Doing nothing is not an option
Cyber risks are no longer new, just like IT is not. However, many organizations are reluctant to act on control measures regarding cyber risks. As long as nothing has happened to them, the consequences of a cyber-attack or system failure is often unclear. However, since we are all increasingly dependent on IT processes, it’s unwise to do nothing. Cyber risks are here to stay.
Cyber risks? Minimize them!
DIRECT CYBER RISK
- Company downtime
- Repair costs
- Fines and claims from third parties
AVOIDABLE RISK
- Not being able to respond promptly and/or competently to an incident
- Unnecessary escalation of an incident
INDIRECT CYBER RISK
-
Reputational damage
- Loss of clients
- Bankruptcy
ACCEPTABLE RESIDUAL RISK
- You bear this risk
Get to work!
Fortunately, the right partners and solutions are available for many aspects of cyber risks. The checklist below will help you gain better insight and limit your cyber risk.
De information
/Stay in control

Cyber risks are constantly evolving. Meijers knows the way in this turbulent world which is a reassuring thought for an entrepreneur. In addition to knowledge about insuring cyber risks, we have a great deal of expertise about preventing cyber incidents and good risk management.
We would like to know more about what information you need so that you remain in control.
The attack
/Know the enemy

A common pitfall is the desire for airtight protection. That is neither possible nor necessary. It’s smarter (and cheaper) to become and to stay informed of the so-called “attack landscape”. Attack is a broad concept: it can be an error resulting in an ICT shutdown, a sudden ICT failure, an untargeted attack by a bored teenager or a targeted attack by a professional criminal organization. Additionally, you must continue to comply with laws and regulations to prevent low client confidence, damage to your image, and fines.
We are happy to talk to you about mapping out the threats specific to you so that you can take the necessary cost-effective measures.
The defence
/Make it difficult for them

Running software updates, recognizing suspicious emails or password management; these actions really make a difference. You can do a lot yourself – not only what is technical in nature. Behaviour, knowledge and adapted processes also make a major contribution. The trick is to increase your cyber security at the lowest cost possible.
Meijers has the knowledge and a large network of cyber specialists who can assist you further. We are happy to help you on your way by discussing your specific situation. Do you need a consultation?
The risk
/Insure what you can’t manage

It’s very common to shift part of the cyber risk. For example, direct damages and claims can be insured in the event of an incident. In addition, almost all insurers have a team of specialists ready to help you with the essential initial response of an incident.
We are happy to discuss your specific situation in order to make the best possible match. There is plenty to choose from a range of insurers.
The recognition
/Have an expert team ready

Quickly recognizing a cyber incident is important because it saves you time. The faster you are, the less likely the situation will escalate. The crux is finding the right balance: investing in detection options that reduce cyber risk. This consideration is not an exact science and varies from situation to situation.
We are happy to discuss your level of alertness within your organization.
The response
/Have an expert team ready

Okay, you've been hacked. It happened… Very annoying. What now? Skilful and timely intervention with a cyber incident can prevent a lot of damage. It’s a reassuring idea that you can just call a number. That is perhaps the greatest value of cyber insurance.
We know the possibilities and have personal relationships with many cyber companies in the Netherlands. We are happy to discuss your specific situation to make the best match with suitable specialists.
In the news:
Cyber experts have their say
'Internationally, we see that 1 in 5 SMEs is a victim of ransomware ...'