{"id":8734,"date":"2025-10-25T13:38:34","date_gmt":"2025-10-25T06:38:34","guid":{"rendered":"https:\/\/ligaasuransi.com\/?p=8734"},"modified":"2025-10-25T13:38:34","modified_gmt":"2025-10-25T06:38:34","slug":"langkah-langkah-memilih-cyber-insurance-yang-tepat-untuk-perusahaan-anda","status":"publish","type":"post","link":"https:\/\/ligaasuransi.com\/en\/langkah-langkah-memilih-cyber-insurance-yang-tepat-untuk-perusahaan-anda\/","title":{"rendered":"Steps to Choosing the Right Cyber \u200b\u200bInsurance for Your Company"},"content":{"rendered":"<p><\/p>\n<h3><span style=\"font-weight: 400;\">Cyber \u200b\u200bRisk is Inevitable<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Every business now operates in a digital world \u2014 from internal communications, financial transactions, to storing customer data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, the greater the reliance on technology, the greater the risk of cyber attacks that can halt operations in an instant.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The latest data from the National Cyber \u200b\u200band Crypto Agency (BSSN) shows that by 2024, there will be more than 400 million cyberattacks on systems in Indonesia, including ransomware, data breaches, and social engineering.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The losses incurred could reach billions of rupiah, not including the impact on reputation and customer trust.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is where Cyber \u200b\u200bInsurance comes in \u2014 not just to compensate for losses, but also to protect the continuity of digital businesses.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As an experienced national broker, PT. Liberty and General Insurance Broker (L&amp;G Insurance Broker) helps companies assess their needs, select the right products, and ensure claims are processed effectively when risks actually occur.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Why Choosing Cyber \u200b\u200bInsurance Can&#8217;t Be Random<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Many companies purchase insurance simply because they are &#8220;following the trend,&#8221; without understanding the contents of the policy or the risk coverage.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, cyber insurance policies are highly technical and complex \u2014 each company has different needs and risk profiles.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Choosing the wrong policy can result in a claim being rejected, for example because:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">System configuration errors are considered negligence.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Data stolen by an unsecured third party vendor.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The attack occurred outside the police-protected area.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Therefore, choosing Cyber \u200b\u200bInsurance should not be done without professional assistance from a broker who understands the details of the risks, policy language, and your industry needs.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Steps to Choosing the Right Cyber \u200b\u200bInsurance<\/span><\/h3>\n<p><b>\ud83d\udd39<\/b><b>Step 1: Understand Your Business Risks and Needs<\/b><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Before purchasing insurance, companies need to conduct a risk assessment to answer important questions:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">What is the most critical data or digital asset for a business?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Does your business store customer or financial data?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do you use third party systems (vendors, cloud)?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">How big is the potential loss if the system is down for 1\u20133 days?<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Brokers like L&amp;G Insurance Broker can help create a digital risk profile (cyber risk profile) so that the protection purchased is truly relevant.<\/span><\/p>\n<p><b>\ud83d\udd39<\/b><b>Step 2: Identify the Types of Protection in Cyber \u200b\u200bInsurance<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Cyber \u200b\u200bInsurance policies typically cover two main groups:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Type of Guarantee<\/b><\/td>\n<td><b>Description<\/b><\/td>\n<td><b>Sample case<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">First Party Coverage<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Protects the company from direct losses due to attacks<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Data recovery, loss of income, ransomware payments<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Third Party Coverage<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Protecting claims from other parties due to data leaks<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Customer lawsuit due to personal data leak<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">Additional benefit details to note:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Digital Asset Restoration (data\/software recovery)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cyber Extortion (ransomware)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Business Interruption (lost revenue due to downtime)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Regulatory Fines (fines due to violations of the PDP Law)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Crisis Communication (reputation recovery)<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Not all policies offer full coverage.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The broker&#8217;s job is to ensure that all relevant risks are included in the guarantee.<\/span><\/p>\n<p><b>\ud83d\udd39<\/b><b>Step 3: Pay attention to the limitations (exclusions) in the policy.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Most claim denials occur because buyers do not read the policy exclusions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Examples of common exceptions:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The attack was carried out by an internal employee.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Disruption due to general power failure.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Disorder in storing passwords.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cyber \u200b\u200battacks carried out by states (state-sponsored attacks).<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">L&amp;G Insurance Broker will assist clientsnegotiatepolicy wording so that limits are not detrimental, especially for high-risk sectors such as banking, fintech, or digital manufacturing.<\/span><\/p>\n<p><b>\ud83d\udd39<\/b><b>Step 4: Determine the Appropriate Limit and Deductible<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Each policy has:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Limit of Liability: the maximum limit of claims that can be paid.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Deductible\/Retention: the portion of the loss that is borne by the insured.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Brokers help calculate the ideal limit based on:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Mark asset digital,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Frequency of digital transactions,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Potential recovery costs, and<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Risk of loss of income due to downtime.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">As a guide, mid-sized companies in Indonesia typically take limits between USD 500,000 \u2013 5 million, depending on system complexity and exposure.<\/span><\/p>\n<p><b>\ud83d\udd39<\/b><b>Step 5: Evaluate the Insurer&#8217;s Reputation and Capacity<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Not all insurance companies have the capacity and expertise to handle cyber claims.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">L&amp;G Insurance Broker collaborates with various local and international insurers who have good track records, such as:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Chubb, AIG, Tokio Marine, Zurich, QBE, Lloyd\u2019s Syndicates, dll.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Brokers ensure companies get:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Insurers who have real experience handling cyber claims.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Strong financial capacity to pay large claims.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Forensic support and IT response team in its policy.<\/span><\/li>\n<\/ol>\n<p><b>\ud83d\udd39<\/b><b>Step 6: Ensure Claims and Incident Response Support is Available<\/b><\/p>\n<p><span style=\"font-weight: 400;\">A good cyber policy should include:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">24-hour emergency hotline,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Digital forensics team,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Crisis legal and PR team,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Quick step guide to incident handling.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">L&amp;G Insurance Broker assists clients in:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Develop an Incident Response Plan (IRP),<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Report claims quickly and completely,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Negotiating a settlement with the insurer.<\/span><\/li>\n<\/ol>\n<p><b>\ud83d\udd39<\/b><b>Step 7: Review Regularly<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The digital environment is changing rapidly \u2014 today&#8217;s threats could be completely different next year.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Therefore, cyber policies should be reviewed every 12 months with a broker to ensure:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Limits are still relevant,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">New risks are covered,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Policy wording remains in accordance with the latest regulations such as the PDP Law.<\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Common Mistakes in Buying Cyber \u200b\u200bInsurance<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Some mistakes that companies often make in Indonesia:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Buying without risk analysis.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">\u2192 As a result, coverage does not meet needs.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Assume all police are the same.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">\u2192 Even though each insurer has different wording.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Does not involve brokers.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">\u2192 Causes difficult claims when an incident occurs.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ignoring third party (vendor) risks.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">\u2192 Many attacks come in through cloud suppliers or IT services.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Not updating the policy according to business developments.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">L&amp;G Insurance Broker helps avoid such mistakes with a thorough due diligence process before policy closing.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Case Study: Fintech Companies and Phishing Attacks<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">A fintech company in Jakarta experienced a phishing attack that resulted in the leak of 3,000 customer data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As a result:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Reputation plummeted,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Regulator fines Rp 1.2 billion,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Forensic and PR costs Rp. 800 million.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">However, because the company has Cyber \u200b\u200bInsurance facilitated by L&amp;G Insurance Broker, all investigation, legal, and crisis communication costs are covered by the insurer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Operations were restored within 10 days \u2014 and reputation was restored.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Fungsi Vital PT. Liberty and General Insurance Broker (L&amp;G)<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">As an OJK-licensed broker with extensive experience across various industry sectors, L&amp;G plays a strategic role in:<\/span><\/p>\n<p><b>\ud83d\udd38<\/b><b> 1. Risk Assessment &amp; Profiling<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Identify the type and level of the company&#8217;s digital risks.<\/span><\/p>\n<p><b>\ud83d\udd38<\/b><b> 2. Policy Design &amp; Negotiation<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Designing policy wording and negotiating the best premiums from various insurers.<\/span><\/p>\n<p><b>\ud83d\udd38<\/b><b> 3. Placement &amp; Administration<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Handle the policy closing process efficiently and transparently.<\/span><\/p>\n<p><b>\ud83d\udd38<\/b><b> 4. Claims Advocacy<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Accompanying clients throughout the claims process until payment is completed.<\/span><\/p>\n<p><b>\ud83d\udd38<\/b><b> 5. Training &amp; Awareness<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Provide training for employees on cyber risk management.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With this approach, L&amp;G becomes a strategic partner that not only sells policies, but helps companies build long-term digital resilience.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Conclusion: Investing for the Digital Future<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Cyber \u200b\u200bInsurance is more than just financial protection \u2014 it&#8217;s a critical component of a digital risk management strategy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Selecting the right policy requires in-depth analysis, legal understanding, and technical expertise, which can only be obtained through a professional broker like PT. Liberty and General Insurance Broker.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With the right Cyber \u200b\u200bInsurance, companies can:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Facing cyber attacks calmly,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Minimize financial and reputational losses,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ensuring business continuity in an increasingly risky digital world.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">In the digital age, the question is no longer \u201cif\u201d a cyberattack will happen \u2014 but \u201cwhen.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Make sure you are prepared with the right protection.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">\ud83d\udd10<\/span><span style=\"font-weight: 400;\">Protect your digital assets and business reputation today.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Consult your Cyber \u200b\u200bInsurance needs with:<\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400;\"> Liberty and General Insurance Broker (L&amp;G Insurance Broker)<\/span><\/li>\n<\/ol>\n<p><b>HOTLINE L&amp;G 24 JAM:<\/b><a href=\"https:\/\/wa.me\/628118507773?text=Halo%20Liberty,%20Saya%20sudah%20berkunjung%20ke%20website%20lngrisk.co.id.%20Boleh%20saya%20tanya%20lebih%20jauh?\"> <b>0811-8507-773<\/b><\/a> <b>(PHONE \u2013 WHATSAPP \u2013 SMS)<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Website: lngrisk.co.id<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Email: halo@lngrisk.co.id<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Cyber \u200b\u200bRisk is Inevitable Every business now operates in a digital world \u2014 from internal communications, financial transactions, to storing customer data. However, the greater the reliance on technology, the greater the risk of cyber attacks that can halt operations in an instant. The latest data from the National Cyber \u200b\u200band Crypto Agency (BSSN) shows [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":8735,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[799],"tags":[129,164],"class_list":{"0":"post-8734","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-risk-insurance","8":"tag-asuransi-cyber","9":"tag-asuransi-keamanan-data"},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/8734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/comments?post=8734"}],"version-history":[{"count":1,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/8734\/revisions"}],"predecessor-version":[{"id":8736,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/8734\/revisions\/8736"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/media\/8735"}],"wp:attachment":[{"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/media?parent=8734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/categories?post=8734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/tags?post=8734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}