{"id":28619,"date":"2026-04-17T01:00:09","date_gmt":"2026-04-16T17:00:09","guid":{"rendered":"https:\/\/bigband.net.my\/?p=28619"},"modified":"2026-04-19T08:45:32","modified_gmt":"2026-04-19T00:45:32","slug":"cyber-insurance-malaysia-2026","status":"publish","type":"post","link":"https:\/\/bigband.net.my\/index.php\/2026\/04\/17\/cyber-insurance-malaysia-2026\/","title":{"rendered":"Cyber Insurance Malaysia 2026"},"content":{"rendered":"\n[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||20px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#0060ae&#8221; header_font_size=&#8221;50px&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;40px||0px||false|false&#8221; custom_margin_phone=&#8221;20px||0px||false|false&#8221; header_font_size_tablet=&#8221;46px&#8221; header_font_size_phone=&#8221;42px&#8221; global_colors_info=&#8221;{}&#8221;]<h1><b>The RM 3.2 Million Question:<\/b><\/h1>\n<h1><b><span style=\"color: #f6921e;\">Does Your Business Have Cyber Insurance, and Is It Enough?<\/span>\n<\/b><\/h1>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;20px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;20px||||false|false&#8221; custom_margin_phone=&#8221;20px||||false|false&#8221; header_2_font_size_phone=&#8221;26px&#8221; global_colors_info=&#8221;{}&#8221;]<h2 style=\"text-align: center;\"><em>What Malaysian businesses need to know about cyber insurance in 2026 what it covers, what insurers now require before they will issue a policy, and how your security controls determine whether you can get coverage at all.<\/em><\/h2>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;60px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;40px||||false|false&#8221; custom_margin_phone=&#8221;40px||||false|false&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<h2><b>Insurance Exists for Risks You Cannot Eliminate. Cyber Risk Qualifies.<\/b><\/h2>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|20px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<p>Over this campaign, we have covered the tools and practices that reduce your risk of a cyberattack: layered endpoint security, multi-factor authentication, staff training, tested backup systems, and network segmentation. Every one of these measures is worth implementing. And every one of them still leaves a residual risk. Attackers are persistent, methods evolve, and no security programme is perfectly impenetrable.<\/p>\n<p>This is where cyber insurance enters the picture. Not as a substitute for security, but as the financial safety net that covers the damage when security is not enough. The average cost of a data breach in Malaysia is RM 3.2 million, according to CyberSecurity Malaysia&#8217;s 2025 Annual Report. That figure covers ransom demands, downtime, IT forensics, legal costs, PDPA regulatory exposure, and reputational damage. For most Malaysian SMEs, an uninsured breach of that magnitude is existential.<\/p>\n<p>But in 2026, cyber insurance comes with a significant caveat that most Malaysian business owners do not know: insurers are now treating the application process as a security audit. Businesses that cannot demonstrate specific technical controls are being denied coverage, offered limited policies with high exclusions, or charged premiums that price them out of meaningful protection. This post explains what the controls are, what coverage you should be looking for, and how your security posture and your insurability are now directly connected.<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; custom_padding_tablet=&#8221;||20px||false|false&#8221; custom_padding_phone=&#8221;||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f7f7f7&#8243; custom_margin=&#8221;0px||20px||false|false&#8221; custom_padding=&#8221;0px|40px|0px|40px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;30px||||false|false&#8221; custom_margin_phone=&#8221;20px||||false|false&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<div>\n<h2><b>THE STATE OF CYBER INSURANCE IN MALAYSIA IN 2026<\/b><\/h2>\n<\/div>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;||40px||false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<p>The global cyber insurance market reached an estimated USD 16.3 billion in premiums in 2025, nearly tripling in five years, according to Munich Re, cited in Falconer Security&#8217;s February 2026 analysis. In Malaysia, cyber insurance is a growing but still underpenetrated category. Etiqa and Allianz Malaysia offer cyber insurance tailored to local business needs, including coverage for ransomware, data loss, PDPA regulatory fines, and third-party liability. AIG Malaysia offers the CyberEdge solution with 24\/7 breach response access. <br \/>Source: <a href=\"https:\/\/biztechcommunity.com\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">biztechcommunity.com<\/span><\/a> and <a href=\"https:\/\/www.aig.my\/home\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">aig.my<\/span><\/a><\/p>\n<p>Malaysian businesses handling customer personal data face real financial exposure under the PDPA 2010. Under current provisions, the Department of Personal Data Protection (JPDP) can impose fines of up to RM 500,000 and imprisonment of up to three years for non-compliance. Proposed PDPA amendments under review in 2026 would introduce mandatory breach notification requirements and increase penalties significantly. For businesses subject to BNM RMiT or the Cybersecurity Act 2024, additional obligations apply. Cyber insurance that specifically covers PDPA regulatory fines and third-party liability is increasingly relevant as enforcement matures. <br \/>Source: <a href=\"https:\/\/www.contingent.com.my\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">contingent.com.my<\/span><\/a> and <a href=\"https:\/\/biztechcommunity.com\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">biztechcommunity.com<\/span><\/a><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;40px||40px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|800|||||||&#8221; text_text_color=&#8221;#0060ae&#8221; text_font_size=&#8221;44px&#8221; text_line_height=&#8221;1em&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;60px||||false|false&#8221; custom_margin_phone=&#8221;40px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_last_edited=&#8221;off|desktop&#8221; text_line_height_last_edited=&#8221;off|desktop&#8221; header_2_font_size_phone=&#8221;26px&#8221; global_colors_info=&#8221;{}&#8221;]<p style=\"text-align: center;\">RM3.2M<\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;10px|0px|20px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<p style=\"text-align: center;\"><strong>Average cost of a data breach in Malaysia, 2025<\/strong><br \/><em>CyberSecurity Malaysia Annual Report 2025<\/em><\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|800|||||||&#8221; text_text_color=&#8221;#0060ae&#8221; text_font_size=&#8221;44px&#8221; text_line_height=&#8221;1em&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;60px||||false|false&#8221; custom_margin_phone=&#8221;40px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_last_edited=&#8221;off|desktop&#8221; text_line_height_last_edited=&#8221;off|desktop&#8221; header_2_font_size_phone=&#8221;26px&#8221; global_colors_info=&#8221;{}&#8221;]<p style=\"text-align: center;\">USD16.3B<\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;10px|0px|20px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<div style=\"text-align: center;\"><strong>Global cyber insurance market premiums in 2025<\/strong><\/div>\n<div style=\"text-align: center;\"><em>Munich Re, via Falconer Security Feb 2026<\/em><\/div>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|800|||||||&#8221; text_text_color=&#8221;#0060ae&#8221; text_font_size=&#8221;44px&#8221; text_line_height=&#8221;1em&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;60px||||false|false&#8221; custom_margin_phone=&#8221;40px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_last_edited=&#8221;off|desktop&#8221; text_line_height_last_edited=&#8221;off|desktop&#8221; header_2_font_size_phone=&#8221;26px&#8221; global_colors_info=&#8221;{}&#8221;]<p style=\"text-align: center;\">82%<\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;10px|0px|20px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<p style=\"text-align: center;\"><strong>of denied claims involved organisations without MFA<\/strong><br \/><em>Coalition 2024 claims data, via MoneyGeek 2026<\/em><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||40px||false|false&#8221; custom_padding_tablet=&#8221;||20px||false|false&#8221; custom_padding_phone=&#8221;||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||20px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;30px||||false|false&#8221; custom_margin_phone=&#8221;20px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<div>\n<h2><b>What a Business Cyber Insurance Policy Covers<\/b><\/h2>\n<\/div>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<p>A well-structured cyber insurance policy for a Malaysian SME should cover both first-party costs (your own losses) and third-party liability (claims from customers, partners, and regulators). The table below summarises the main coverage categories. <br \/>Source: <a href=\"https:\/\/biztechcommunity.com\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">biztechcommunity.com<\/span><\/a> and <a href=\"https:\/\/www.moneygeek.com\/insurance\/business\/cyber\/requirements\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">moneygeek.com<\/span><\/a><br \/><span style=\"text-decoration: underline;\"><\/span><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][dvmd_table_maker tbl_column_header_count=&#8221;0&#8243; tbl_responsive_mode=&#8221;off&#8221; tbl_scrolling_active=&#8221;on&#8221; tbl_scrolling_row_sticky=&#8221;on&#8221; tbl_frame_type=&#8221;lines&#8221; tbl_frame_line_color=&#8221;#dbdbdb&#8221; tbl_frame_line_width=&#8221;2px&#8221; tbl_tcell_cell_color=&#8221;#FFFFFF&#8221; tbl_tcell_cell_align_vert=&#8221;center&#8221; tbl_rhead_cell_color=&#8221;#FFFFFF&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; tbl_tcell_text_font=&#8221;||||||||&#8221; tbl_tcell_text_text_color=&#8221;#58595b&#8221; tbl_tcell_text_font_size=&#8221;16px&#8221; tbl_chead_text_font=&#8221;||||||||&#8221; tbl_rhead_text_font=&#8221;|700|||||||&#8221; tbl_rhead_text_font_size=&#8221;18px&#8221; custom_margin=&#8221;||10px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][dvmd_table_maker_item col_label=&#8221;Coverage Category&#8221; col_content=&#8221;Coverage Category\nBusiness interruption\nRansomware and extortion costs\nIT forensics and investigation\nData recovery and restoration\nLegal costs and regulatory fines\nThird-party liability\nCrisis management and PR\nNotification costs&#8221; col_column_max_width=&#8221;0.7fr&#8221; col_tcell_cell_align_horz=&#8221;left&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/dvmd_table_maker_item][dvmd_table_maker_item col_label=&#8221;What It Pays For&#8221; col_content=&#8221;<B>What It Pays For<\/B>\nLost revenue during the period your systems are offline due to a covered incident. This is often the single largest component of a cyber loss for a Malaysian SME.\nCosts to respond to an extortion demand, including negotiation support. Note: some policies sub-limit ransomware coverage or restrict payments to sanctioned entities.\nProfessional costs to determine how the breach occurred, what data was accessed, and how to contain and remediate the attack.\nCosts to restore systems, recover data, and rebuild compromised infrastructure.\nLegal fees and PDPA regulatory fines imposed by the JPDP. This is particularly relevant for Malaysian businesses handling customer personal data.\nClaims from customers, partners, or other parties whose data was exposed in the breach. Covers damages and defence costs.\nCosts to manage public communications and protect brand reputation after a breach increasingly important for customer-facing businesses.\nCosts to notify affected individuals and regulators as required by PDPA and the proposed mandatory notification amendments.&#8221; col_column_max_width=&#8221;0.8fr&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/dvmd_table_maker_item][\/dvmd_table_maker][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<div><i><span>Important: always review sub-limits carefully. A RM 2 million policy with a RM 250,000 ransomware sub-limit means ransomware attacks max out at RM 250,000 far below the average Malaysian incident cost. The total policy limit and each sub-limit are what matter in a real claim. Source: <a href=\"https:\/\/www.moneygeek.com\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">moneygeek.com<\/span><\/a><\/span><\/i><\/div>\n<p><span style=\"text-decoration: underline;\"><\/span><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f7f7f7&#8243; custom_margin=&#8221;40px||40px||false|false&#8221; custom_padding=&#8221;0px|40px|0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text content_tablet=&#8221;<blockquote>\n<h3>Hybrid cloud is not about splitting environments arbitrarily.<\/h3>\n<br>\n<h3>It is about intentional workload placement based on risk analysis.<\/h3>\n<\/blockquote>&#8221; content_phone=&#8221;<blockquote>\n<h3>Hybrid cloud is not about splitting environments arbitrarily.<\/h3>\n<br>\n<h3>It is about intentional workload placement based on risk analysis.<\/h3>\n<\/blockquote>&#8221; content_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_line_height=&#8221;1.6em&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;30px||||false|false&#8221; custom_margin_phone=&#8221;20px||||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;|||60px|false|false&#8221; custom_padding_tablet=&#8221;|||60px|false|false&#8221; custom_padding_phone=&#8221;|||20px|false|false&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_3_font_size_tablet=&#8221;&#8221; header_3_font_size_phone=&#8221;&#8221; header_3_font_size_last_edited=&#8221;on|desktop&#8221; header_3_line_height_phone=&#8221;1.6em&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<blockquote>\n<h3><em>&#8220;In 2019, you could get a cyber insurance policy by answering a 10-question form. In 2026, underwriters are deploying their own security scanners against your external attack surface, requiring evidence of specific technical controls, and writing coverage exclusions that invalidate claims if you misrepresented your security posture. This is not a compliance exercise \u2014 it is a technical audit with financial consequences.&#8221;<\/em><\/h3>\n<p>Falconer Security \/ SecureBin.ai: Cyber Insurance Requirements 2026 | Source: <a href=\"https:\/\/securebin.ai\/blog\/cyber-insurance-requirements-2026\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">securebin.ai<\/span><\/a><\/p>\n<\/blockquote>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||20px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;60px||||false|false&#8221; custom_margin_phone=&#8221;40px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; header_2_font_size_phone=&#8221;26px&#8221; global_colors_info=&#8221;{}&#8221;]<h2><b>The 8 Security Controls Insurers Now Require in 2026<\/b><\/h2>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;10px|0px|10px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<p>Based on analysis of application forms from the top cyber insurers globally including Coalition, Beazley, Chubb, AIG, and others the following eight controls are now effectively universal requirements for any business seeking meaningful cyber insurance coverage in 2026. Businesses missing these controls face denied applications, higher premiums, reduced coverage limits, or denied claims after a breach. <br \/>Sources: <a href=\"https:\/\/securebin.ai\/blog\/cyber-insurance-requirements-2026\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">securebin.ai<\/span><\/a>, <a href=\"https:\/\/www.mis-solutions.com\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">mis-solutions.com<\/span><\/a>, and <a href=\"https:\/\/falconersecurity.com\/blog\/cyber-insurance-requirements\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">falconersecurity.com<\/span><\/a><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; header_3_font=&#8221;|700|||||||&#8221; header_3_font_size=&#8221;32px&#8221; header_3_line_height=&#8221;1.3em&#8221; background_color=&#8221;#0060ae&#8221; custom_margin=&#8221;10px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;15px|20px|10px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<h3 style=\"font-weight: 400;\"><span style=\"color: #ffffff;\"><strong>1.\tMulti-Factor Authentication (MFA) on All Critical Accounts<\/strong><\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;20px&#8221; header_3_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;10px|0px|40px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;0px|20px|0px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p><strong><span style=\"color: #ff9900;\">Why insurers require it:<\/span><\/strong> Coalition&#8217;s 2024 claims data shows 82% of denied claims involved organisations without MFA. MFA is now the single control most likely to determine whether you can get coverage at all. Microsoft reports that MFA blocks more than 99.2% of account compromise attacks.<\/p>\n<p><strong><span style=\"color: #088935;\">What they look for:<\/span><\/strong> MFA enforced on email, remote access (VPN), administrative accounts, cloud platforms, and financial systems. Insurers will ask specifically whether senior executives and IT administrators are included these are the most targeted accounts.<\/p>\n<p><strong><span style=\"color: #0c71c3;\">BigBand service:<\/span><\/strong> BigBand implements MFA across all critical systems as part of our Endpoint Security and Advanced Threat Detection services. <a href=\"https:\/\/bigband.net.my\/index.php\/bigband-endpoint-security\/\"><span style=\"text-decoration: underline;\">bigband.net.my\/bigband-endpoint-security<\/span><\/a><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; header_3_font=&#8221;|700|||||||&#8221; header_3_font_size=&#8221;32px&#8221; header_3_line_height=&#8221;1.3em&#8221; background_color=&#8221;#0060ae&#8221; custom_margin=&#8221;10px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;15px|20px|10px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<h3 style=\"font-weight: 400;\"><span style=\"color: #ffffff;\"><strong>2. Endpoint Detection and Response (EDR) on All Devices<\/strong><\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;20px&#8221; header_3_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;10px|0px|40px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;0px|20px|0px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p><strong><span style=\"color: #ff9900;\">Why insurers require it:<\/span><\/strong> Traditional antivirus is insufficient for 2026 threats. Insurers now require behavioural monitoring that detects threats in real time across every device on the network. EDR provides the audit trail insurers need to assess what happened during a breach.<\/p>\n<p><strong><span style=\"color: #088935;\">What they look for:<\/span><\/strong> EDR deployed on all laptops, desktops, and servers. Coverage of remote work devices and, for manufacturing clients, engineering workstations. Evidence that alerts are monitored and acted upon, not simply generated.<\/p>\n<p><strong><span style=\"color: #0c71c3;\">BigBand service:<\/span><\/strong> BigBand&#8217;s Advanced Threat Detection service provides EDR with 24\/7 monitoring across your entire device estate. <a href=\"https:\/\/bigband.net.my\/index.php\/bigband-advanced-threat-detection\/\"><span style=\"text-decoration: underline;\">bigband.net.my\/bigband-advanced-threat-detection<\/span><\/a><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; header_3_font=&#8221;|700|||||||&#8221; header_3_font_size=&#8221;32px&#8221; header_3_line_height=&#8221;1.3em&#8221; background_color=&#8221;#0060ae&#8221; custom_margin=&#8221;10px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;15px|20px|10px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<h3 style=\"font-weight: 400;\"><span style=\"color: #ffffff;\"><strong>3. Encrypted, Immutable, and Tested Backups <\/strong><em>(Isolated from the Main Network)<\/em><\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;20px&#8221; header_3_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;10px|0px|40px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;0px|20px|0px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p><strong><span style=\"color: #ff9900;\">Why insurers require it:<\/span><\/strong> Ransomware attackers deliberately destroy backup systems before encrypting primary data. Insurers require proof that backups cannot be deleted or altered by ransomware, and that they have actually been tested to confirm data can be recovered.<\/p>\n<p><strong><span style=\"color: #088935;\">What they look for:<\/span><\/strong> Offsite or cloud backups that are immutable (cannot be overwritten or deleted). Evidence of regular backup testing not just backup scheduling. Documentation of Recovery Point Objective (RPO) and Recovery Time Objective (RTO) targets and how they are met.<\/p>\n<p><strong><span style=\"color: #0c71c3;\">BigBand service:<\/span><\/strong> BigBand&#8217;s Backup as a Service (BaaS) delivers encrypted, immutable, offsite backups with scheduled restore testing and documented RPO\/RTO. <a href=\"https:\/\/bigband.net.my\/index.php\/bigband-backup-as-a-service\/\"><span style=\"text-decoration: underline;\">bigband.net.my\/bigband-backup-as-a-service<\/span><\/a><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; header_3_font=&#8221;|700|||||||&#8221; header_3_font_size=&#8221;32px&#8221; header_3_line_height=&#8221;1.3em&#8221; background_color=&#8221;#0060ae&#8221; custom_margin=&#8221;10px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;15px|20px|10px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<h3 style=\"font-weight: 400;\"><span style=\"color: #ffffff;\"><strong>4. Network Segmentation Between Critical Systems<\/strong><\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;20px&#8221; header_3_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;10px|0px|40px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;0px|20px|0px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p><strong><span style=\"color: #ff9900;\">Why insurers require it:<\/span><\/strong> Flat networks allow attackers who enter through a low-security device to move freely to high-value systems. Insurers require evidence that IT systems, OT systems, and backup infrastructure are isolated from each other.<\/p>\n<p><strong><span style=\"color: #088935;\">What they look for:<\/span><\/strong> Documented network architecture showing segmentation. Firewalled boundaries between user networks, server environments, and administrative systems. Separate segment for backup systems so that ransomware cannot reach them from the production environment.<\/p>\n<p><strong><span style=\"color: #0c71c3;\">BigBand service:<\/span><\/strong> BigBand&#8217;s Next-Generation Firewall with deep packet inspection and network segmentation architecture is designed to meet this requirement. <a href=\"https:\/\/bigband.net.my\/index.php\/bigband-anti-ransomware\/\"><span style=\"text-decoration: underline;\">bigband.net.my\/bigband-anti-ransomware<\/span><\/a><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; header_3_font=&#8221;|700|||||||&#8221; header_3_font_size=&#8221;32px&#8221; header_3_line_height=&#8221;1.3em&#8221; background_color=&#8221;#0060ae&#8221; custom_margin=&#8221;10px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;15px|20px|10px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<h3 style=\"font-weight: 400;\"><span style=\"color: #ffffff;\"><strong>5. A Documented and Tested Incident Response Plan<\/strong><\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;20px&#8221; header_3_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;10px|0px|40px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;0px|20px|0px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p><strong><span style=\"color: #ff9900;\">Why insurers require it:<\/span><\/strong> IBM&#8217;s 2025 Cost of a Data Breach report found that organisations with a tested incident response plan reduce breach costs by approximately USD 250,000 compared to those without one. Insurers require proof the plan exists and has been exercised.<\/p>\n<p><strong><span style=\"color: #088935;\">What they look for:<\/span><\/strong> A written plan naming specific personnel, external resources (IT forensics firm, legal counsel), and step-by-step procedures. Evidence of a tabletop exercise within the last 12 months. The plan must cover identification, containment, eradication, recovery, and post-incident review.<\/p>\n<p><strong><span style=\"color: #0c71c3;\">BigBand service:<\/span><\/strong> BigBand works with clients to develop and test incident response plans as part of our managed security advisory services. <a href=\"https:\/\/bigband.net.my\/index.php\/bigband-contact\/\"><span style=\"text-decoration: underline;\">Contact BigBand<\/span><\/a> to discuss.<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; header_3_font=&#8221;|700|||||||&#8221; header_3_font_size=&#8221;32px&#8221; header_3_line_height=&#8221;1.3em&#8221; background_color=&#8221;#0060ae&#8221; custom_margin=&#8221;10px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;15px|20px|10px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<h3 style=\"font-weight: 400;\"><span style=\"color: #ffffff;\"><strong>6. Privileged Access Management and Least-Privilege Principles<\/strong><\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;20px&#8221; header_3_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;10px|0px|40px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;0px|20px|0px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p><strong><span style=\"color: #ff9900;\">Why insurers require it:<\/span><\/strong> Attackers that compromise an account with administrative privileges can move through an entire network and disable security controls. Insurers require evidence that admin-level access is restricted to those who genuinely need it.<\/p>\n<p><strong><span style=\"color: #088935;\">What they look for:<\/span><\/strong> Documentation of who holds administrative credentials and why. Separation of day-to-day user accounts from administrative accounts, even for IT staff. Audit logs showing privileged access usage. Controls preventing privilege escalation by standard users.<\/p>\n<p><strong><span style=\"color: #0c71c3;\">BigBand service:<\/span><\/strong> BigBand&#8217;s security advisory services include access control review and implementation as part of endpoint security engagements. <a href=\"https:\/\/bigband.net.my\/index.php\/bigband-endpoint-security\/\"><span style=\"text-decoration: underline;\">bigband.net.my\/bigband-endpoint-security<\/span><\/a><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; header_3_font=&#8221;|700|||||||&#8221; header_3_font_size=&#8221;32px&#8221; header_3_line_height=&#8221;1.3em&#8221; background_color=&#8221;#0060ae&#8221; custom_margin=&#8221;10px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;15px|20px|10px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<h3 style=\"font-weight: 400;\"><span style=\"color: #ffffff;\"><strong>7. Patching and Vulnerability Management <\/strong><em>(Within 30 Days for Critical CVEs)<\/em><\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;20px&#8221; header_3_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;10px|0px|40px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;0px|20px|0px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p><strong><span style=\"color: #ff9900;\">Why insurers require it:<\/span><\/strong> Unpatched systems are the second most common initial attack vector after phishing. Some insurers now require patches for actively exploited vulnerabilities within 14 days. Running end-of-life software is a red flag that can result in coverage exclusions.<\/p>\n<p><strong><span style=\"color: #088935;\">What they look for:<\/span><\/strong> A documented patch management policy. Evidence of regular patching cycles. No end-of-life operating systems or unsupported software in production environments. For insurers using external scanners, your attack surface must be clean of known critical vulnerabilities.<\/p>\n<p><strong><span style=\"color: #0c71c3;\">BigBand service:<\/span><\/strong> BigBand&#8217;s managed security services include vulnerability scanning and patch management oversight as part of ongoing security monitoring engagements. <a href=\"https:\/\/bigband.net.my\/index.php\/bigband-contact\/\"><span style=\"text-decoration: underline;\">Contact BigBand<\/span><\/a> to discuss.<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; header_3_font=&#8221;|700|||||||&#8221; header_3_font_size=&#8221;32px&#8221; header_3_line_height=&#8221;1.3em&#8221; background_color=&#8221;#0060ae&#8221; custom_margin=&#8221;10px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;15px|20px|10px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<h3 style=\"font-weight: 400;\"><span style=\"color: #ffffff;\"><strong>8. Email Security Controls <\/strong><em>(SPF, DKIM, DMARC)<\/em><strong> and Anti-Phishing Protection<\/strong><\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;20px&#8221; header_3_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;10px|0px|40px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;0px|20px|0px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p><strong><span style=\"color: #ff9900;\">Why insurers require it:<\/span><\/strong> Phishing remains the most common initial attack vector. The FBI IC3 2024 report identified phishing and business email compromise (BEC) as causing approximately USD 2.8 billion in losses. Insurers require proof that email authentication and advanced threat protection are configured.<\/p>\n<p><strong><span style=\"color: #088935;\">What they look for:<\/span><\/strong> SPF, DKIM, and DMARC configured and enforced at DMARC p=reject or p=quarantine. Advanced email threat protection that scans attachments and links. Evidence that email security is actively managed, not set-and-forget.<\/p>\n<p><strong><span style=\"color: #0c71c3;\">BigBand service:<\/span><\/strong> BigBand&#8217;s Next-Generation Firewall and Advanced Threat Detection services include email security architecture and anti-phishing controls. <a href=\"https:\/\/bigband.net.my\/index.php\/bigband-advanced-threat-detection\/\"><span style=\"text-decoration: underline;\">bigband.net.my\/bigband-advanced-threat-detection<\/span><\/a><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||40px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;60px||||false|false&#8221; custom_margin_phone=&#8221;40px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; header_2_font_size_phone=&#8221;26px&#8221; global_colors_info=&#8221;{}&#8221;]<h2><b>Why PDPA Compliance and Cyber Insurance Are Now Inseparable<\/b><\/h2>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;10px|0px|10px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<p>Malaysia&#8217;s PDPA 2010 creates direct financial exposure for businesses that suffer a breach affecting personal data. Under current provisions, fines of up to RM 500,000 per offence are possible. Under proposed PDPA amendments being reviewed in 2026, mandatory breach notification requirements and increased penalties are on the table. For businesses in financial services, the BNM RMiT framework and for Critical Information Infrastructure operators, the Cybersecurity Act 2024 create additional obligations with their own penalty structures.<\/p>\n<p>The connection to cyber insurance is direct: most of these fines and the legal costs of defending against regulatory action are coverable under a properly structured cyber insurance policy that includes regulatory and legal liability cover. Without the insurance, the regulatory exposure sits entirely on the business owner&#8217;s balance sheet.<\/p>\n<p>The connection to security controls is equally direct: a business cannot demonstrate to a PDPA enforcement authority that it took &#8216;reasonable steps&#8217; to protect personal data if it cannot demonstrate that basic security controls MFA, endpoint protection, patching, secure backup were in place. The same controls that satisfy an insurance underwriter satisfy a regulatory auditor. Building the security programme and building the insurance case are the same activity. <br \/>Source: <a href=\"https:\/\/www.contingent.com.my\/blog\/sme-insurance-malaysia-comprehensive-guide-business-owners\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">contingent.com.my<\/span><\/a><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f7f7f7&#8243; custom_margin=&#8221;0px||20px||false|false&#8221; custom_padding=&#8221;0px|40px|0px|40px|false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;40px|0px|10px|0px|false|false&#8221; custom_margin_tablet=&#8221;30px||||false|false&#8221; custom_margin_phone=&#8221;20px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<div>\n<h2><b>YOUR CYBER INSURANCE READINESS SELF-CHECK<\/b><\/h2>\n<\/div>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|40px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<p>Review your current security posture against each of the eight controls above. For each one, ask: do we have this in place? Can we prove it? When was it last tested?<\/p>\n<p><span style=\"color: #339966;\"><strong>7 to 8 controls demonstrable:<\/strong><\/span> You are in a strong position to apply for comprehensive cyber insurance. Focus on documentation and ensuring your evidence is current and well-organised before approaching insurers.<\/p>\n<p><span style=\"color: #ff9900;\"><strong>4 to 6 controls demonstrable:<\/strong><\/span> You can likely obtain coverage, but may face higher premiums, sub-limits on ransomware, or exclusions for gaps. Prioritise MFA, EDR, and immutable backups first these three are the most heavily weighted by underwriters.<\/p>\n<p><strong><span style=\"color: #ff0000;\">Fewer than 4 controls demonstrable:<\/span><\/strong> Insurers are likely to either decline coverage or offer a very limited policy. Before approaching insurers, address the most critical gaps especially MFA, which Coalition data shows is the single most decisive control for coverage eligibility.<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||60px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;60px||||false|false&#8221; custom_margin_phone=&#8221;40px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; header_2_font_size_phone=&#8221;26px&#8221; global_colors_info=&#8221;{}&#8221;]<h2><b>A Final Word<\/b><\/h2>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;10px|0px|10px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<p>This is the tenth post in our BigBand Insights &#8211; SMI\/SME Series. Every post in this series has been written with the same intent: to give you genuinely useful information that helps you make better decisions about your business&#8217;s digital infrastructure whether you work with BigBand or not.<\/p>\n<p>We encourage you to review your cyber insurance readiness with your current IT adviser using the eight-control framework above. Ask your insurer which controls they require and whether your current posture would qualify for the coverage limits you actually need. Ask whether PDPA regulatory fines and mandatory notification costs are included in your policy. These are the questions that determine whether your insurance will actually pay out when you need it.<\/p>\n<p>If you would like a second perspective on your security posture, or if you are evaluating whether your current controls would satisfy an insurer&#8217;s underwriting requirements, BigBand is happy to offer a no-obligation conversation. We are not here to sell you insurance. We are here to help make sure that when you apply for it, your business qualifies for the coverage it genuinely needs.<\/p>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/bigband.net.my\/index.php\/bigband-contact\/\"><span style=\"text-decoration: underline;\">bigband.net.my\/bigband-contact<\/span><\/a> | Office: +60 3 5879 3933 | email: <a href=\"mailto:sales@bigband.net.my\">sales@bigband.net.my<\/a><\/strong><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>The RM 3.2 Million Question: Does Your Business Have Cyber Insurance, and Is It Enough? What Malaysian businesses need to know about cyber insurance in 2026 what it covers, what insurers now require before they will issue a policy, and how your security controls determine whether you can get coverage at all.Insurance Exists for Risks [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":28622,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"1080","footnotes":""},"categories":[38,50],"tags":[57,67,120,41,60,59,105,122,76,121,56],"class_list":["post-28619","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-business-continuity","tag-bigband","tag-businesscontinuity","tag-cyberinsurance","tag-cybersecurity","tag-databreach","tag-digitaltransformation","tag-digitaltransformation2026","tag-endpointsecurity","tag-malaysiasme","tag-mfa","tag-pdpa"],"_links":{"self":[{"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/posts\/28619","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/comments?post=28619"}],"version-history":[{"count":16,"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/posts\/28619\/revisions"}],"predecessor-version":[{"id":28718,"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/posts\/28619\/revisions\/28718"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/media\/28622"}],"wp:attachment":[{"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/media?parent=28619"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/categories?post=28619"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/tags?post=28619"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}