Keep business online when attacks happen
Modern policies bundle incident response, ransomware, social engineering, data breach costs, and business interruption. We’ll help you choose limits that fit your risk — and satisfy contracts.
Friendly help. Serious coverage.
What’s typically covered
Incident Response
Forensics, breach coach/legal, notifications, credit monitoring, PR.
Ransomware & Extortion
Response costs and negotiators; payment treatment varies by carrier.
Business Interruption
Lost income & extra expense from covered outages (incl. dependent BI options).
Data Restoration
Recover/replace corrupted data, including from malware.
Liability to Others
Privacy liability, media liability, regulatory proceedings (where insurable).
Social Engineering
Funds-transfer fraud & invoice manipulation coverage options.
Features vary by carrier and state; some items may require endorsements or sublimits.
Coverage at a glance
| Area | Typical Sublimits | Notes |
|---|---|---|
| Incident Response | $100k–$1M | Often outside the main limit with panel vendors |
| Ransomware | $100k–$2M | May require MFA/EDR; coinsurance may apply |
| Business Interruption | $100k–$2M | Waiting period 6–24 hrs common; dependent BI optional |
| Social Engineering | $50k–$500k | Usually optional; requires controls |
| Regulatory & PCI | $100k–$1M | Varies by jurisdiction; fines/penalties where insurable |
Who needs cyber?
- ✓ Any business that stores customer or employee data
- ✓ Companies relying on cloud, POS, email, or SaaS to operate
- ✓ Vendors with contracts requiring cyber limits
What underwriters ask for
- ✓ Multi‑factor authentication (MFA) for email, VPN, admin
- ✓ Endpoint protection/EDR and secure backups (offline/immutable)
- ✓ Patching cadence & email filtering
- ✓ Phishing training & incident response plan
- ✓ Use of least privilege and vendor risk management
Real‑world claim scenarios
Invoice Fraud
Attacker spoofs vendor; $85k wired to wrong account. Social engineering coverage responds.
Ransomware Lockdown
Server encrypted; policy funds forensics, negotiator, data restore, and lost income.
Stolen Laptop
PHI on device; notifications, credit monitoring, and counsel handled via panel.
Get a fast cyber quote
Cyber Insurance — FAQs
How much does cyber insurance cost?
Pricing depends on revenue, industry, security controls (MFA, EDR, backups), and loss history. Many small businesses see premiums starting in the low thousands, with options for lower limits.
Do I need MFA to get ransomware coverage?
Most carriers now require MFA for email, VPN, and privileged access for ransomware or social engineering options — and it lowers risk.
Can you help if I have a breach today?
Yes — we’ll help connect you with carrier panel firms (forensics, legal, notifications) through your policy’s incident response hotline where applicable.
Does cyber insurance cover wire fraud?
Typically under Social Engineering/Funds Transfer Fraud or Crime; sublimits and conditions apply. Controls like call‑backs are often required.
Will it cover regulatory investigations and fines?
Coverage for regulatory matters and fines/penalties varies by jurisdiction and carrier. Many policies include defense and certain penalties where insurable by law.
Insurance products, features, and availability vary by carrier and state. This page is for general informational purposes and does not modify coverage terms or create any binding agreement. Final terms are set by the policy and endorsements issued by the insurer.
