Compliance

Cyber Insurance 101: What Coverage Do Small Businesses Need?

Cyber insurance can protect your business from catastrophic breach costs, but policies vary dramatically. Learn what to look for and avoid common coverage gaps.

SimplCyber TeamDecember 14, 202411 min read

Why Small Businesses Need Cyber Insurance

Traditional business insurance doesn't cover cyber incidents. When a ransomware attack encrypts your data, a phishing scam diverts a wire transfer, or a data breach exposes customer information, your general liability policy won't help. Cyber insurance fills this critical gap, covering costs that can bankrupt small businesses.

The average small business data breach costs exceed $100,000 when factoring in forensics, legal fees, customer notification, credit monitoring, regulatory fines, and business interruption. Cyber insurance transforms this potentially catastrophic expense into a manageable deductible.

What Cyber Insurance Covers

First-Party Coverage (Direct Costs to Your Business)

Data Breach Response

  • Forensic investigation to determine breach scope
  • Legal counsel specializing in breach response
  • Notification costs (printing, mailing, call center)
  • Credit monitoring services for affected individuals
  • Public relations and crisis management
  • Identity restoration services

Business Interruption

  • Lost income during downtime from cyber incident
  • Extra expenses to maintain operations
  • Costs to restore operations
  • Revenue loss from network outage

Ransomware and Cyber Extortion

  • Ransom payment (if you choose to pay)
  • Negotiation with attackers
  • Cryptocurrency transaction facilitation
  • Decryption assistance
  • Data restoration costs

Data Restoration

  • Cost to restore or recreate lost data
  • System restoration and rebuilding
  • Forensic data recovery
  • Software replacement

Funds Transfer Fraud

  • Social engineering resulting in fraudulent transfers
  • Business email compromise (BEC) losses
  • Deception-based financial transfers

Cyber Crime and Theft

  • Theft of funds via hacking
  • Electronic theft from bank accounts
  • Cryptocurrency theft

Third-Party Coverage (Liability to Others)

Privacy Liability

  • Legal defense costs
  • Settlements and judgments
  • Regulatory defense
  • Fines and penalties (where insurable)

Network Security Liability

  • Claims arising from breach or security failure
  • Defense costs for lawsuits
  • Damages and settlements
  • Claims from business partners

Media Liability

  • Copyright or trademark infringement online
  • Defamation or libel in digital content
  • Privacy violations in online communications

Regulatory Defense and Penalties

  • Defense against regulatory investigations
  • Fines (GDPR, CCPA, HIPAA, etc., where insurable)
  • Compliance costs

Common Exclusions

What's Typically Not Covered:

  • Prior known breaches or incidents
  • Intentional acts or fraud by employees
  • Infrastructure improvements (existing vulnerabilities)
  • Betterment (upgrading beyond restoration)
  • Acts of war or terrorism (sometimes)
  • Bodily injury or property damage
  • Intellectual property theft (sometimes excluded)
  • Losses from unpatched known vulnerabilities (emerging exclusion)

Understanding Policy Structure

Coverage Limits

Aggregate Limit: Maximum the policy will pay across all claims in the policy period

Per-Incident Sublimits: Caps on specific coverage types:

  • Ransomware: Often $100,000-$500,000 sublimit
  • Social engineering: $50,000-$250,000 sublimit
  • Business interruption: Daily or monthly caps

Typical Limits for Small Businesses:

  • $1 million (minimum for most SMBs)
  • $2 million (recommended for most)
  • $5 million+ (larger organizations, high-risk industries)

Deductibles

Waiting Period Deductible: Common for business interruption (e.g., 8-24 hours)

Monetary Deductible: Typical range:

  • $1,000-5,000 (very small businesses)
  • $5,000-25,000 (most small businesses)
  • $25,000-100,000+ (larger organizations)

Considerations:

  • Higher deductible = lower premium
  • Choose deductible you can afford during crisis
  • Different deductibles for different coverage types possible

Retention vs. Deductible

Deductible: You pay first, insurance pays after deductible met

Retention: Insurance advances costs, you reimburse up to retention amount

Preference: Deductible structure is more common and simpler

Cyber Insurance Requirements

Security Controls Questionnaire

Insurers assess your security posture before offering coverage. Expect questions about:

Access Controls:

  • Multi-factor authentication usage
  • Password policies
  • Privileged access management
  • User access reviews

Endpoint Protection:

  • Antivirus/EDR deployment
  • Patch management processes
  • Endpoint encryption
  • Mobile device management

Network Security:

  • Firewall implementation
  • Network segmentation
  • Intrusion detection
  • VPN usage for remote access

Data Protection:

  • Backup procedures and frequency
  • Backup testing
  • Offsite/offline backup storage
  • Encryption practices

Email Security:

  • Advanced email filtering
  • Anti-phishing tools
  • SPF, DKIM, DMARC implementation
  • Email authentication

Incident Response:

  • Incident response plan existence
  • Testing frequency
  • Designated response team
  • Tabletop exercises

Training:

  • Security awareness training frequency
  • Phishing simulation testing
  • Training documentation

Policies and Procedures:

  • Information security policy
  • Acceptable use policy
  • Remote work policy
  • Vendor management

Minimum Requirements

Many insurers now require specific controls for coverage:

Often Mandatory:

  • Multi-factor authentication (MFA) on all remote access
  • Endpoint detection and response (EDR) on all systems
  • Regular backups (daily recommended)
  • Offline/immutable backups
  • Email security beyond basic spam filtering
  • Privileged access management

Emerging Requirements:

  • Security awareness training (quarterly minimum)
  • Vulnerability scanning
  • Penetration testing (annually)
  • Incident response plan
  • Vendor risk management

Failure to Meet Requirements:

  • Coverage denial
  • Coverage exclusions for specific risks
  • Higher premiums
  • Lower coverage limits

Choosing the Right Cyber Insurance

Coverage Evaluation

Essential Coverage Components:

Must Have:

  • Data breach response (forensics, notification, credit monitoring)
  • Ransomware payment and response
  • Business interruption
  • Funds transfer fraud
  • Privacy and network security liability
  • Regulatory defense

⚠️ Evaluate Carefully:

  • Social engineering sublimit (ensure adequate for your risk)
  • Ransomware sublimit (increasingly attacked)
  • Business interruption waiting period (shorter is better)
  • Prior acts coverage (if switching policies)

Nice to Have but Not Critical:

  • Media liability (unless content is core to business)
  • Reputational harm coverage
  • Branding restoration

Policy Comparison Checklist

Coverage:

  • [ ] Aggregate limit meets your risk profile
  • [ ] Sublimits are adequate for key coverages
  • [ ] Deductible is affordable
  • [ ] Business interruption waiting period is reasonable
  • [ ] Funds transfer fraud coverage is sufficient
  • [ ] Regulatory fines covered (where legally possible)

Terms:

  • [ ] Definition of "security failure" is broad
  • [ ] Prior acts coverage (if applicable)
  • [ ] Extended reporting period option
  • [ ] Consent to settle clause is reasonable
  • [ ] Exclusions are clearly defined and acceptable

Insurer:

  • [ ] Financial strength rating (A.M. Best A- or higher)
  • [ ] Experience in cyber insurance
  • [ ] Claims handling reputation
  • [ ] Incident response resources provided
  • [ ] Breach response panel (pre-vetted vendors)

Red Flags

Avoid Policies With:

  • Overly narrow definition of covered incidents
  • Extensive exclusions for common scenarios
  • Unreasonable security requirements you can't meet
  • "Claims made and reported" vs. "claims made" (more restrictive)
  • Sublimits so low they're effectively illusory
  • No clear path to incident response assistance

The Application Process

Step 1: Gather Information

Company Details:

  • Revenue
  • Number of employees
  • Industry
  • Geographic locations
  • Types of data handled (PII, PHI, PCI, etc.)

Security Posture:

  • Completed security controls questionnaire
  • Security audit or assessment results
  • Compliance certifications (SOC 2, ISO 27001, etc.)
  • Previous incident history (be honest)

Desired Coverage:

  • Coverage limit
  • Deductible preference
  • Specific coverage requirements
  • Policy term

Step 2: Complete Application

Be Honest:

  • Misrepresentation can void coverage
  • Disclose prior incidents
  • Accurately represent security controls

Documentation:

  • Security policies
  • Incident response plan
  • Training records
  • Backup procedures

Step 3: Underwriting Review

Underwriter Assessment:

  • Reviews application and security posture
  • May request additional information
  • Determines pricing and terms
  • May require security improvements

Possible Outcomes:

  • Coverage offered as requested
  • Coverage offered with exclusions or sublimits
  • Coverage offered contingent on improvements
  • Coverage denied (rare for businesses with basic security)

Step 4: Policy Issuance

Review Policy Carefully:

  • Verify coverage matches expectations
  • Understand all exclusions
  • Note all requirements and warranties
  • Confirm contact information for claims

Maintain Compliance:

  • Implement any required controls
  • Document compliance
  • Update insurer of material changes

Making a Claim

Immediate Response

First 24 Hours:

  1. Notify your insurance broker immediately
  2. Call insurer's breach hotline (24/7 typically)
  3. Document everything
  4. Do NOT engage vendors without insurer approval (may void coverage)

Insurer Will Provide:

  • Breach coach (attorney to guide response)
  • Forensic investigator
  • PR firm (if needed)
  • Other vendors from approved panel

Your Responsibilities:

  • Cooperate with investigation
  • Preserve evidence
  • Maintain communication
  • Follow breach coach guidance

Claims Process

Investigation:

  • Forensic firm determines scope and cause
  • Legal counsel oversees process
  • Insurer assesses coverage

Response:

  • Notification to affected individuals
  • Regulatory reporting
  • Credit monitoring setup
  • Public communications

Recovery:

  • System restoration
  • Business resumption
  • Documentation of losses

Settlement:

  • Submit expenses with documentation
  • Insurer reviews against policy terms
  • Payment for covered costs
  • Potential settlement of third-party claims

Maximizing Your Claim

Best Practices:

  • Document all costs meticulously
  • Keep communications with insurer
  • Use approved vendors when possible
  • Get pre-approval for major expenses
  • Submit claims promptly
  • Maintain detailed timeline

Common Claim Delays:

  • Missing documentation
  • Using unapproved vendors
  • Failing to prove business interruption losses
  • Inadequate evidence of expenses

Cost of Cyber Insurance

Pricing Factors

Company Characteristics:

  • Industry (healthcare, finance = higher)
  • Revenue (higher revenue = higher premium)
  • Number of employees
  • Types of data handled
  • Geographic location

Security Posture:

  • MFA implementation (major factor)
  • EDR deployment
  • Backup practices
  • Security training
  • Previous incidents

Coverage Selected:

  • Limits (higher limits = higher premium)
  • Deductible (higher deductible = lower premium)
  • Coverage breadth

Typical Costs

Small Businesses (< $5M revenue):

  • $1M coverage: $1,000-3,000/year
  • $2M coverage: $2,000-5,000/year

Growing Businesses ($5-25M revenue):

  • $2M coverage: $3,000-8,000/year
  • $5M coverage: $5,000-15,000/year

Larger SMBs ($25-100M revenue):

  • $5M coverage: $10,000-30,000/year
  • $10M+ coverage: $25,000-100,000+/year

Market Trends:

  • Premiums increased 50-100% in 2021-2022
  • Market stabilizing in 2023-2024
  • Strong security controls yield better pricing

ROI Consideration

Cost vs. Benefit:

  • $5,000 annual premium vs. $100,000+ average breach cost
  • Insurance provides access to expert response resources
  • Breach response panel expertise reduces damage
  • Peace of mind and risk transfer

Maintaining Your Coverage

Annual Renewal

Renewal Process:

  • Re-complete security questionnaire
  • Disclose any incidents or material changes
  • Update coverage needs
  • Review and negotiate terms

Factors Affecting Renewal:

  • Claims history
  • Security posture changes
  • Market conditions
  • Insurer's risk appetite

Premium Changes:

  • Typically increase 10-30% annually (market dependent)
  • Claims can significantly increase premiums
  • Security improvements may reduce increases

Continuous Compliance

Maintain Required Controls:

  • Keep MFA implemented and enforced
  • Maintain EDR on all systems
  • Continue regular backups
  • Document security practices

Update Insurer:

  • Material business changes
  • Significant security incidents
  • Major system changes
  • Mergers or acquisitions

Common Mistakes

Mistake 1: Insufficient Limits

Problem: Choosing $1M when risk warrants $5M+

Solution: Conduct risk assessment; breach costs often exceed expectations

Mistake 2: Ignoring Sublimits

Problem: Focusing on aggregate limit, missing critical sublimit gaps

Solution: Review all sublimits; ensure ransomware and social engineering are adequate

Mistake 3: Misrepresenting Security Posture

Problem: Claiming stronger security than reality to get coverage/lower premiums

Solution: Be honest; misrepresentation voids coverage

Mistake 4: Not Reading Exclusions

Problem: Assuming everything is covered

Solution: Understand all exclusions; negotiate removal of problematic ones

Mistake 5: Delaying Notification

Problem: Waiting to report incident until scope is clear

Solution: Notify insurer immediately; delay can jeopardize coverage

Mistake 6: Engaging Vendors Before Approval

Problem: Hiring forensic firm before insurer approval

Solution: Use insurer's panel or get pre-approval; unapproved vendors may not be reimbursed

The Bottom Line

Cyber insurance is essential risk management for modern businesses. The cost is modest compared to potential breach expenses, and policies provide access to expert response resources that most small businesses couldn't afford on their own.

However, insurance is not a substitute for security. Insurers increasingly require basic security controls, and premiums reflect your risk posture. View cyber insurance as one component of a comprehensive risk management strategy that includes prevention, detection, and response capabilities.

Start by implementing security fundamentals—MFA, EDR, backups, and training. Then obtain cyber insurance appropriate to your risk profile. The combination of strong security and appropriate insurance coverage provides the best protection for your business.


Need help understanding your cyber insurance needs and security requirements? Get a SimplCyber assessment to evaluate your risk and coverage gaps.

Tags:cyber insurancerisk managementdata breachbusiness insurancecoverage

Related Articles

Protect your business today

Get a comprehensive security assessment and actionable remediation plan.

Get Your Free Risk Scan