800,000+ customers
92% recommend us
30 locations
people in a data center
Home Business Cyber Insurance

Get your cyber insurance directly

Cyber insurance insures you against the consequences of incidents related to digital processes, such as viruses, hackers, system intrusions, data breaches, lost data and DDoS attacks.

Calculate the premium

Cyber attacks.

14-day cooling-off period.

Hacking.

Clear, transparent & honest advice for more than 110 years

With knowledge of every industry and a lot of know how, we provide clear, transparent & honest advice.
8.3
Based on 3699 reviews 93% recommend us.

We pick out the fine print for you

"Comparing insurance almost always pays off. Premiums may have increased or your personal situation may have changed. That's why we recommend comparing your insurance every year."

photo Bjorn

Bjorn - Expert Insurance

More than 5 years of insurance experience

Background expert photo Bjorn
Background image

All about cyber insurance

Cyber insurance insures you against the consequences of incidents related to digital processes, such as viruses, hackers, system intrusions, data breaches, lost data and DDoS attacks.

Errors during use, maintenance and in improving the ICT system are also covered by cyber insurance. By responding quickly and purposefully, damage is minimized.

Basically, cyber insurance provides global coverage (excluding USA and Canada) unless otherwise specified in the policy terms.

What is insured with cyber insurance?

This insurance covers civil liability, business interruption, crisis management costs and self-insured losses. Detailed terms and conditions are discussed below. Consider:

  • System intrusion and digital liability
  • Theft of privacy-sensitive data
  • Hacking
  • Extortion and cyber attacks

Sum insured

You can choose the insured amount. The lowest insured amount is €250,000 per occurrence, per policy year. The highest possible amount you can insure for is €2,500,000 per occurrence, per insurance year.

Liability

This insurance covers the costs, when other parties suffer damages as a result of the cyber incident for which you are liable.

Repair costs

Repair costs include the cost of repairing, replacing or restoring websites, programs or data.

Revenue loss/business loss*

Does an attack on your computer systems result in loss of income? If so, this loss is covered. In the policy conditions you can read in which cases loss of income is further compensated.
* For business loss, a waiting period of 8 hours applies.

Data breach

When privacy-sensitive data is stolen, the costs of investigations, claims by individuals and fines imposed by regulators are reimbursed.

Breach of systems or data

If your systems or data are breached, the costs of (forensic) investigations, communications and customer support will be reimbursed. Communication includes communication with customers, justice, regulators and other involved parties.
In addition, crisis management and reputation restoration costs are also covered under this insurance.

What is not covered with cyber insurance?

A number of items are excluded from coverage by default, such as:

  • Intentionally causing damage
  • When committing fraud
  • If the damage arises from data you obtained illegally
  • Damage from war, looting and government acts

In addition, the items below are not insured with cyber insurance:

  • Bodily injury and property damage
  • Contractual liability
  • Damage due to infringement of trade secrets or an intellectual property.
    This does not apply if you are held liable for a mistake regarding media.

In many cases with cyber insurance, you have a deductible. The deductible is the portion of the claim that, each time you have a loss, you must pay yourself. You can find how high this deductible is in the policy terms and conditions.

Communicating changes is important

If you apply for insurance or have a claim, you must answer questions. You must answer these questions honestly. In addition, you must do as much as you can to prevent and limit damage. Report damage as soon as possible! Furthermore, it is important to inform us if things change.

You are expected to meet a number of prevention requirements when purchasing cyber insurance. If you do not meet these prevention requirements, you may be denied or partially paid.

Compare and close easily

Through our website you can easily compare insurance policies. After entering a few details, a number of insurance policies will appear, tailored to your needs, with the corresponding premiums and policy conditions.

You can compare these. Once you have found a suitable insurance, you can purchase it directly.

Are you struggling or do you still have questions? Then you can of course always reach us by phone at 088 - 688 37 00. We will be happy to help you.

Are you prepared for cybercrime?

The impact of a cyber attack is very high. Therefore, cyber insurance is no longer a luxury in this day and age. To minimize the chances of cyber attacks, there are a number of things you can do as a business owner, such as:

  • Install software updates regularly and make sure systems are up to date.
  • Use strong passwords and make sure you have as few identical passwords as possible for different programs.
  • Make your staff aware of the risks and make clear agreements on handling customer data, among other things.

This page offers more tips on preventing cyber attacks.

The risks of cybercrime

Cyber attacks unfortunately take place daily and are not without risks. More and more Dutch companies are seeing the dangers of cybercrime. This is evident from the number of measures companies are taking to prevent a cyber attack. Due to the large increase in digital traffic, the danger of cybercrime will remain present in the coming years.

The main dangers of cybercrime include:

  • Data theft
    When customer and/or supplier data becomes public, hackers can misuse this data in a variety of ways.
  • Website (temporarily) down
    Temporary downtime of the website can lead to loss of revenue. You will not be able to reach (potential) customers temporarily.
  • High costs
    Digital fraud or personal data theft often result in enormously high costs. In addition, you will need to invest in digital security to prevent any new cyber attack.
  • Image damage
    When your company becomes a victim of cyber criminals, it creates negative publicity. This negative publicity creates image damage.

Make employees aware of hazards

The risks of digitizing businesses are quite significant. It is important that you do not underestimate the risks and also make your staff aware of the potential dangers. Employees are often not sufficiently aware of the dangers of Internet crime. For example, the same password is often used for multiple websites. In addition, software updates are delayed too long. This makes it extra easy for Internet criminals to strike. Clearly explain why it is important to use strong passwords and vary passwords. Also make clear the importance of software updates and warn about emails from unknown senders. Don't let them open e-mails or files from people they don't trust.

How to handle a cyber attack?

If you are a victim of a cyberattack, it is important to remain calm but act quickly. To do so, follow the steps below:

  1. Immediately disconnect the Internet connection
  2. Notify the IT department
  3. Back up your files
  4. Inform your bank and block any checking accounts
  5. File a police report.

What to do after a data breach?

A data breach can occur in a variety of ways. Due to cybercrime, third-party personal data may fall into the hands of criminals. If security incidents arise from this, it is called a data breach. A data breach is considered a violation of privacy laws. As a company you are, in most cases, obliged to report this to the Personal Data Authority and sometimes also to the data subjects whose data has been leaked.

The information you generally need to report immediately includes.

  • Login information, such as usernames and passwords.
  • Financial data of those involved.
  • Medical and psychological records.
  • Social data of a personal nature.

Do you fail to report a data breach when you should? Then you risk a large fine.

How does Alpina work?

As an intermediary, we are not part of any insurance company. This means that we have no financial or production obligations to the companies we work with. When comparing insurance, we consider your personal situation and specific wishes regarding coverage. Alpina makes insurance clear and fast.

Not good, money back! (14 days)

Your application for insurance is reviewed quickly, 24 hours a day, 7 days a week. You can then immediately hit the road insured with peace of mind. You don't have to worry about your old insurance either. You can cancel it with us directly online.

Supervision

Alpina complies with all legal requirements of the AFM. Thus, we have the necessary licenses and diplomas and we are affiliated with the Financial Services Complaints Institute (Kifid).

hacker insurance

Do the Basic Cyber Resilience Scan

Using 25 statements, you will find out how your company scores on the 5 basic principles of secure digital business, drawn up by the Digital Trust Center (part of the Ministry of Economic Affairs and Climate).

Receive a report and advice

After completing the scan you will receive a report, which will show to what extent you have the basics in order. If this is not the case, we will give you advice on how to get started.

Note that the report provides only an indication of your enterprise's current cyber resilience. It offers no guarantee that your enterprise is digitally secure.

Start the scan

cyber-insurance-necessary

Forms of cybercrime

Cybercriminals can attack your business online in several ways. Below is a brief overview of the common variants.

Phishing
Phishing involves an email or website asking for your personal information. This is supposedly an email sent by, for example, your bank. Never just give out personal information, such as passwords or your PIN number. Also never just click on a link in an email. When in doubt, always contact the company that allegedly sent the email.

Malware
Malware is the collective term for malicious software. When cyber criminals infect your computer with malware, they can lock your files. A virus is a well-known form of malware.

Identity fraud
Identity fraud occurs to both individuals and businesses. This involves using your identity to order products or services. Sometimes these false identities are used to carry out illegal activities.

Read more about forms of cybercrime

We can be reached via chat, WhatsApp, phone or email

Questions? Contact us if you want to know more.
We are here today until 6 p.m.

Get in touch