Cyber Insurance (Cyber Liability): Coverage, Costs & Why You Need It

Cyber Insurance (Cyber Liability): Coverage, Costs & Why You Need It

By PolicyBenchmark Editorial Team · Updated March 14, 2026

Cyber insurance — also called cyber liability insurance — protects businesses against the financial consequences of cyber attacks, data breaches, ransomware incidents, and other technology-related security events. As businesses of all sizes have become increasingly dependent on digital systems, the financial exposure from a cyber incident has grown from a theoretical risk to a near-certainty for many organizations.

The landscape of cyber risk has shifted dramatically in recent years. Cyber attacks are no longer limited to large corporations and government agencies. Small and mid-size businesses are now the primary targets of cybercriminals, who view them as having valuable data but weaker security defenses. A single data breach or ransomware attack can cost a small business tens of thousands to hundreds of thousands of dollars — an amount that can threaten the viability of the entire operation.

Cyber insurance does not replace good cybersecurity practices. Rather, it provides a financial safety net for incidents that penetrate your defenses, and it connects you with expert resources — forensic investigators, legal counsel, breach notification services, and crisis communications teams — at the moment you need them most. For small business-specific guidance, see our cyber insurance for small business guide. You can also use our cyber risk assessment tool to evaluate your exposure.

This content is for informational purposes only and does not constitute insurance advice. Always consult with a licensed insurance professional before making coverage decisions.

What Cyber Insurance Covers

Cyber insurance policies are broadly divided into two categories: first-party coverages that protect your own business, and third-party coverages that protect you from claims filed by others.

First-Party Coverage

First-party coverage addresses the direct costs your business incurs as a result of a cyber incident.

Data breach response costs — When a breach occurs, you face immediate expenses: hiring forensic investigators to determine what happened and what data was compromised, engaging legal counsel to navigate notification requirements, notifying affected individuals as required by state and federal law, providing credit monitoring services to affected customers, and setting up call centers to handle inquiries. These costs can easily reach $50,000 to $200,000 or more for a significant breach. The average cost of a data breach in the United States reached $9.48 million in 2023 according to IBM's annual report, though small business breaches typically fall in the $25,000 to $200,000 range.

Business interruption — When a cyber attack takes your systems offline, cyber insurance covers the lost income and extra expenses you incur during the period of restoration. Ransomware attacks, denial-of-service attacks, and destructive malware can halt business operations for days or weeks. Business interruption coverage replaces the revenue you would have earned and covers additional costs incurred to maintain operations — such as temporary systems, overtime labor, and outsourced services.

Ransomware and cyber extortion — Ransomware attacks encrypt your files and demand payment for the decryption key. Cyber extortion goes further, with attackers threatening to publish stolen data, disrupt operations, or launch additional attacks unless payment is made. Cyber insurance covers ransom payments (where legally permitted), negotiation costs, and the cost of restoring systems and data from backups. The average ransomware payment exceeded $1.5 million in 2024 according to Sophos research, though many incidents are resolved through restoration rather than payment.

Data restoration — Recovering or recreating data that was destroyed, corrupted, or rendered inaccessible by a cyber attack. This includes the cost of restoring from backups, rebuilding databases, and recreating lost files.

System damage and repair — Repairing or replacing hardware, software, and network infrastructure damaged by a cyber attack. This includes the cost of reimaging infected systems, replacing compromised hardware, and rebuilding network configurations.

Crisis management and public relations — Managing the reputational fallout from a cyber incident, including hiring PR firms to handle communications, issuing public statements, and managing media inquiries. The reputational damage from a poorly handled breach can persist long after the technical issues are resolved.

Social engineering and funds transfer fraud — Many policies now include coverage for losses resulting from social engineering attacks — such as business email compromise (BEC) schemes where an attacker impersonates a vendor or executive to trick an employee into wiring funds to a fraudulent account. BEC attacks accounted for over $2.9 billion in reported losses in 2023 according to the FBI's Internet Crime Report.

Third-Party Coverage

Third-party coverage protects your business from claims, lawsuits, and regulatory actions filed by others as a result of a cyber incident.

Privacy liability — Lawsuits from individuals, classes of individuals, or businesses whose personal or confidential information was compromised in a breach. These claims allege that your failure to adequately protect data resulted in harm. Class action lawsuits following major breaches regularly result in settlements ranging from tens of millions to hundreds of millions of dollars for large companies, though small business claims are typically resolved for much less.

Regulatory fines and penalties — Government agencies at the federal and state level can impose fines and penalties for data protection failures. HIPAA violations can result in fines of $100 to $50,000 per record, up to $2.1 million per violation category per year. State attorneys general can pursue enforcement actions under state data breach notification and consumer protection laws. The EU's GDPR imposes fines of up to 4% of annual global revenue. Cyber insurance covers the costs of regulatory defense and, where insurable, the fines themselves.

Network security liability — Claims arising from your network being used to transmit malware, launch attacks against third parties, or otherwise cause harm to others. If a compromised system in your network is used to attack a vendor's or client's systems, the affected parties can file claims against your business.

Media liability — Some cyber policies include coverage for claims arising from electronic content, including copyright infringement, defamation, and invasion of privacy in your digital publications, website content, or social media posts.

What Cyber Insurance Does Not Cover

Understanding what falls outside the scope of cyber insurance is essential for managing expectations and identifying coverage gaps:

  • Prior known incidents — Breaches or security events you were aware of before the policy inception date are excluded.
  • Intentional acts — Cyber attacks or data breaches you deliberately cause or facilitate are not covered.
  • Unencrypted device losses in some policies — Some insurers exclude or limit coverage for data breaches resulting from lost or stolen unencrypted devices, viewing encryption as a baseline security requirement.
  • Infrastructure and utility failures — Outages caused by failures in power grids, internet service providers, or other third-party infrastructure may be excluded unless specifically endorsed.
  • War and nation-state attacks — Many policies contain war exclusions that may apply to cyber attacks attributed to nation-state actors. This exclusion has become increasingly contentious as the line between criminal hacking and state-sponsored cyber warfare blurs. Some insurers have begun clarifying or narrowing their war exclusions in response to industry pressure.
  • Outdated or unsupported software — Some policies exclude claims arising from the use of software that is no longer supported by its vendor (such as Windows operating systems past their end-of-life date).
  • Contractual penalties — Penalties you owe under contract — such as service level agreement (SLA) penalties — are typically excluded, as they represent a business risk rather than an insurable loss.
  • Future lost revenue — While business interruption during the active incident period is covered, long-term revenue losses from reputational damage or customer churn are generally not.
  • Betterment — Insurers will restore your systems to their pre-incident state but will not pay for upgrades or improvements beyond your prior security posture.

The Growing Cyber Threat to Small Businesses

Small and mid-size businesses face a disproportionate cyber threat relative to their preparedness and resources:

43% of cyber attacks target small businesses, according to research from Verizon's Data Breach Investigations Report. Attackers view small businesses as having valuable data — customer records, payment information, employee Social Security numbers — combined with weaker security controls than large enterprises.

60% of small businesses that experience a significant cyber attack go out of business within six months, according to the U.S. National Cyber Security Alliance. The combination of direct costs, business interruption, and reputational damage can overwhelm a small business's financial resources.

The average cost of a data breach for businesses with fewer than 500 employees was $3.31 million in 2023, according to IBM. Even smaller incidents typically cost $25,000 to $200,000 when accounting for forensic investigation, legal counsel, notification costs, credit monitoring, and lost business.

Ransomware attacks increased 68% in 2023, with small businesses experiencing the fastest growth in attack volume. The average downtime from a ransomware attack is 24 days, during which many businesses cannot serve customers, process orders, or access critical systems.

Business email compromise (BEC) is the most financially damaging cyber crime type, accounting for $2.9 billion in reported losses in 2023. BEC attacks use social engineering to trick employees into transferring funds or sharing sensitive information, and they do not require sophisticated technical capabilities to execute.

Regulatory enforcement is increasing — State attorneys general have become more aggressive in pursuing data breach enforcement actions against businesses of all sizes. The patchwork of 50 different state data breach notification laws means that a single breach affecting customers in multiple states can trigger multiple compliance obligations and enforcement risks.

How Much Does Cyber Insurance Cost

Most small businesses pay between $1,000 and $5,000 per year for a cyber insurance policy with limits of $1 million per incident and $1 million aggregate. Costs vary based on industry, data volume, security posture, revenue, and coverage scope.

Approximate annual premiums by business size and industry:

| Business Profile | Typical Annual Premium | |---|---| | Small professional services (under $1M revenue) | $750 – $2,000 | | Small retail / e-commerce | $1,000 – $2,500 | | Healthcare practice (HIPAA-regulated) | $2,000 – $5,000 | | Technology / SaaS company | $1,500 – $4,000 | | Financial services | $2,500 – $7,000 | | Mid-size business ($5M–$25M revenue) | $3,000 – $10,000 | | Mid-size business ($25M–$100M revenue) | $10,000 – $50,000 | | Large enterprise (over $100M revenue) | $50,000 – $500,000+ |

Over the past several years, cyber insurance premiums have experienced significant volatility. Premiums surged 50–100% between 2020 and 2022 as ransomware claims skyrocketed. Since 2023, rates have stabilized and even declined modestly as insurers have become more sophisticated in underwriting cyber risk and as businesses have improved their security controls.

Factors That Affect Cyber Insurance Pricing

Insurers evaluate a range of factors when pricing cyber insurance. Understanding these factors helps businesses anticipate costs and identify areas where security improvements can reduce premiums.

Industry and regulatory environment — Healthcare, financial services, and other heavily regulated industries pay more due to higher breach costs, regulatory fines, and compliance complexity. Retail and e-commerce businesses that process payment card data also face elevated pricing.

Revenue and data volume — Larger businesses with more customer records, higher transaction volumes, and greater revenue face higher premiums. Revenue serves as a proxy for both exposure and the potential scope of a breach.

Security controls in place — This is one of the most impactful pricing factors. Insurers evaluate your cybersecurity posture through application questions or, increasingly, through external security scans and assessments. Key controls that affect pricing include:

  • Multi-factor authentication (MFA) on all remote access, email, and privileged accounts
  • Endpoint detection and response (EDR) tools deployed across all systems
  • Regular, tested data backups stored offline or in immutable cloud storage
  • Employee security awareness training conducted at least annually
  • Email filtering and anti-phishing controls
  • Patch management processes that keep systems updated
  • Incident response plan documented and tested
  • Network segmentation separating critical systems
  • Privileged access management controls

Claims history — Prior cyber incidents or claims increase premiums. Businesses with a history of breaches are viewed as higher risk.

Coverage limits and retention — Higher limits and lower retentions (deductibles) increase premiums. A policy with $2M limits will cost more than one with $1M limits, and a $5,000 retention will cost more than a $25,000 retention.

Policy scope — Policies that include social engineering coverage, dependent business interruption (coverage for disruptions at your key vendors), and full regulatory defense and fines coverage cost more than bare-bones policies.

How to Qualify for Better Cyber Insurance Rates

Insurers increasingly differentiate pricing based on security maturity. Businesses that invest in foundational cybersecurity controls not only reduce their actual risk but also qualify for more competitive insurance terms.

Implement multi-factor authentication (MFA) — MFA on email, remote access, and privileged accounts is now a baseline requirement for most cyber insurers. Many carriers will decline coverage entirely if MFA is not in place. Implementing MFA is often the single most impactful step a business can take to both improve security and reduce insurance costs.

Deploy endpoint detection and response (EDR) — Traditional antivirus is no longer sufficient. EDR solutions provide continuous monitoring, threat detection, and automated response capabilities that significantly reduce the likelihood and impact of breaches. Most cyber insurers now ask specifically about EDR deployment.

Maintain tested backups — Regular data backups stored offline or in immutable cloud storage provide the ability to recover from ransomware attacks without paying a ransom. Insurers view tested backup procedures as a critical risk reduction measure. The key qualifier is "tested" — backups that have never been verified may fail when needed most.

Conduct employee training — Human error remains the leading cause of data breaches. Regular security awareness training — including simulated phishing exercises — reduces the likelihood of employees falling for social engineering attacks. Many insurers offer premium credits for documented training programs.

Develop an incident response plan — A written incident response plan that identifies roles, communication procedures, and recovery steps enables faster and more effective breach response. Plans that have been tested through tabletop exercises are valued even more highly by underwriters.

Keep systems patched and updated — Unpatched software vulnerabilities are a primary attack vector. Demonstrating a disciplined patch management process — particularly for critical and internet-facing systems — improves your risk profile.

Perform regular vulnerability assessments — Periodic vulnerability scanning and penetration testing identify weaknesses before attackers do. Sharing assessment results and remediation efforts with your insurer demonstrates proactive risk management.

First-Party vs. Third-Party Coverage Explained

Understanding the distinction between first-party and third-party cyber coverage helps you evaluate whether a policy adequately addresses your specific risks.

| Aspect | First-Party Coverage | Third-Party Coverage | |---|---|---| | Who benefits | Your business directly | Others who file claims against you | | What triggers it | A cyber incident affecting your systems or data | A claim, lawsuit, or regulatory action by a third party | | Common costs covered | Breach response, business interruption, ransomware, data restoration | Legal defense, settlements, regulatory fines | | Who needs it most | All businesses with digital operations | Businesses that store third-party data, provide tech services, or face regulatory obligations | | Example scenario | Ransomware encrypts your files; you pay for restoration and lost income | Customer data is stolen; affected individuals file a class action lawsuit |

Most standalone cyber insurance policies include both first-party and third-party coverages. However, the specific sub-limits, retentions (deductibles), and scope of coverage within each category can vary significantly between policies. Some endorsements — such as social engineering coverage, dependent business interruption, and regulatory fines — may need to be added explicitly.

When evaluating policies, pay particular attention to:

Sub-limits — Some first-party coverages may have sub-limits lower than the overall policy limit. For example, a policy with a $1 million aggregate limit might sub-limit ransomware payments to $250,000 or social engineering losses to $100,000. Ensure the sub-limits match your exposure.

Waiting periods — Business interruption coverage typically includes a waiting period (often 8–12 hours) before coverage begins. Shorter waiting periods provide more protection but may increase premiums.

Retroactive dates — Like professional liability, many cyber policies are written on a claims-made basis with retroactive dates. Verify the retroactive date covers the period you need, particularly when switching carriers.

Dependent business interruption — Standard business interruption covers disruptions to your own systems. Dependent business interruption extends coverage to disruptions at key third-party providers — your cloud hosting provider, payment processor, or critical software vendor. As businesses increasingly rely on cloud services and SaaS platforms, this coverage has become more important.

Frequently Asked Questions

Does my general liability or BOP cover cyber incidents?

Standard [general liability](/insurance/general-liability/) and [business owners policies (BOPs)](/insurance/business-owners-policy/) do not provide meaningful cyber coverage. While some BOPs offer a limited data breach endorsement, these endorsements typically provide very low limits ($10,000–$50,000), cover only a narrow range of incident types, and exclude critical coverages like business interruption, ransomware, and regulatory defense. Businesses with any meaningful cyber exposure may want to consider a standalone cyber insurance policy for adequate protection.

Is cyber insurance worth it for small businesses?

The financial math is straightforward: a small business can expect to pay $1,000 to $3,000 per year for cyber insurance, while the average cost of a data breach for a business with fewer than 500 employees exceeds $3 million. Even a relatively minor incident — such as a BEC attack, a localized ransomware event, or a small database breach — can cost $25,000 to $100,000 when accounting for forensic investigation, legal counsel, notification costs, and lost business. Beyond the financial protection, cyber insurance provides access to expert breach response resources that most small businesses could not retain on their own.

What security controls do I need to qualify for cyber insurance?

At minimum, most cyber insurers now require multi-factor authentication (MFA) on email and remote access, endpoint protection on all devices, regular data backups, and basic employee security awareness training. Carriers that provide the most competitive rates also look for endpoint detection and response (EDR) tools, patch management processes, network segmentation, incident response plans, and privileged access management. Businesses that lack MFA may find it difficult to obtain cyber insurance at any price.

Does cyber insurance cover ransomware payments?

Most cyber insurance policies cover ransomware payments, though coverage is subject to conditions. Insurers typically require policyholders to notify law enforcement before making a payment, to involve the insurer's approved negotiation firm, and to comply with regulations that prohibit payments to sanctioned entities under the Office of Foreign Assets Control (OFAC). Some policies have moved toward sub-limiting ransomware coverage or offering it as an optional endorsement due to the surge in ransomware claims.

What is the difference between cyber insurance and technology E&O?

Cyber insurance covers the consequences of cyber attacks and data breaches — breach response costs, business interruption, ransomware payments, and liability from compromised data. Technology errors and omissions (Tech E&O) covers claims that your technology products or services failed to perform as expected — such as software that crashes a client's system, a failed implementation, or a security assessment that misses a critical vulnerability. Some insurers combine both coverages into a single "cyber and tech E&O" policy, while others offer them separately.

How quickly can I file a claim if a breach occurs?

You should notify your cyber insurer as soon as you suspect a breach or cyber incident — even before you have confirmed the full scope of the event. Most policies require "prompt" notification, and delayed reporting can jeopardize coverage. Your insurer will assign a breach coach (typically an experienced attorney) who will coordinate the response, engage forensic investigators, and guide you through notification requirements. Having your policy number and insurer's claims hotline readily accessible — not buried in a file that might be inaccessible during a breach — is an important preparedness step.

Does cyber insurance cover employee mistakes?

Yes. Most cyber insurance policies cover incidents caused by employee negligence, such as clicking on a phishing link, misconfiguring a database, accidentally emailing sensitive data to the wrong recipient, or falling for a social engineering scam. What is typically excluded is intentional or criminal conduct by employees — if an employee deliberately steals data or sabotages systems, that would be excluded from coverage. Some policies also cover the costs of investigating and remediating insider threats.

What is a cyber insurance application like?

Cyber insurance applications range from brief online questionnaires (10–20 questions for small businesses) to detailed assessments for larger organizations. Common application topics include your industry, revenue, number of records stored, types of data collected, MFA deployment, backup procedures, endpoint protection, employee training, incident response planning, and prior cyber incidents. Some insurers supplement applications with external security scans that assess your internet-facing infrastructure for known vulnerabilities. Answering application questions accurately is essential — material misrepresentations can void coverage.

Compare Coverage Options

Use our free quiz to find out which insurance types your business needs.

Take the Insurance Quiz