Need to make a claim? Find the information you are looking for here
What you'll need before you begin
Call the insurers early intervention helplines which are 24 hours
Do not hold up notifying insurers while gathering evidence
Policy number and any other relevant details about your coverage
Contact name, address, phone number, and email address
Full circumstances of how internal controls have been compromised
Police report reference
Notify us of your claim
Please select your branch from the dropdown list below, all online claims notifications will be reviewed within 48 hours. Please complete as much information as possible so that we can help process your claim. To assist with the detail, please utilise the downloadable claim form below.
Thank you for your email, a member of the claims team will endeavour to respond in the next 2 working days, if the matter is urgent, then please call the phone number aligned to your nearest branch.
Oops! Something went wrong while submitting the form.
What happens next?
Insurers will review cover subject to policy and inner limits
Confirmation from the bank confirming notification of the breach
Provide extracts from bank statements showing fraudulent payments
Supply copies of any fraudulent email(s)/invoice(s) received
Provide evidence that the payments were not legitimate
Provide any available details about the beneficiary accounts
Frequently asked claims questions
Answers to questions that you might find useful. Can't find what you're looking for? Get in touch, our dedicated claims team will be happy to help.
Do I have to pay an excess?
Yes, you will have to pay a policy excess, which is noted on your policy schedule.
How long does it take a to process a claim?
This will depend upon insurers completing investigations and prompt responses to requests for information.
Will my premium increase following a claim?
Possibly, however difficult to confirm as other claims under the policy will be considered in addition, market conditions will also be relevant and until the claim settles reserves are applied based on information available at the time.
What is cybersecurity?
Cybersecurity is a compilation of technology and network interface processes created to protect your company's network, programs, computers and data from a cyber-attack.
What constitutes a cyber-attack?
A cyber-attack is when an outside entity infiltrates your business's private network to shut down and steal your company's, your employees, and your clients, sensitive information. This stolen information can be used for ransom and disseminated to the public.
How does cyber insurance coverage work?
Cybersecurity insurance coverage includes the loss of sensitive information through a data breach after your company has permitted or failed to stop unsanctioned user access to your company network. Cyber insurance covers notification costs, litigation costs, fines and penalties.
Who is vulnerable to a cyber-attack?
Everyone is vulnerable to a cyber-attack. If you have a website or social media presence, you are a target.
Are there different types of cyber-attacks?
Yes, there are different types of cyber-attacks. Types of attacks include: the Trojan Horse, Phishing, Unpatched Software and the most well-known of them all, Malware.
What is Malware?
Malware is used to disable and damage computers and networking systems.
Is there a difference between a cyber risk and a cyber threat?
Yes. A cyber risk is the risk at which your company can lose money or sensitive information. A cyber threat includes how a cybercriminal can infiltrate your network and halt or dispense your system and its confidential information.