Terms
Cybersecurity insurance
Last updated march 21 2026
At Lynk, we view the security and availability of your data as a fundamental pillar of our partnership. To back this commitment, we maintain a multi-layered insurance structure that provides a clear safety net for both external malicious threats and internal operational risks. On this page, we share more about our comprehensive protection for Cybersecurity, which is backed by a €1,000,000 total coverage limit.
1. Cyber insurance: defense against external attacks
Our ProfessionalEdge Cyber policy with AIG Europe S.A. is specifically engineered to defend against malicious external activity. We protect our systems—and by extension, your data—against:
Hacking & Unauthorized Access: Coverage for damages resulting from third parties gaining unauthorized entry to our systems, including the use of authorized credentials by unauthorized persons.
Cyber Extortion & Ransomware: Immediate access to specialized advisors (Neil Young Associates) to mitigate threats involving data destruction, disclosure, or system encryption.
Denial of Service (DDoS): Protection against attacks specifically intended to disrupt network availability or restrict access to our services.
Malicious Software: Coverage for the transmission or receipt of malware, viruses, or malicious computercode following a security breach.
Computer Crime: Protection against direct financial loss from the theft of funds via fraudulent electronic instructions following a system hack.
2. Professional & general liability: coverage for internal errors
While our Cyber policy focuses on external threats, we maintain separate Professional Indemnity and General Liability insurance to cover operational mistakes from our own end, for more info, see: https://lynk.so/legal/liability-insurance.
3. Verified security infrastructure
Our security foundation is built on industry-leading standards and proactive technical controls:
ISO 27001 Framework: We have implemented the ISO 27001 framework, ensuring our information security management system meets rigorous international standards.
Live Trust Center: Our full suite of security policies and real-time compliance measures can be viewed live at https://trust.lynk.so/.
Endpoint Detection & Response (EDR): We have implemented an EDR (Next-Generation Antivirus) solution on all workstations and laptops. This system identifies known threats and detects unusual behavioral patterns to stop active exploits.
Multi-Factor Authentication (MFA): We enforce secure connections with MFA for all remote access, including home office work and access to email software.
Patch Management: Our team regularly implements vulnerability patches to ensure our systems remain hardened against the latest security risks.
Regular Backups: We conduct frequent backups of all critical information in accordance with our business continuity and disaster recovery plans.
Endpoint Protection: Standard security software is installed on all laptops, desktops, and email systems, supported by a formal process for following up on threat alerts.
4. Rapid incident response & recovery
In the event of a security incident, we have immediate access to world-class resources:
24/7 Expert Support: We have a direct line to the CyberEdge Hotline for immediate coordination with technical and legal advisors.
Data Reconstruction: The policy covers the professional costs of restoring or recreating electronic data and reinstalling licensed software if it becomes corrupted.
IT Forensics: Specialists are available to investigate the cause of an incident, contain the threat, and prevent future recurrences.
5. Liability & continuity protection
Data Privacy Liability: We are covered for damages and legal defense costs related to the loss of confidential information or personal data.
Service Availability: Our policy protects against loss of net income caused by a network interruption, including interruptions caused by our IT outsourcers (e.g., cloud providers).
Voluntary Protection: We are insured to perform a voluntary shutdown of our systems to prevent further data loss upon discovering a threat, ensuring we can act decisively to protect your data.
6. Policy terms
Worldwide Coverage: Our protection is global, including the U.S. and Canada.
Retroactive Peace of Mind: We maintain an unlimited retroactive period, meaning we are covered for incidents discovered now regardless of when the root cause occurred.
Retroactive Recovery: Our policy ensures that if an interruption exceeds our 8–10 hour threshold, our loss recovery applies retroactively from the very first minute of the event.
