Comprehensive cyber insurance solutions

DUAL’s Cyber insurance helps protect businesses from internet-based risks. This also includes vulnerabilities within IT infrastructure.

Our Cyber team bring over 50 years’ experience and are backed by a number of A-rated capacity partners, led by Liberty. DUAL UK’s Cyber insurance introduces FusionResponse, a powerful collaboration between Kennedys and SRM.

Insureds get immediate access to Kennedys’ global legal expertise (spanning 78 worldwide offices) and SRM’s technical capabilities, policyholders have a single 24/7 hotline and a proprietary triage tool. Ensuring swift incident containment, minimised legal exposure, and enhanced risk intelligence.

Your cyber cover at a glance

At DUAL, we don’t believe in a one-size-fits-all approach. We bring added value to your business by working with you to develop bespoke coverage in a way that fits most appropriately to your risk landscape.

Key coverages

Indemnity for damages, consumer redress funds, fines, penalties awarded against you in respect of a claim related to a data liability event, media liability event or a network security event.

Broad business interruption coverage to make up for lost net profits following network interruption.

Access to global 24/7 breach response services including forensics, legal representation, and reputation management.

Notification and credit monitoring costs for affected data subjects.

Protection against successful and attempted acts of extortion (e.g. ransomware).

Covers costs of replacing lost data and programmes.

Additional coverages

Remuneration for the theft of money and securities following unauthorised access by a third party or employee.

Compensation for funds lost through fraud and manipulation.

Loss of income due to an adverse media event. 

Reasonable and necessary costs to repair or replace your computer hardware. 

Discover our full coverage

Download

DUAL Cyber Breach Response - Trusted breach response specialists

We want businesses to trust us in an emergency. Our breach response hotline is open 24/7, ready to spring into action whenever it's needed.

We work closely with Kennedy’s, a global law firm, and SRM, a global technical support and cyber security consultancy provider for incident response, to manage all cyber incidents from initial notification through to resolution – FusionResponse.

The fuller breach response team includes specialist lawyers, IT forensic investigators, forensic accountants and consultants, who all have significant experience to help ensure the best possible outcome for you. Within one hour of contacting FusionResponse, an Incident Manager will contact your nominated person.

Response team and incident roadmap

When you purchase a cyber policy, what you’re really buying is a recovery plan with a pre-agreed budget for the deployment of an incident manager and specialists to assist you in the event of a claim.

DUAL UK Cyber policies will combine Kennedys’ legal excellence and global operational strength with SRM’s technical depth, delivering an integrated, data driven, commercially smart cyber incidents solution.

Capabilities:

  •  to both legal counsel (Kennedys) and Digital forensic experts (SRM) 24/7/365.
  •  via our proprietary triage tool for immediate containment and risk mitigation.
  •  between Kennedys and SRM, they organise crisis response teams, including additional Digital forensic and Data restoration, Crisis communications and Ransom negotiation partners, and local regulatory advisors.
  • Expert guidance on notifications, compliance across multiple jurisdictions, reputational protection, and litigation support.
  •  Kennedys’ and SRM’s commercially grounded approach ensures practical, jurisdiction spanning advice that balances efficiency with legal precision.

Risk appetite - UK and rest of the world

We target the following business, underwriting on a primary and excess basis.

  • Asset managers/ Investment managers

  • Banks and building societies

  • Charities

  • Construction, design, build, architects and engineers

  • Healthcare

  • Hospitality, hotels and leisure companies

  • Insurance companies/brokers

  • Logistics and distribution firms

  • Media

  • Professional services firms

    inc. accountants, solicitors and consultants.

  • Real estate companies

  • Retailers

  • Technology firms

    inc. SaaS, PaaS, IT/cyber security consultancy/cloud service.

Risk appetite - USA

We write the following business on an excess basis

  • Construction, design, build, architects and engineers

  • Insurance companies/brokers

  • Professional services firms

    inc. accountants, solicitors and consultants.

  • Real estate companies

  • Technology firms

    inc. SaaS, PaaS, IT/cyber security consultancy/cloud service.

Outside of appetite

Organisations headquartered in the following countries: China, Japan, Russia, Ukraine or Belarus, US Virgin Islands, Mexico, Nicaragua, El Savador, Costa Rica, Panama, Cuba, Brazil, Colombia, Argentina, Peru, Venezuela, Chile, Ecuador, Bolivia, Paraguay, Uruguay.

Why choose DUAL?

  • Built for speed

    When time is tight, speak to us. Our flat hierarchies and streamlined processes allow for fast decisions.

  • Focussed on your needs

    We won’t sell to you, we’ll solve with you.

  • Uncomplicating situations

    We try and make life easy. In a complex industry, we offer simple solutions.

IBUK - Cyber

Acclaimed by our peers

We are delighted to have been recognised in the 2025 Insurance Business UK Brokers on MGAs award.

Meet the team

The DUAL Cyber team has over 50 years' combined experience, including professionals with a range of technical and commercial underwriting expertise. By case underwriting each risk from a variety of perspectives, we are able to achieve the best possible results for our insureds.

Get in touch

If you are a broker or other intermediary, please use this form for all general enquiries or call us on +44 (0)20 7337 9888. Please note that DUAL is not authorised to deal directly with customers, so please direct any enquiries via your insurance broker.

Proposal forms

Helpful pre-and-post breach documents