The Complete Cyber Insurance Buying Guide
Cyber insurance has gone from optional to non-negotiable for most businesses serious about risk management. Policies vary widely, premiums depend on factors most buyers don't fully understand, and a poorly negotiated contract can fail at exactly the moment you need it. This is a complete guide to buying, holding, and using cyber insurance, written for organizations that want their policy to actually pay out when an incident happens.
What cyber insurance actually covers
Cyber insurance policies fall into two categories: first-party and third-party coverage.
First-party coverage protects your organization directly:
- Incident response costs — forensics, legal counsel, crisis communications.
- Business interruption losses from cyber events.
- Data restoration expenses.
- Ransomware payments and negotiation costs, where legally permitted.
- Breach notification costs for affected individuals.
- Credit monitoring services for customers or employees.
Third-party coverage protects against external claims:
- Legal defense costs following a breach.
- Regulatory fines and penalties, where insurable.
- Settlements or judgments from affected parties.
- Media liability related to data breaches.
Policies may bundle both categories or offer modular selection. The specifics vary significantly between carriers, which is why reading the actual policy language, not just the marketing summary, matters.
What cyber insurance typically does not cover
- Prior known incidents. Coverage is denied if vulnerabilities or breaches existed before the policy period without disclosure.
- Failure to maintain minimum security standards. Claims are denied if represented controls (like MFA or patching schedules) were not actually implemented.
- Nation-state attacks. Some policies include war or hostile-act exclusions that apply to foreign-government cyberattacks. Court outcomes have been inconsistent.
- Third-party infrastructure outages. Cloud provider disruptions are typically not covered unless you carry specific dependent business interruption coverage.
- Intentional criminal acts by the insured. Breaches caused by malicious employees with management knowledge are excluded.
- Improvements and upgrades. Policies restore pre-incident conditions only. They do not fund security enhancements or new infrastructure.
How premiums are calculated
Industry and size establish the baseline. Healthcare, financial services, and retail pay higher premiums due to data sensitivity.
Security posture is increasingly the largest variable. Carriers assess:
- Multi-factor authentication across remote access and privileged accounts.
- Endpoint detection and response deployment.
- Tested incident response plans.
- Regular security awareness training.
- Immutable or air-gapped backups.
- Vulnerability management with patching SLAs.
- Email authentication controls (DMARC, DKIM, SPF).
Strong controls yield lower premiums. Weak controls may prevent coverage entirely. Claims history increases premiums or narrows coverage terms, especially for recent incidents. Coverage limits and deductibles are the final adjustment. Most small and mid-sized businesses carry $1M to $5M in coverage.
How to buy cyber insurance
Start with a specialist broker. A specialist understands the nuances of policy language, knows which carriers are paying claims reliably, and can negotiate terms a generalist cannot.
Get your security house in order before applying. Applications function as security assessments, and your answers become representations or warranties on the policy. Overstating security posture is the most common reason for claim denial based on material misrepresentation.
Compare at least three quotes. Evaluate incident response services, regulatory investigation coverage, definition clarity for terms like "computer system" and "security failure", social engineering and funds-transfer fraud coverage, and business interruption waiting periods.
Negotiate the panel. Most policies include pre-approved breach counsel, forensics firms, and crisis communications agencies. Request additions for your existing vendor relationships. Off-panel vendors may receive reduced or eliminated reimbursement.
Review annually. Risk profiles change with business growth, technology adoption, market expansion, and regulatory shifts.
How to file a claim and maximize your recovery
The first 48 hours determine whether your claim succeeds or fails.
Notify the carrier immediately. Most policies require notification within 72 hours of discovery, and late notification is a common denial reason.
Engage breach counsel first. Call panel counsel before IT teams or PR agencies. Communications routed through legal counsel may qualify for attorney-client privilege protection. Counsel coordinates the entire response and ensures proper documentation.
Document everything. Record all costs, decisions, and communications. Carriers require detailed documentation. Gaps create reimbursement gaps. Maintain receipts, invoices, time logs, and incident timelines.
Avoid unauthorized expenditures. Obtain written carrier approval before hiring forensics firms, engaging crisis communications, or making ransomware payments. Unauthorized expenses may not be reimbursed.
Track business interruption losses carefully. Document daily financial impact, comparing actual to projected revenue using historical data. Record temporary workaround costs, overtime, and manual process expenses. Business interruption claims are often the largest component of a cyber insurance payout, and they require the most rigorous documentation.
Red flags that your policy may not protect you
- Retroactive dates that reset annually, potentially excluding earlier incidents.
- Sub-limits too low for meaningful protection (e.g., a $100K ransomware sub-limit under a $5M aggregate).
- Vague "security failure" or "computer system" definitions that allow the carrier to argue against coverage.
- Missing dependent or contingent business interruption coverage for vendor, supplier, or cloud-provider compromises.
- "Failure to maintain" exclusions without clearly defined control requirements.
The bottom line
Cyber insurance is a critical layer of your risk management strategy, but it is not a substitute for strong security. The best outcomes come from combining a security program that reduces incident likelihood and impact with insurance that covers the residual risk. Purchase thoughtfully, document thoroughly, and review annually.