Business Insurance

What Does Cyber Insurance Cover?

Understanding that you need cyber insurance is the first step. Understanding what a cyber policy actually covers, and what it does not, is where the real work begins. Cyber policies are not all built the same way. The coverage components, limits, sublimits, exclusions, and claims process vary meaningfully across carriers and policy forms. Buying a cyber policy without understanding its contents is not much better than having no policy at all, because you may be carrying false confidence about coverage that has significant gaps.

The cyber insurance market has been through considerable change over the past several years. After a period of heavy losses from ransomware, carriers tightened underwriting requirements, added sublimits for specific coverage categories, introduced waiting periods and retentions, and became more selective about which businesses they would cover and at what terms. The policy you buy today is structurally different from policies sold five years ago, and policies from different carriers today can vary more than most buyers realize.

This article breaks down the specific coverage components of a modern cyber policy, explains how each one works, covers the key exclusions you need to understand, and describes what the claims process actually looks like when you need to use the coverage. The goal is to give you enough detail to have a substantive conversation with your broker and make an informed decision about the limits and terms you are buying.

First-Party Coverage: What Cyber Insurance Pays Your Business Directly

First-party cyber coverage is the set of coverages that respond to losses your business suffers directly from a cyber incident. These are costs you incur, not claims made against you by others. The first-party side of a cyber policy is typically where the immediate, visible costs of responding to an incident are addressed, and for many businesses it represents the most urgent and tangible value of having the coverage.

Data restoration coverage pays the cost of recovering, recreating, or replacing electronic data that was destroyed, corrupted, or encrypted during a cyberattack. This includes the labor and technology costs of the restoration effort. If your backups are intact and accessible, restoration may be relatively straightforward. If your backups were also compromised, restoration can be an extremely expensive and time-consuming process involving forensic specialists and significant reconstruction effort. The coverage limit for this component should reflect the actual value and volume of data your business holds.

Business income loss coverage under a cyber policy pays for the revenue your business fails to generate while your systems are down because of a covered cyber event. Unlike property business interruption, which requires physical damage as a trigger, cyber business interruption responds to system outages caused by things like ransomware, denial of service attacks, or accidental data destruction by a covered system failure. The coverage typically applies from the time the outage exceeds the policy’s waiting period through the time your systems are fully restored, or the policy’s maximum indemnity period, whichever comes first.

Extra expense coverage pays for additional costs you incur trying to continue operating during the interruption period. If you have to rent temporary equipment, use alternative processing facilities, or pay employees overtime to accelerate recovery, those costs are covered as extra expense. The combination of lost income coverage and extra expense coverage under the first-party section is designed to put your business in roughly the same financial position it would have been in had the cyber event not occurred.

Cyber Extortion and Ransomware Payment Coverage

Ransomware is the threat that has most significantly shaped the cyber insurance market over the past half decade. Cyber extortion coverage responds when an attacker holds your data or systems hostage and demands payment as a condition of restoring access. The coverage pays for the ransom payment itself, the costs of engaging a professional hostage negotiator or ransomware specialist to handle the communication with the attacker, and the transaction costs involved in obtaining and transferring cryptocurrency.

Most cyber policies require you to notify the carrier before making a ransom payment. This requirement exists partly so the carrier can assist in the response and partly to ensure the payment does not violate any applicable sanctions laws. The U.S. Treasury’s Office of Foreign Assets Control has issued guidance making clear that paying ransom to certain sanctioned entities can itself be a legal violation, even for companies that are victims of an attack. Engaging your carrier and legal counsel before paying ensures that you navigate those considerations properly.

Whether to pay a ransom is a business decision that should be made with full information. Paying does not guarantee you get your data back in usable condition. It does not guarantee the attacker has not already exfiltrated and sold the data. It does not prevent future attacks. Some cybersecurity professionals argue that paying ransoms funds criminal operations and encourages more attacks. Others argue that for certain businesses, paying is the only practical path to operational recovery. The right answer depends on your specific situation, your business’s tolerance for operational disruption, and the specific threat actor you are dealing with.

Even when a ransom is paid and systems are restored, there may be a parallel breach response obligation if the attacker exfiltrated data before the encryption. Many ransomware groups now routinely steal data before deploying the encryption, giving them a second point of leverage. If personal information was accessed or stolen, notification obligations exist regardless of whether you paid the ransom and recovered your systems. The cyber extortion coverage and the data breach response coverage may both be triggered by the same incident.

Crisis Management and Public Relations Coverage

Cyber incidents create reputational risk alongside technical and legal risk. How your business communicates about a breach affects customer trust, partner relationships, and public perception in ways that have real long-term financial consequences. Crisis management coverage under a cyber policy pays for the costs of a specialized public relations firm to manage communications before, during, and after a cyber event becomes public.

Crisis communication for a cyber incident is a specialized skill that most businesses do not have in-house. The messaging has to navigate legal requirements around what you can and cannot say, customer relations considerations, media inquiries, and the timing pressures created by notification laws and public awareness of the incident. A firm that has handled dozens of cyber-related communications crises brings a playbook and relationships that are genuinely valuable in that moment.

Some cyber policies include access to a carrier-sponsored crisis communications firm as part of the policy, while others cover costs for a firm of your choosing up to a stated sublimit. The practical value of having a pre-vetted firm available through your carrier is that you can engage them immediately without negotiating a contract in the middle of a crisis. When an incident happens, speed matters, and anything that reduces friction in the response process is valuable.

Notification costs are closely related to crisis management. Sending legally required notifications to affected individuals, creating a dedicated call center for inquiries from affected customers, and providing credit monitoring or identity theft protection services to affected individuals are all standard response costs that cyber policies cover. For large-scale breaches affecting significant numbers of people, these costs alone can reach six or seven figures, making coverage essential rather than optional for businesses with meaningful customer data volumes.

Third-Party Coverage: Privacy and Network Security Liability

The third-party side of a cyber policy covers claims brought against your business by others who were harmed by your cyber incident. Privacy liability coverage responds to claims that your business failed to protect personal information in your care and that failure resulted in unauthorized access or disclosure. This is the coverage that responds to class action lawsuits filed by customers after a data breach, as well as individual claims from people whose data was mishandled.

Privacy liability claims have become increasingly common and increasingly expensive. Plaintiff’s attorneys have developed well-funded practices focused on cyber-related class actions, and courts have generally been receptive to these suits. Even when individual damages are small, class certification can turn a case involving thousands of affected individuals into a settlement demand in the millions. Privacy liability limits need to be set with that litigation environment in mind rather than based on an assumption that your business is too small to be a target.

Network security liability covers claims that your inadequate security allowed an attack that damaged a third party’s systems or data. If a vendor or partner claims that a vulnerability in your network was the entry point for an attack that spread to their infrastructure, that is a network security liability claim. Supply chain attacks, where attackers compromise one company to gain access to others, have made this coverage increasingly relevant for businesses that are interconnected with partners and customers through technology.

Media liability is a third-party coverage that addresses claims related to digital content: copyright infringement, defamation, and invasion of privacy arising from online publications, social media, or other digital media activities. This coverage is particularly relevant for businesses with active digital marketing, publishing, or social media operations. While it overlaps somewhat with standard media liability coverage that exists in other policy forms, having it within the cyber policy ensures consistent handling of digital-origin claims.

Regulatory Defense and Fines

Data breach events trigger regulatory obligations in addition to the direct costs of response and the third-party liability exposure. State attorneys general, federal agencies, and international regulators all have enforcement authority over how businesses handle personal data. When a breach occurs, regulatory investigations often follow, and defending those investigations is expensive regardless of the ultimate outcome.

Cyber policies cover the cost of legal counsel to respond to regulatory inquiries, investigations, and enforcement actions. This regulatory defense coverage pays for the attorneys who communicate with regulators, prepare responses to information requests, and represent your business in any formal proceedings. These engagements can run for months and cost hundreds of thousands of dollars in legal fees even when no fine is ultimately imposed.

Coverage for regulatory fines and penalties depends on whether fines are insurable in the applicable jurisdiction. Many states permit insurance coverage for regulatory fines; others do not. Where fines are insurable, cyber policies will cover them up to a stated sublimit. GDPR fines, which can reach four percent of global annual revenue, have driven significant demand for regulatory coverage from businesses with European customers or operations. The limits for regulatory coverage in a cyber policy should be calibrated against the maximum penalty exposure you face under the laws applicable to your data activities.

PCI DSS assessments, which are fines and assessment costs imposed by the payment card industry following a breach that results in compromised cardholder data, are also covered under many cyber policies. These assessments can be significant, and they come on top of any state or federal regulatory penalties. If your business processes credit or debit card transactions, PCI-related coverage is a specific line item worth confirming with your broker when reviewing a cyber policy.

Social Engineering and Funds Transfer Fraud

Social engineering coverage addresses a category of losses that sits at the intersection of cyber fraud and human manipulation. Business email compromise is the most common form: an attacker impersonates a vendor, executive, or partner via email and convinces an employee to wire funds to a fraudulent account. The money moves, the legitimate transaction is never completed, and the funds are often unrecoverable. These attacks cost U.S. businesses billions of dollars annually.

Coverage for social engineering losses varies significantly across cyber policies. Some policies cover these losses under a broad cyber fraud or funds transfer fraud provision. Others exclude them entirely or provide only limited sublimit coverage. The definitional language matters enormously here. Some policies require the fraudulent instruction to have been sent from a compromised email account, which excludes spoofed emails that appear to come from a real address but originate from an attacker’s own server. Read the coverage language carefully and ask your broker to clarify exactly which scenarios are covered.

Telephone-based social engineering, where an attacker calls your staff pretending to be a bank, vendor, or IT support person and convinces them to transfer funds or provide access credentials, may or may not be covered depending on the policy form. Verify whether your policy covers phone-based fraud separately from email-based fraud, because these are meaningfully different attack vectors that some policy forms distinguish between.

The best risk management against social engineering is procedural, not technological. A firm policy requiring verbal confirmation from a known telephone number for any wire transfer request, regardless of how the request was received, is more effective than any software solution. Carriers are beginning to require documented funds transfer verification procedures as an underwriting condition for meaningful social engineering coverage. If your business does not have a documented wire transfer approval process, implementing one is both a coverage requirement and a genuine loss prevention step.

What Cyber Insurance Does Not Cover

Understanding exclusions is as important as understanding coverage. Cyber policies exclude certain categories of loss that buyers sometimes assume are covered. War and acts of terrorism are excluded from most cyber policies, including state-sponsored cyberattacks. The attribution problem, which is the difficulty of definitively attributing an attack to a nation-state actor, has created litigation over this exclusion. Some carriers have added specific language clarifying how war exclusions apply to cyber events, while others have introduced coverage specifically for state-sponsored attacks as an endorsement.

Prior known breaches are excluded universally. If you knew about a vulnerability or an active breach before your policy’s inception date and failed to disclose it, any resulting claim will be denied. Cyber policies are written on claims-made forms, meaning the claim must be first made and reported during the policy period. Known circumstances at inception that later develop into claims are treated as if the claim existed before coverage began, and the policy does not respond. Full disclosure during the application process is not optional.

Intentional acts by the named insured or its officers are excluded. Insider threats, where an employee deliberately steals or destroys data, may be partially covered depending on how the policy defines the insured, but deliberate acts by owners or senior management are not. Infrastructure failure by a utility or internet service provider that is not caused by a covered cyber event is typically excluded. If your systems go down because your internet provider has an outage with no cyber cause, that is not a covered event.

Bodily injury and property damage caused by a cyber event may or may not be excluded depending on the policy form. As cyber systems become more integrated with physical operations, this is an increasingly important question. Industrial control systems in manufacturing, building automation, medical devices, and connected vehicles all create scenarios where a cyberattack could cause physical harm. Some cyber policies address this; others exclude it and leave it to the general liability or product liability policy to address, often creating a genuine coverage gap.

Coverage Limits, Sublimits, and Policy Structure

Cyber policies are structured with an overall aggregate limit that is the maximum the carrier will pay for all covered losses during the policy period. Within that aggregate, individual coverage components typically have their own sublimits that cap payments for specific loss types. Ransomware payments, social engineering losses, regulatory fines, and business interruption all commonly have sublimits that are lower than the policy’s overall aggregate limit.

Sublimits are where buyers frequently underestimate their exposure. A policy with a two million dollar aggregate limit sounds substantial until you realize that ransomware payments are sublimited at two hundred fifty thousand, social engineering coverage tops out at one hundred thousand, and regulatory defense has its own cap. In a significant incident involving multiple coverage components, the sublimits can be exhausted well before the overall aggregate, leaving remaining losses uncovered.

Retentions, which function like deductibles, apply per incident or per claim depending on the policy structure. Some policies have separate retentions for different coverage components, which means you may be paying multiple retentions in a complex incident. Understanding exactly how your retention structure works before you have a claim prevents unpleasant surprises about how much of the loss stays with your business before coverage kicks in.

Cyber policies are written on a claims-made basis, which means coverage applies to claims first made during the policy period regardless of when the underlying breach occurred, subject to the retroactive date. The retroactive date is the earliest date from which a breach can originate and still be covered. When you first buy cyber coverage, your retroactive date is typically the inception date of your first policy. When you renew, the retroactive date carries forward, giving you continuous prior acts coverage as long as you maintain coverage without a gap. Letting your cyber policy lapse resets your retroactive date and eliminates coverage for any breach that originated before the new policy’s inception.

How a Cyber Claim Works

When a cyber incident occurs, the first call should be to your insurance broker or directly to your carrier’s cyber incident response hotline. Most cyber insurers operate twenty-four-hour incident response hotlines specifically because cyber events do not happen on business hours. Getting the carrier notified early is not just a policy requirement; it is practically valuable because the carrier has pre-approved vendors for forensics, legal, and crisis communications who can be deployed quickly.

After notification, the carrier will assign a claim handler and typically recommend or require that you engage specific forensics and legal vendors from their panel. Using the carrier’s recommended vendors is often required to maintain coverage, though in some cases you may use your own vendors if the carrier approves them in advance. This is worth clarifying before an incident happens, particularly if you have an existing relationship with a cybersecurity firm or attorney you would want to involve.

The forensics investigation establishes the scope of the breach, the attack vector, what data was accessed, and the timeline of events. This report drives most of the subsequent decisions: which notification laws apply, who needs to be notified, what the regulatory exposure looks like, and whether third-party liability claims are likely. The quality and thoroughness of the forensic investigation matters for both response effectiveness and claims documentation.

Documentation throughout the incident is critical to a smooth claims process. Track every cost, every vendor invoice, every hour of employee time spent on response activities, and every piece of business income that is lost during the interruption period. The carrier will want to see documentation supporting every component of the claim. Businesses that maintain clean financial records and track response costs from day one of an incident have far smoother claims experiences than those that try to reconstruct costs after the fact. A cyber claim is a financial exercise as much as it is a technical one, and the documentation discipline you apply from the first hour of an incident shapes how that financial exercise resolves.