\/?p=7699"},"modified":"2025-09-09T08:04:30","modified_gmt":"2025-09-09T01:04:30","slug":"kenapa-asuransi-cyber-makin-penting-untuk-bisnis-anda-saat-ini-simak-alasannya","status":"publish","type":"post","link":"https:\/\/ligaasuransi.com\/en\/kenapa-asuransi-cyber-makin-penting-untuk-bisnis-anda-saat-ini-simak-alasannya\/","title":{"rendered":"Why Is Cyber \u200b\u200bInsurance Increasingly Important for Your Business Today? Here&#8217;s Why!"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Hello, friendInsurance LeagueWelcome back to our trusted education platform for insurance and risk management. This time, we&#8217;ll discuss an increasingly crucial issue in 2025: cyberattacks and their relevance to the importance of <\/span><a href=\"https:\/\/lngrisk.co.id\/bedahpolis\/bedah-polis-asuransi-siber-bagian-16-special-definitions-for-this-section-indemnity-period\/\"><span style=\"font-weight: 400;\">cyber insurance<\/span><\/a><span style=\"font-weight: 400;\">. In today&#8217;s digital world, a single click can cripple your business \u2014 unless you&#8217;re prepared for it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Today&#8217;s business world is inseparable from digital technology. From small and medium-sized enterprises to large corporations, all business activities are now directly connected to internet networks, applications, and cloud-based data storage. While this convenience increases efficiency, it also opens the door to new risks:increasingly sophisticated and detrimental digital domain attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The year 2025 will be a critical point in the digital security landscape. The emergence of technologies such as<\/span><i><span style=\"font-weight: 400;\">Artificial Intelligence (AI)<\/span><\/i><span style=\"font-weight: 400;\">, <\/span><i><span style=\"font-weight: 400;\">deepfake<\/span><\/i><span style=\"font-weight: 400;\">, and <\/span><i><span style=\"font-weight: 400;\">automated phishing<\/span><\/i><span style=\"font-weight: 400;\">Cyber \u200b\u200bthreats are evolving far faster than most companies are prepared to deal with them. In fact, cybercriminals now don&#8217;t need advanced technical skills\u2014because services are available.<\/span><i><span style=\"font-weight: 400;\">Ransomware as a Service (RaaS)<\/span><\/i><span style=\"font-weight: 400;\">can now be purchased freely on the dark web.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In Indonesia, several major incidents have begun to open the eyes of many business players. E-commerce customer data leaks, attacks on financial systems, and threats to vital infrastructure like hospitals and ports have demonstrated that digital risks know no industry boundaries.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The question now is no longer \u201cWill my business be attacked?&#8221;but&#8221;When will my business be attacked, and how prepared am I for it?\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this situation, technical protection measures alone are not enough.Businesses also need strategic protection in the form of digital security insurance., which can provide financial, legal, and reputational support when an attack occurs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this article, we&#8217;ll explore why cyber insurance will be so important in 2025, what the risks are, and how companies can begin developing a modern, comprehensive cyber risk protection strategy.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Cyber \u200b\u200bAttacks Are Becoming More Sophisticated and Affordable<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">A few years ago, cyberattacks were synonymous with bespectacled hackers in dark rooms infiltrating systems through technical loopholes. But now, the threat map has changed completely. In 2025, attacks will not only be more clever, but also much cheaper<\/span><i><span style=\"font-weight: 400;\"> and easy to do<\/span><\/i><span style=\"font-weight: 400;\">\u2014 even by individuals without special skills.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>AI-Powered Phishing &amp; Deepfake: Top Target Executives<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">One of the most dangerous trends today is the use of AI to fake the voices and faces of company leaders. This mode is known asBusiness Email b. Compromise (BEC)or more specifically: <\/span><i><span style=\"font-weight: 400;\">CEO Fraud <\/span><\/i><span style=\"font-weight: 400;\">The perpetrators used AI to impersonate the CEO&#8217;s voice and then contacted the finance department, ordering an urgent transfer of funds to an offshore account. If they weren&#8217;t careful, internal staff could be fooled by the voice sounding completely authentic.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Deepfakes are also increasingly being used to deceive<\/span><i><span style=\"font-weight: 400;\"> investors, vendors, or even regulators<\/span><\/i><span style=\"font-weight: 400;\">This is no longer a future issue \u2014 it&#8217;s happening in Asia, Europe, and even Indonesia.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Ransomware-as-a-Service (RaaS): Pay a Subscription, Attack Anyone<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Now anyone can become a digital criminal. With just USD 100\u2013300 per month, someone can hire a service.Ransomware-as-a-Service (RaaS)to attack target companies. This platform is similar to SaaS (Software as a Service), complete with a dashboard, support, and even <\/span><i><span style=\"font-weight: 400;\">helpdesk <\/span><\/i><span style=\"font-weight: 400;\">for the perpetrator.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What does it mean? Threats no longer come only from elite international hacker groups, but can be carried out by business competitors, former employees, or anonymous individuals.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Supply Chain Attack: The Domino Effect of a Single Vendor<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Companies that think their systems are secure often forget:threats can also come from vendors or technology partnersIf your ERP system provider is attacked, all client companies could be affected. This is known as supply chain attack, and the impact can be massive.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, an attack on an international logistics management software provider paralyzed hundreds of ports for days. Some of its clients even lost access to data and control of their shipments for weeks. Often, the attackers do not<\/span><i><span style=\"font-weight: 400;\"> attack you directly<\/span><\/i><span style=\"font-weight: 400;\">, but target weaker third parties.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Recent Cyber \u200b\u200bIncidents in Indonesia &amp; Globally (2025)<\/span><\/h3>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">January 2025 \u2013 Local e-commerce under attack: The data of 1.2 million customers was leaked, including names, addresses, and shopping histories. The Ministry of Communication and Information Technology (Kominfo) fined them, and a consumer lawsuit was filed in court.<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">April 2025 \u2013 Ransomware attack on a private hospital in Jakarta: The digital medical records system was inaccessible. Patient surgeries were postponed. Management had to pay billions to restore the system and its reputation.<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">May 2025 \u2013 National logistics company falls victim to supply chain breach: The shipping app crashed for three days. A major client threatened to terminate the contract. A forensic audit identified the IT vendor as the source of the incident.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The realization, digital world attacks are now increasingly sophisticated, widespread, and easily mobilizedAll companies\u2014large, small, public, and private\u2014are vulnerable to attack. Even companies that don&#8217;t store consumer data can be operationally impacted.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At this point, businesses need to ask:<\/span><\/p>\n<p><b>\u201cIf I were attacked tomorrow morning, how long could my company survive?\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">That is why protection strategies must not only be technical, but also strategic and financial.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">What are the Impacts of Digital Attacks on Companies?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Many companies still view attacks on digital components as purely a technical issue. However, the impact doesn&#8217;t stop at the IT department. In fact, when an attack occurs, the first to be hit is operational, financial, reputational, and market confidence.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are some serious impacts that business decision makers need to understand:<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Operational Disruption: Systems Down, Business Stops<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">One of the direct consequences of a cyber attack is operational system paralysisRansomware, for example, encrypts all data and locks access to internal systems.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">In some cases:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">ERP system is unusable \u2192 warehouse &amp; shipping stops.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cashier application is offline \u2192 the shop cannot serve customers.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Server down \u2192 e-commerce website is down, customers cannot make transactions.<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Losses due to this downtime can reach hundreds of millions to billions of rupiah per hour, depending on the scale of the business. Worse still, if a company doesn&#8217;t have backups and a recovery plan, recovery times can be very long.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Reputational Loss: Loss of Customer &amp; Investor Trust<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Of the digital era,reputation is a very fragile asset. A single data breach incident can destroy years of customer trust.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Consumers may stop making transactions because they feel unsafe.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Investors and business partners considered the company to be managerially incompetent.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Social media and negative news worsen public perception.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In fact, surveys show more than60% of Indonesian consumers will not return to using services from companies that experience data breaches.\u2014regardless of whether they are compensated or not.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Huge Hidden Costs<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In addition to the direct losses from business disruption, technology attacks also causeinvisible costswhich are often more expensive than the initial damage. Some of them are:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Digital forensic investigation to trace the source of the attack<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Lawyer services to face a lawsuit<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">PR and crisis communications team to reduce negative news<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Compensation costs for customers or vendors who are harmed<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">System recovery &amp; reinvestment in IT security<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">And it should be noted: all these fees must be paid in cash and immediately.If a company does not have cash reserves or insurance support, this can significantly disrupt cash flow.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Regulatory &amp; Legal Risks: Sanctions &amp; Lawsuits Increase<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Our country and many other countries are now organizing personal data protection and reporting obligationsIn Indonesia, the Personal Data Protection (PDP) Law has been actively enforced since 2024.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It means:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Companies that neglect to safeguard data can be subject to fines.administrative sanctions, fine, even criminal.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">If an incident occurs and is not reported within the specified time, the legal risks are multiplied.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Consumers can sue companies collectively.<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">At this point, many managers are just realizing that online attacks are not just a matter of data loss, but it can also lead the company into litigation, asset seizure, and even bankruptcy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">From a business perspective, cyber attacks are a total crisis. It hits from many directions\u2014not only digital, but also financial and reputational.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The solution is not just add<\/span><i><span style=\"font-weight: 400;\"> antivirus or change password<\/span><\/i><span style=\"font-weight: 400;\">. Companies need a more strategic approach:comprehensive protection that includes technical, managerial, and financial protection such as cyber insurance.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Why Is Cyber \u200b\u200bInsurance a Strategic Need?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">To address cyber risks, most companies have taken technical measures: strengthening firewalls, using encryption, setting up restricted access, and training IT teams. But modern cyberattacks not only rely on technological gaps\u2014but also on human gaps and weaknesses in business processes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Therefore, protection strategies should not stop at technical security.Companies need to build a \u201clast line of defense\u201d that can save operations, finances, and reputation when all other systems fail.This is the reason why cyber insurance is increasingly being considered as strategic<\/span><i><span style=\"font-weight: 400;\"> risk mitigation tools<\/span><\/i><span style=\"font-weight: 400;\">.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Cyber \u200b\u200bInsurance Provides Financial Protection During a Crisis<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">When a digital attack occurs, companies not only lose data or time, but also have to spend a large amount of money suddenly. By having a cybersecurity insurance policy, businesses can gain coverage for the following costs:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Data and system recovery encrypted or damaged by ransomware<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Digital forensic expert services to investigate the source and impact of the incident<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Legal fees &amp; legal aid if the company is sued by customers, regulators, or partners<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Communication crisis management, including PR services to restore reputation<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Compensation for third party losses, such as affected customers or vendors<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Lost income because the system cannot operate (business interruption)<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">It&#8217;s not just about &#8220;compensation&#8221;, but about speed of business recovery after a crisis.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Helping Management Make Quick Decisions During Incidents<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In the first 48 hours after an attack, companies are under immense pressure: customers panic, the media is asking questions, IT teams are overwhelmed, and management has to make quick decisions. In these circumstances,support from insurance providers and broker partners is vital.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cyber \u200b\u200binsurance policies usually also involve quick access to a team of incident experts, including:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><i><span style=\"font-weight: 400;\">Incident response team<\/span><\/i><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><i><span style=\"font-weight: 400;\">Digital forensics consultant<\/span><\/i><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><i><span style=\"font-weight: 400;\">Cyber security negotiator<\/span><\/i><span style=\"font-weight: 400;\">(for ransomware cases)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><i><span style=\"font-weight: 400;\">Legal advisor<\/span><\/i><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In other words, Cyber \u200b\u200binsurance doesn&#8217;t just provide money, but also a team of digital firefighters ready to step in.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>As a \u201cTrust Signal\u201d in the Digital Economy Era<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Many companies in the B2B, export-import, and digital sectors are now requiring their partners to have cyber insurance. This is part of vendor<\/span><i><span style=\"font-weight: 400;\"> compliance<\/span><\/i><span style=\"font-weight: 400;\">, especially for companies that manage customer data or critical systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Having cyber insurance shows that:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Your company is serious about operational security &amp; sustainability<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">There is a commitment to protect third parties from shared risks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The company is ready to face audits or due diligence from major partners.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Even in some international tenders,cyber insurance becomes a mandatory requirement to be able to pass verification.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Complementary to Existing IT Security Systems<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Some IT managers feel they don&#8217;t need insurance because their systems are already secure. But keep in mind:no system is 100% impenetrable.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Insurance does not replace a firewall or SOC (Security Operation Center), but protect if the system fails.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Just as firefighters don&#8217;t prevent fires, they help minimize the impact when a fire occurs.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Within the framework of risk management,insurance is the last safety net\u2014 and that&#8217;s what makes the difference between companies that can rise, and those that collapse.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Who Needs Cyber \u200b\u200bInsurance?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">There&#8217;s still a perception out there that only large tech companies need cyber protection. In reality,Any type of business that uses digital systems, stores data, or relies on online operations \u2014 is at risk.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Even MSMEs can now become targets, especially with the increasing number of random attacks using automated software.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are someBusiness profiles that are highly recommended to have cyber protection:<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Financial &amp; Fintech Companies<\/b><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Stores large amounts of customer data<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Process transactions in real-time<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Must comply with data security regulations from OJK &amp; Bank Indonesia<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The risk of financial data leaks is very high<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Examples: Digital banks, payment gateways, application-based savings and loan cooperatives<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Hospitals &amp; Healthcare Facilities<\/b><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Storing highly sensitive digital medical records<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">High dependence on hospital information systems (SIMRS)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Attacks can lead to failure of patient care<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Examples: Private hospitals, large-scale clinics, medical lab &amp; test service providers<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>E-Commerce and Digital Enterprise<\/b><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Transactions are conducted entirely online<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Stores user personal data: address, card number, shopping history<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Often a target for phishing or consumer data theft<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Examples: Marketplace, digital startup, food or service ordering application<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Logistics, Forwarders, and Supply Chain Operators<\/b><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Rely on shipping management &amp; tracking software<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The big risk of supply chain attacks<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Downtime causes logistics delays &amp; contract cancellations<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Examples: shipping companies, trucking, air cargo &amp; ports<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Manufacturing &amp; Energy Industry<\/b><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Digital system connected production automation (<\/span><i><span style=\"font-weight: 400;\">Industrial IoT<\/span><\/i><span style=\"font-weight: 400;\">)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">An attack could halt production processes for days.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Frequently targeted by ransomware attacks to \u201chold down factories\u201d<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Examples: textile factories, automotive, mining, food &amp; beverage factories<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>IEducational Institutions &amp; Public Institutions<\/b><\/li>\n<\/ol>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Store student, employee, and important academic document data<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Often have weak and out-of-date IT systems<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Vulnerable to being a target due to low protection<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Examples: universities, international schools, certification bodies<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>All Businesses That Store Third Party Data<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Even if your company is not in the technology sector, as long as it keeps:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Customer data<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Data vendor<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Digital contract &amp; transaction information<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Examples: legal consultants, travel agencies, HR agencies, outsourcing companies<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Basically, <\/span><b>Cybersecurity insurance is relevant for all businesses that are connected to digital systems.<\/b><span style=\"font-weight: 400;\">By 2025, this will mean nearly every sector\u2014from app-based bakeries to multinational corporations. And the need will only become more pressing in the future.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Conclusion and Recommendations<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">In this era, the business world has changed fundamentally. Almost all activities\u2014from internal communications, transaction recording, customer management, to marketing\u2014are carried out online.This transformation is accelerating growth, but it also opens many doors to cyber risks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And here&#8217;s the reality:Digital World attacks do not select victims based on company size.In fact, the perpetrators often target MSMEs or medium-sized businesses, which they consider &#8220;weakly defended.&#8221; They know that small to medium-sized companies often lack the necessary infrastructure.m dedicated IT, cybersecurity budget, or adequate data recovery systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On the other hand, large companies face pressure from regulators, shareholders, and market reputation. They may have sophisticated IT systems, but they are still vulnerable to human error (<\/span><i><span style=\"font-weight: 400;\">human error<\/span><\/i><span style=\"font-weight: 400;\">), phishing attacks, or third-party threats in their digital supply chain. In other words, all businesses are vulnerable.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this condition,Cybersecurity insurance can no longer be considered an additional expense that can be postponed.It is an integral part of modern risk management \u2014 a financial, reputational, and operational safeguard when the worst happens.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This insurance also helps companies recover more quickly from attacks, maintain customer trust, and meet increasingly stringent legal and regulatory obligations \u2014 such as Indonesia&#8217;s Personal Data Protection Law (PDP Law).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">L&amp;G Insurance Broker is here to provide a trusted solution, helping you design appropriate, effective, and efficient coverage. Don&#8217;t wait until problems arise. Protect your business today and ensure every customer vehicle entrusted to you is fully protected.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\ud83d\udcde Contact L&amp;G Insurance Broker now at 0811 850 7773<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Hello, friendInsurance LeagueWelcome back to our trusted education platform for insurance and risk management. This time, we&#8217;ll discuss an increasingly crucial issue in 2025: cyberattacks and their relevance to the importance of cyber insurance. In today&#8217;s digital world, a single click can cripple your business \u2014 unless you&#8217;re prepared for it. Today&#8217;s business world is [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":7700,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[129,164],"class_list":{"0":"post-7699","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-asuransi-cyber","8":"tag-asuransi-cyber","9":"tag-asuransi-keamanan-data"},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/7699","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/comments?post=7699"}],"version-history":[{"count":1,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/7699\/revisions"}],"predecessor-version":[{"id":7701,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/7699\/revisions\/7701"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/media\/7700"}],"wp:attachment":[{"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/media?parent=7699"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/categories?post=7699"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/tags?post=7699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}