
Estimate your cyber insurance needs with our Cyber Insurance Calculator. Calculate the right levels of cover to protect your business and secure your financial livelihood.
Calculator results are estimates only and not quotes. Actual quotes will be provided by licensed brokers after you submit an enquiry.
Scope an appropriate overall limit and indicative sub‑limits for incident response, business interruption and cyber extortion. Planning tool
Work through the steps. Your inputs save in your browser as you go.
These inputs mainly influence business interruption and extortion sizing.
These inputs mainly influence breach response and regulatory/notification costs.
Better controls can reduce extortion risk assumptions.
If you have a required minimum limit, this acts as the floor.
Heads‑up: These are heuristic estimates for planning. Coverage availability and required sub‑limits vary by insurer. This is not advice or a quote.
Calculator outputs are estimates only and do not constitute quotes. Actual quotes will be provided by a licensed broker after you submit an enquiry.
Our Cyber Insurance Calculator helps Australian businesses estimate an appropriate cyber insurance limit and indicative sub-limits based on revenue, downtime risk, data exposure, payment handling and security controls. It is important because underinsuring can leave you funding incident response, business interruption and extortion losses yourself, while overinsuring can increase premiums without improving practical protection. This tool is a planning aid only, not a quote or a recommendation.
How to complete the form for the best estimate
1. Business profile
Select your industry, then enter your latest financial year annual revenue. Add an estimated daily gross profit (your best proxy for daily profit at risk if systems are down). Choose a realistic worst-case downtime scenario in days, focusing on a major incident rather than a minor outage.
2. Data and payment exposure
Choose the closest band for unique personal records stored. Then select the most sensitive data type you hold, as higher sensitivity generally increases response and liability costs. Indicate whether you process payment cards and how, because processing on your own systems typically increases exposure. Finally, select where affected individuals are located, as overseas exposure can increase regulatory and notification complexity.
3. Security posture (controls)
Answer honestly for MFA, backup quality, remote access exposure and any cyber incidents in the last three years. These inputs influence the tool’s view of likely severity and recovery costs.
4. Contractual requirement
If a customer or partner mandates a minimum limit, select it. This acts as a floor, even if your risk inputs suggest a lower figure. Choose your key dependency (SaaS, hybrid, on-prem) to reflect business interruption vulnerability.
How to interpret the results
1. Overall limit estimate: a starting point for discussions with a broker and for budgeting.
2. Suggested sub-limits: indicative allocations for incident response, business interruption and cyber extortion.
3. JSON summary: a concise snapshot you can share when requesting a formal quote.
ASIC and insurer disclosure: This calculator provides general information only and does not consider your objectives, financial situation or needs. Cover availability, wording, exclusions, waiting periods and sub-limits vary by insurer. Before acting, consider whether the information is appropriate for you and read the Product Disclosure Statement and Target Market Determination for any policy you consider, or seek advice from a licensed insurance adviser or broker.