{"id":1213,"date":"2026-04-25T07:41:39","date_gmt":"2026-04-25T07:41:39","guid":{"rendered":"https:\/\/fundagroup.co.nz\/blog\/?p=1213"},"modified":"2026-04-25T08:10:00","modified_gmt":"2026-04-25T08:10:00","slug":"what-is-cyber-protection-insurance","status":"publish","type":"post","link":"https:\/\/fundagroup.co.nz\/blog\/what-is-cyber-protection-insurance\/","title":{"rendered":"What is cyber protection insurance?"},"content":{"rendered":"\n<p>Cyber protection insurance is designed to help protect your business from the financial impact of computer hacking or a data breach.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Who should consider it?<\/h3>\n\n\n\n<p>If your business has a website or electronic records, you are vulnerable to cyber hackers. In fact, it\u2019s likely that your business will suffer a cyber attack at some stage.<\/p>\n\n\n\n<p>A cyber attack could cost your business more than money. It could also threaten your intellectual property and put customers\u2019 personal information at risk \u2013 which could damage your reputation.<\/p>\n\n\n\n<style>\n.best-ins-area {\n    background: #e0e0e0;\n    padding: 70px 0 80px;\n}\n\n\/* Title *\/\n.best-ins-area h3 {\n    font-size: 28px;\n    font-weight: 600;\n    margin-bottom: 30px;\n    color: #333;\n}\n\n\/* Row *\/\n.custom-row {\n    display: flex;\n    gap: 20px;\n}\n\n\/* Force 4 equal cards *\/\n.custom-col {\n    width: 25%;\n    display: flex;\n}\n\n\/* Card *\/\n.card {\n    background: #fff;\n    border: 3px solid #7ac142;\n    border-radius: 6px;\n    padding: 25px;\n    width: 100%;\n    min-height: 260px;\n    display: flex;\n    flex-direction: column;\n}\n\n\/* Hover *\/\n.card:hover {\n    box-shadow: 0 5px 15px rgba(0,0,0,0.1);\n}\n\n\/* Heading *\/\n.card h3 {\n    font-size: 24px;\n    font-weight: 700;\n    margin-bottom: 15px;\n    color: #222;\n}\n\n\/* Text *\/\n.card p {\n    font-size: 15px;\n    color: #666;\n    line-height: 1.7;\n    text-align: justify;\n}\n<\/style>\n\n<div class=\"best-ins-area\">\n    <div class=\"container\">\n        <h3>Did you know?<\/h3>\n        \n        <div class=\"custom-row\">\n            \n            <div class=\"custom-col\">\n                <div class=\"card\">\n                    <h3>Tripled<\/h3>\n                    <p>New Zealand businesses with more than 20 employees nearly tripled their IT investment in security between 2018 and 2021.<\/p>\n                <\/div>\n            <\/div>\n\n            <div class=\"custom-col\">\n                <div class=\"card\">\n                    <h3>8,831<\/h3>\n                    <p>8,831 cyber security incidents were reported in New Zealand in 2021, a 13% increase on 2020.<\/p>\n                <\/div>\n            <\/div>\n\n            <div class=\"custom-col\">\n                <div class=\"card\">\n                    <h3>$16.9M<\/h3>\n                    <p>There were $16.9 million in direct financial losses from cyber-attacks in 2020. In the first quarter of 2021 alone, there were $3 million direct financial losses from cyber incidents.<\/p>\n                <\/div>\n            <\/div>\n\n            <div class=\"custom-col\">\n                <div class=\"card\">\n                    <h3>Cyber Crime<\/h3>\n                    <p>Phishing and credential harvesting remain the most reported incidents, followed by scams and fraud, then malware.<\/p>\n                <\/div>\n            <\/div>\n\n        <\/div>\n    <\/div>\n<\/div><br>\n\n\n\n<style>\n\/* Table header dark style *\/\n.table thead th {\n    background-color: #1f2a30; \/* dark black\/blue *\/\n    color: #fff;\n    font-weight: 600;\n    font-size: 16px;\n    border-color: #1f2a30;\n}\n\n\/* Optional: improve table look *\/\n.table td {\n    font-size: 15px;\n    color: #555;\n    vertical-align: middle;\n}\n\n\/* Section divider rows (grey ones) *\/\n.table tbody tr[style] td {\n    font-weight: 600;\n    color: #333;\n}\n<\/style>\n<div class=\"col-xl-12 col-lg-12\">\n                <div class=\"project-desc mb-25\">\n                    <div class=\"container\">\n                        <div class=\"table-responsive\">\n                            <table class=\"table table-bordered\">\n                                <thead class=\"thead-dark\">\n                                    <tr>\n                                        <th>Type of cover<\/th>\n                                        <th>Potential benefits<\/th>\n                                    <\/tr>\n                                <\/thead>\n                                <tbody>\n                                    <tr style=\"background: #e0e0e0;\">\n                                        <td>First-party losses<\/td>\n                                        <td><\/td>\n                                    <\/tr>\n                                    <tr>\n                                        <td>Business interruption losses<\/td>\n                                        <td>Covers financial loss you may suffer as a result of a cyber attack.<\/td>\n                                    <\/tr>\n                                    <tr>\n                                        <td>Cyber extortion<\/td>\n                                        <td>The costs of a cyber attack, such as hiring negotiation experts, covering extortion demands, and prevention of future threats.<\/td>\n                                    <\/tr>\n                                    <tr>\n                                        <td>Electronic data replacement<\/td>\n                                        <td>The costs of recovering or replacing your records and other business data.<\/td>\n                                    <\/tr>\n                                    <tr style=\"background: #e0e0e0;\">\n                                        <td>Third-party losses<\/td>\n                                        <td><\/td>\n                                    <\/tr>\n                                    <tr>\n                                        <td>Security and privacy liability<\/td>\n                                        <td>Damages to your reputation resulting from data breaches, such as loss of third-party data held on your system.<\/td>\n                                    <\/tr>\n                                    <tr>\n                                        <td>Defence costs<\/td>\n                                        <td>Funds the legal costs of defending claims.<\/td>\n                                    <\/tr>\n                                    <tr>\n                                        <td>Regulatory breach liability<\/td>\n                                        <td>Covers legal expenses and the costs of fines arising from an investigation by a government regulator.<\/td>\n                                    <\/tr>\n                                    <tr style=\"background: #e0e0e0;\">\n                                        <td>Extra expenses<\/td>\n                                        <td><\/td>\n                                    <\/tr>\n                                    <tr>\n                                        <td>Crisis management expenses<\/td>\n                                        <td>Provides cover for the costs of managing a crisis caused by cyber hackers.<\/td>\n                                    <\/tr>\n                                    <tr>\n                                        <td>Notification and monitoring expenses<\/td>\n                                        <td>The costs of notifying customers of a security breach and monitoring their credit card details to prevent further attacks.<\/td>\n                                    <\/tr>\n                                <\/tbody>\n                            <\/table>\n                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n\n\n\n<style>\n.best-ins-area {\n    background: #e0e0e0;\n    padding: 80px 0;\n}\n\n\/* Add space between left & right *\/\n.row {\n    display: flex;\n    flex-wrap: wrap;\n    gap: 40px;\n}\n\n\/* Adjust widths properly *\/\n.col-xl-4 {\n    width: 32%;\n}\n\n.col-xl-8 {\n    width: 64%;\n}\n\n\/* Headings *\/\n.best-ins-text h3 {\n    font-size: 30px;\n    font-weight: 600;\n    color: #333;\n    margin-bottom: 20px;\n}\n\n\/* Paragraph *\/\n.best-ins-text p {\n    font-size: 16px;\n    color: #666;\n    line-height: 1.8;\n    margin-bottom: 15px;\n    text-align: justify;\n}\n\n\/* List *\/\n.best-ins-text ul {\n    padding-left: 20px;\n    margin-top: 10px;\n}\n\n.best-ins-text ul li {\n    font-size: 16px;\n    color: #666;\n    margin-bottom: 10px;\n}\n\n\/* Link *\/\n.best-ins-text a {\n    color: #007bff;\n    text-decoration: none;\n}\n\n.best-ins-text a:hover {\n    text-decoration: underline;\n}\n\n\/* Responsive *\/\n@media (max-width: 991px) {\n    .col-xl-4,\n    .col-xl-8 {\n        width: 100%;\n    }\n}\n<\/style>\n\n<p><div class=\"best-ins-area gray-bg_ pt-120 pb-80\" style=\"background: #e0e0e0;\">\n    <div class=\"container\">\n        <div class=\"row\">\n            <div class=\"col-xl-4 col-lg-4\">\n                <div class=\"best-ins-text prof-content clearfix mb-40\">\n                    <h3>What usually isn&#8217;t covered?<\/h3>\n                    <p>Exclusions and the excess you need to pay can vary greatly depending on your insurer. Policies generally won&#8217;t include cover for:<\/p>\n                    <ul class=\"line_height\">\n                        <li>Damage to computer hardware.<\/li>\n                        <li>Criminal actions committed by you or your business.<\/li>\n                        <li>A cyber attack based on facts of which you were aware.<\/li>\n                        <li>Criminals using the internet to steal money from you.<\/li>\n                    <\/ul>\n                    <p align=\"justify\">There are other exclusions that your <a href=\"https:\/\/web.archive.org\/web\/20250223211750\/https:\/\/www.steadfastnz.nz\/\" target=\"_blank\">Steadfast<\/a> insurance broker can outline.<\/p>\n                <\/div>\n            <\/div>\n            <div class=\"col-xl-8 col-lg-8\">\n                <div class=\"best-ins-text prof-content clearfix mb-40\">\n                    <h3>Case Study<\/h3>\n                    <p align=\"justify\">Your employee opens an email attachment infected with a ransomware virus. Access to your systems and data are blocked, and the virus software informs you that it will remain unavailable unless you pay the ransom amount. Rather than paying the hacker and opening your business up to further extortion attempts, you hire external IT consultants to recover your back-up data and files and upgrade your antivirus software. Over the week it takes to apply these fixes, you have to close your business, causing you to lose revenue. It also affects your reputation with your clients; one of your clients threatens to sue you for the delay, which cost them a large amount of money.<\/p>\n                    <p align=\"justify\">A Cyber Protection Insurance policy allows you to recover some of the costs you incur during this incident. Depending on your policy, you may be able to make a claim for losses caused by the interruption to your business, the costs of recovering your data and upgrading your software, and ongoing crisis management expenses.<\/p>\n                <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber protection insurance is designed to help protect your business from the financial impact of computer hacking or a data breach. Who should consider it? If your business has a website or electronic records, you are vulnerable to cyber hackers. In fact, it\u2019s likely that your business will suffer a cyber attack at some stage. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1214,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,1],"tags":[],"class_list":["post-1213","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-services","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/fundagroup.co.nz\/blog\/wp-json\/wp\/v2\/posts\/1213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fundagroup.co.nz\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fundagroup.co.nz\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fundagroup.co.nz\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fundagroup.co.nz\/blog\/wp-json\/wp\/v2\/comments?post=1213"}],"version-history":[{"count":20,"href":"https:\/\/fundagroup.co.nz\/blog\/wp-json\/wp\/v2\/posts\/1213\/revisions"}],"predecessor-version":[{"id":1235,"href":"https:\/\/fundagroup.co.nz\/blog\/wp-json\/wp\/v2\/posts\/1213\/revisions\/1235"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fundagroup.co.nz\/blog\/wp-json\/wp\/v2\/media\/1214"}],"wp:attachment":[{"href":"https:\/\/fundagroup.co.nz\/blog\/wp-json\/wp\/v2\/media?parent=1213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fundagroup.co.nz\/blog\/wp-json\/wp\/v2\/categories?post=1213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fundagroup.co.nz\/blog\/wp-json\/wp\/v2\/tags?post=1213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}