What To Look For In Cyber Insurance Coverage?

Despite the fact that cyber insurance policies have been on the market for years, I still find that there is a lot of misconception about what these policies cover. This perplexity is understandable. The growing number of cyber liability insurance available, as well as the growing number of endorsements that may be added to plans, makes data breach coverage more difficult to comprehend.

The following are the seven key features of cyber liability coverage to look for in a policy:

You’ve discovered that data has been compromised, and you need to figure out what went wrong, how it happened, and what data was accessed. The costs of hiring an outside forensic team to assist with discovery are reimbursed.

To evaluate the scope of the federal and state notification requirement breaches, you will need legal assistance. You’ll also need legal representation to defend you if a lawsuit is brought against you.

While it is not required by law, it is widely accepted that providing these services to the impacted parties will decrease potential legal exposure and is the moral thing to do.

The way you notify a data breach to the media is critical to regaining your reputation and keeping your clients, vendors, business associates, partners, and patients.

Following a breach, it’s not uncommon for class action lawsuits to be brought against you. You’ll need legal representation, which you can choose or have assigned to you by the carrier. In either case, these expenses are covered.

What are the four main covers under cyber liability?

Cyber liability insurance can protect you from a variety of security risks, including:

These are just a few instances of what a cyber liability insurance policy might cover. Read our dedicated cyber liability insurance page for more details.

Is it worth having cyber insurance?

When it comes to cyber liability insurance, who needs it? In general, cyber attack insurance should only be considered by companies that process personal information over the internet. By 2021, practically every firm, regardless of size, will be able to benefit from a ransomware insurance policy.

Cyber insurance isn’t just for the tech and healthcare industries any longer. Instead, most firms keep a variety of data digitally, which increases the danger of a data breach. The types of data that businesses store online has expanded to include:

The list might go on forever. A single data breach has the potential to affect dozens, if not hundreds, of consumers or workers. According to one analysis, there were 1,001 data breaches in 2020, affecting more than 155.8 million people. Protecting your firm from an attack is critical, regardless of the type of business information you maintain online.

The main line is that if you deal with any kind of PII, whether it’s payroll for one employee or the information of thousands of clients, cyber insurance is worthwhile.

What do cyber insurance policies cover and exclude?

  • Exclusions for claims based on the insured’s failure to maintain minimum security requirements: Some cyber policies exclude coverage for claims based on the insured’s failure to maintain minimum security standards. These exclusions are phrased in a variety of ways. Some policies don’t cover an insured if they don’t follow “industry standards,” while others have endorsements that spell out “Minimum Required Practices” that the insured must follow. Another variant of this exclusion connects the insured’s responsibilities to the security methods listed in their cyber insurance application. Other policies have hybrid exclusions that incorporate elements of the preceding. This clause might possibly prevent coverage for practically every data breach, depending on how it is phrased. Policyholders should take care to fill out cyber insurance applications completely and ensure that the security mechanisms outlined in the applications are in place throughout the life of the policy. Furthermore, if your company’s policy contains an iteration of this exclusion, you should request that it be eliminated or that any ambiguities (such as a requirement of conformity with the ambiguous and undefined term “industry standards”) be explained by the carrier in an endorsement.
  • Bodily Harm and Property Damage: Most cyber plans do not cover claims for “bodily injury” or “property damage.”
  • Exclusions that may apply to certain cyber-related incidents are becoming more common in general liability plans (which would ordinarily give coverage for these types of claims).
  • Exclusion for Access or Disclosure of Confidential or Personal Information and Data-Related Liability, Insurance Services Office, Inc. (Form No. CG 21 07 05 14).
  • If a cyber incident at your company could result in bodily injury or property damage, be sure your firm’s insurance portfolio includes the right coverages so you’re not left uninsured if a claim is filed.
  • In addition, organizations should review their cyber policies’ definitions of bodily injury to ensure that claims for mental agony, mental injury, shock, emotional distress, and humiliation are excluded, as plaintiffs nearly invariably identify these injuries as damages resulting from a data breach.
  • Almost all cyber plans exclude coverage for loss caused by acts of war, terrorism, invasion, and/or revolt.
  • Exclusions are frequently worded broadly, which, given the prevalence of state-sponsored, political, and ideological cyber attacks, may rule out coverage for the majority of security breaches.
  • Many insurers are ready to change these exclusions to include “cyberterrorism” or “electronic terrorism” coverage.
  • PCI Fines & Assessments: Contractual liability exclusions are found in almost all cyber policies, and some of them have been interpreted to prohibit coverage for PCI fines and assessments.
  • P.F. Chang’s China Bistro, Inc. v. Fed. Ins. Co., CV-15-01322-PHX-SMM, 2016 WL 3055111; P.F. Chang’s China Bistro, Inc. v. Fed. Ins. Co., CV-15-01322-PHX-SMM, 2016 WL 3055111; P.F. Chang’s China Bistro, Inc. v. Fed. Ins (D. Ariz. May 31, 2016).
  • Other cyber insurance packages specifically state that PCI fines and assessments are not covered.
  • If your organization potentially face PCI fines and assessments as a result of a breach, you should carefully check your cyber policy to ensure that it explicitly covers them.
  • Laptop Exclusion: Depending on the exclusions in your cyber insurance, your firm may not be covered for claims involving a lost company laptop or other portable electronic equipment.
  • Some insurers are willing to do away with the exclusion entirely.
  • Other carriers might be willing to change the exception such that it only applies to claims involving the loss of an unencrypted portable device.

Of course, the following list isn’t meant to be comprehensive; rather, it’s meant to serve as a starting point for identifying some of the most commonly raised cyber coverage exclusions. To guarantee that there are no unintentional gaps in a company’s cyber insurance policy, risk managers and cybersecurity specialists should carefully review the coverage and exclusions.

What is not covered by cyber insurance?

Cyber risk is becoming a more serious danger to all businesses, regardless of size. Every day, new risks emerge. It is becoming increasingly difficult for business owners to shield their enterprises from threats that have the ability to cripple or even shut down small businesses. An integrated cyber risk management plan that combines risk assessment, risk mitigation, and risk transfer through cyber insurance is the best way to combat the growing landscape of cyber threats.

Cybersecurity with cyber insurance equals risk management that is well-balanced. It isn’t a case of one or the other. No cybersecurity program can completely remove a company’s cyber risk. That’s why you’ll need cyber insurance to fill up the gaps left by your security program by covering risks that can’t be controlled.

When used together, cybersecurity and cyber insurance form a balanced risk management strategy that lowers costs and enhances your company’s overall risk profile. However, not all top leaders have adopted a strategic approach to managing cyber risk. More than two-thirds acknowledge they haven’t bought cyber insurance because they don’t know how much risk they face.

What Is Cyber Insurance?

Cyber and privacy liability insurance is a type of insurance designed to protect businesses from the financial risks that come with doing business in a digital world with ever-changing regulations. While cyber insurance coverage does not assist you in identifying or eliminating cyber risks, it does provide a solution and financial safety net in the event of a cyber occurrence.

Cyber insurance evolves in tandem with cyber risks. In the insurance sector, there has been a trend to standardize coverage types in order to ensure uniformity for both insurers and insureds. While standardization has some advantages, it is difficult to produce one-size-fits-all plans because the likelihood of loss due to a cyber disaster is highly dependent on each organization’s overall cyber risk management practices, which insurance firms rarely have control over. Insurers will be able to precisely assess a company’s cyber risk and loss possibilities in the future, allowing them to tailor policies to individual protection needs and budgets, according to industry innovators.

What Does Cyber Insurance Cover?

  • First-Party Expenses: This category comprises charges that businesses would normally incur to mitigate losses resulting from a data breach or privacy incident. Disaster response and digital forensics services, PR services to handle reputational harm caused by a breach, notification to affected parties, and other expenses associated with immediately responding to a cyber incident are examples of first-party expenses.
  • Third-Party Expenses: This category includes the costs of defending responsibility claims as well as fines and penalties imposed by regulatory agencies. Legal fees to defend the corporation in lawsuits and fines for breaking HIPAA requirements are two examples.
  • Costs of Cybercrime: This category includes financial losses incurred as a result of criminal conduct. Theft of funds as a result of digital fraud is one example.

Note that, while this sort of insurance is referred to as “cyber,” it can also cover claims stemming from non-digital risks (think: theft or damage of physical records containing sensitive data).

It’s a good idea to look for coverage on the following typical topics when evaluating the strength of a cyber policy:

  • Phishing and spear phishing tactics are two examples of social engineering.
  • Business Interruption: When a company loses revenue due to a cyber incident, this is referred to as business interruption.
  • Virus Transmission: End-to-end coverage applies from the moment an infection is discovered until it is eradicated, even if the virus spreads before being eradicated.
  • Liability Implications: Typical liability charges include legal bills and regulatory fines.

What Doesnât Cyber Insurance Cover?

While cyber insurance protects organizations financially when it comes to their digital assets, it does not cover all risks and costs. The following are some of the things that a standard cyber insurance policy would not cover:

  • Upgrades: Your policy may not cover upgrades if you have a data breach and opt to improve your systems to prevent future accidents.
  • Future Earnings: Cyber plans often do not cover potential future profits that may be lost, such as as a result of reputational damage caused by a breach.
  • A cyber insurance coverage may not cover a loss if a cyber criminal steals intellectual property and the theft results in a fall in the company’s valuation.

How to Assess and Purchase Cyber Insurance

Despite increasing standardization in the market, cyber insurance policies still differ, and not all of them provide the sort and depth of coverage you may require for your company. Your best chance for expert advice on policy possibilities and pricing is to consult with an insurance professional who can help you tailor cyber coverage to your company’s specific needs.

Contact Trava’s team of professional cyber insurance brokers for a free consultation if you already have cyber insurance and want to evaluate your policy to ensure it covers the relevant risks at the correct level for your business.

If you don’t already have cyber insurance, now is the time to think about adding it to your risk management strategy. With Trava’s cyber quotation tool, you may acquire free rates from up to eight different carriers in a matter of minutes.

What is bricking in cyber insurance?

As a result of a hacking event, bricking refers to the loss of use or functionality of hardware (such as servers). Even if malicious software is deleted, hardware may still be deemed untrustworthy and need to be replaced.

Is cyber insurance necessary or a racket?

Cyber liability insurance, also known as cybersecurity, privacy, and media liability insurance, assists your business in responding to a cyberattack or data breach. Cyber liability insurance might be crucial if your network or computer systems are hacked or infected with a virus, for example.

Basic cyber liability coverage is often included in a general liability or professional liability insurance policy. Businesses that keep personally identifiable information (PII) for employees or customers, on the other hand, should consider purchasing standalone or enhanced cyber liability insurance. Any data that may be used to identify a specific person, such as a person’s name, date of birth, email address, social security number, credit card number, or bank account number, is considered PII.

A cyber breach can happen in a variety of ways. Hackers, for example, can send phishing emails to customers pretending to be your organization. The hackers can steal PII if a client clicks on a link in the email. A hacker could also destroy your data files with a virus or malware.

Internal protections are the most effective technique to defend against cyberattacks. Small business owners, for example, should restrict access to PII to a small number of employees. Strong passwords should be used on electronic devices and to access various software programs. You should also keep your passwords and software up to date on a regular basis.

âSecurity should be the number one boardroom priority of any business,â says Brian Gill, cofounder of Gillware Data Recovery. There should be technical and physical precautions in place. Insurance coverage is an extra layer of security that allows a company to call on the insurer in an emergency.

How big is the cyber insurance market?

According to MarketsandMarketsTM, the cyber insurance industry is expected to increase at a 21.2 percent annual rate from $7.8 billion in 2020 to $20.4 billion in 2025.

What is covered in cyber insurance?

Cyber insurance covers your company’s liabilities in the event of a data breach involving sensitive client data including Social Security numbers, credit card numbers, account numbers, driver’s license numbers, and health records.

What is First Party Cyber coverage?

The purpose of first-party coverage is to reduce the financial impact on the corporation that purchased the insurance (the insured). It protects your company from data leaks and cyberattacks.

Third-party cyber liability insurance protects the insured company from liability if it makes a mistake that causes a data breach or cyberattack on a client. It’s a crucial guideline for computer corporations and IT consultants who might be held responsible for a data breach.

  • Commercial property insurance is similar to first-party coverage. It pays for a company’s own losses as a result of covered cyber-attacks.
  • Third-party liability insurance is similar to general liability insurance. It covers legal costs incurred as a result of a company being accused for another company’s cyber losses.

What is 3rd party cyber coverage?

Liability coverage for firms who are liable for a client’s online security is provided by third-party cyber liability insurance. This involves safeguarding customers against cyberattacks and data breaches.