Cyber Insurance Policy | 4 Common Exclusions | Dataprise (2024)

A cyber insurance policy is a must for companies today, but not all policies are created equal. This is, in part, because it’s difficult to underwrite risk accurately. From the lack of data to the constantly evolving tactics of hackers, there are a lot of moving pieces.

Andres Franzetti, Co-Founder and CEO of Risk Cooperative, a national insurance brokerage, provided additional insight into the changing climate of cyber risk in our recent webinar. While cyber insurance coverage grew by 22% in 2019, loss ratios grew to 73% in 2020 — the highest they’d been in six years. To protect their pockets, many cyber insurance companies are both limiting coverage and exiting from non-profitable markets.

Cyber insurance companies are also increasing rates by up to 100%, all while paring down covered events. We’ll look at what you should know about the growing list of exclusions and what it means for your cyber protection.

What’s Not Covered in a Standard Cyber Insurance Policy?

Every cyber insurance policy will have its own terms, but common exclusions typically include the following:

  • Third-party providers: Suppliers and vendors of any kind can create huge gaps for their clients. If there’s a data breach due to their protocols, any resulting ramifications to your business is unlikely to be covered by your insurance.
  • Lost portable devices: Insurance companies will not take responsibility for lost or stolen portable electronics. (Some companies will modify this policy if these devices are encrypted.)
  • War, invasion, or terrorism: Any damage from government-sponsored groups or ideological origins may be excluded from the policy.
  • Security maintenance failures: The company must meet and maintain minimum security standards to have an insurance claim approved.

By definition, cyber issues overlap with a variety of insurance categories. While this may sound like coverage from different policies, the reality is that it creates gaps in any organization. A robust cyber policy can mitigate most potential loss scenarios.

How to Redefine Your Protection Plan with Cyber Insurance Companies

Decision-makers at cyber insurance companies are putting a high priority on setting security standards for every customer — so there’s no question about what role the client plays in protecting their data. While the debate rages on about exactly what that means for each company, it boils down to enforcing stronger security controls.

Precautions like two-factor authorization (2FA) and encryption aren’t for conglomerates anymore; they’re for every business with a vested stake in continuing its operations. When underwriters see this technology in place before writing the cyber insurance policy, the policy is more likely to cover what the company needs it to cover.

Reducing Risk with a Cyber Insurance Policy

Cyber insurance plans go beyond financial risk transfer, so cyber policies can provide a range of proactive and risk mitigation services such as training, workshops, and more. Integration with Managed Security Services Providers (MSSPs) is another component.

Failing to take cyber security seriously — particularly when you factor in cyber insurance exclusions — is an open invitation to financial devastation. The best way for a company to respond is to be aware of their policy and what they can do to flesh out their own security standards.

Corresponding content:

  • Download this Minimum Cybersecurity Checklist from Risk Cooperative to see where your organization currently stands.

Assessing Your Cyber Insurance Policy

The good news is the right MSSP can help a company assess their current program,implement more comprehensive security controls with managed infrastructure, and monitor and maintain the system from there. Managed cybersecurity allows companies of all sizes can adopt a more holistic plan, one that minimizes the odds they’llever need tofile a claim with cyber insurance companies in the first place.

What are the Requirements for Cyber Insurance? Cyber Insurance Checklist

In this ever-evolving market of cyber insurance, carriers evaluate client risk when reviewing cyber coverage applications. As a first step toward insurability, our partner Risk Cooperative developed this checklist summarizing six key areas for cybersecurity and the minimum standards underwriters anticipate. While the criteria for optimal rates and coverage are in constant flux, meeting these standards has become more crucial than ever before to ensure adequate protection.

Data Security

  • Are automated virus scans being performed on a regular basis?
  • Do you have real-time network monitoring for possible intrusions or abnormalities?
  • Is there a written information security policy in place, with annual employee training and certification?
  • Do you use multi-factor authentication for remote access?
  • Do you have an Acceptable Use Policy to communicate appropriate use of data to users?
  • Do you conduct the following exercises to test security controls? Internal vulnerability scanning? External vulnerability scanning? Penetration testing?

Business Interruption & Data Recovery

  • Do you have the following plans in place? Disaster Recovery Plan? Business Continuity Plan? Incident Response plan?
  • Have these been tested within the past year?
  • Do you have offsite (e.g. cloud) back-ups less than a month old?
  • Are your backups kept separate from your network (‘offline’), or in a cloud service designed for this purpose?
  • Have you tested the successful restoration and recovery of key server configurations and data from backups in the last 6 months?

Funds Transfer

  • Does your team have some method of multi-factor authentication before transferring any funds?

Email Security

  • Do you pre-screen e-mails for potentially malicious attachments and links?
  • Do you provide a quarantine service to your users?
  • Can your users access e-mail through a web app on a non-corporate device? If so, do you enforce Multi-Factor Authentication?

Third Party & Vendor Relationships

  • Do your written contracts with third-party providers address care, use, and control of sensitive or confidential information?
  • Do you have a formal assessment of the security risks associated with the new vendor?
  • Do you have a contractual provision to indemnify your firm in the event of a security failure or loss on confidential information?

Corresponding Cyber Insurance Content

  • Vendor Risk Management Explained: Plan for Action
  • Improving Security with Multifactor Authentication
  • Three Critical Types of Cybersecurity Visibility
Cyber Insurance Policy | 4 Common Exclusions | Dataprise (2024)

FAQs

What are the exclusions for cyber insurance? ›

Cyber insurance coverage exclusions in an insurance policy can include failure to maintain standards, payment card industry (PCI) fines and assessments, prior acts, acts of war, and more.

What is not covered in cyber insurance? ›

Loss of value through intellectual property (IP) theft

Often, they won't recognize IP theft until long after an incident (for example, when a competitor takes a new product to market). Nevertheless, devaluation due to IP theft is a loss most cyber policies don't cover.

What are typical exclusions in an insurance policy? ›

Typical examples of excluded perils under a homeowners policy are flood, earthquake, and nuclear radiation. A typical example of an excluded loss under an automobile policy is damage due to wear and tear.

What is the exclusion clause in cyber insurance? ›

(a) This Policy does not insure loss, damage, destruction, distorsion, erasure, corruption or alteration of ELECTRONIC DATA from any cause whatsoever (including but not limited to COMPUTER VIRUS) or loss of use, reduction in functionality, cost, expense of whatsoever nature resulting therefrom, regardless of any other ...

What is the cyber incident exclusion? ›

Cyber Incident Exclusion

With this endorsem*nt, there is no coverage for loss caused directly or indirectly by a cyber incident, which is defined to include: Unauthorized access to or use of any computer system (including electronic data).

What do cyber insurance policies cover and exclude ie first party vs third-party )? ›

First-party coverage applies to the expenses incurred directly as a result of the breach, such as forensic investigation and recovery. Third-party coverage applies to lawsuits by customers against the company in connection with their leaked data.

What is covered under cyber security insurance? ›

Cyber insurance generally covers your business' liability for a data breach involving sensitive customer information, such as Social Security numbers, credit card numbers, account numbers, driver's license numbers and health records.

Which of the following is not a coverage offered as part of cyber insurance? ›

If a cyber attack causes you to lose customers and consequently lose profit, cyber insurance will not reimburse you for that profit loss. Also, most cyber liability insurance policies don't cover your business for a decrease in company value.

What does comprehensive cyber insurance not protect you from? ›

One aspect that is typically not covered by cyber insurance is the loss of future revenue. While cyber insurance policies may cover expenses related to a data breach or cyber attack, such as legal fees and notification costs, they generally do not compensate for lost business opportunities or potential future revenue.

What is a list of exclusions? ›

The Office of the Inspector General's (OIG) List of Excluded Individuals/Entities (LEIE) provides information to the health care industry, patients and the public regarding individuals and entities currently excluded from participation in Medicare, Medicaid and all other Federal health care programs.

What are the exclusions for all risk? ›

The most common types of perils excluded from "all risks" include earthquake, war, government seizure or destruction, wear and tear, infestation, pollution, nuclear hazard, and market loss.

What are two of the most common exclusions used by underwriters? ›

Risky activity: Any death due to risky activities, such as skydiving or rock climbing, are usually counted as an exclusion. Substance abuse: If a policyholder's death is the result of drug or alcohol abuse, it may be excluded from their policy.

What is excluded in cyber insurance? ›

Losses arising from failure of or outage to critical national infrastructure, such as electricity, gas, water, satellite or telecommunications, are excluded. As with war and terrorism, the risk is so large and beyond the capacity of individual insurers.

Which of the following is typically excluded from cyber insurance coverage? ›

Physical Damage

If a cyber attack destroys physical infrastructure or equipment, the insurer may not cover the costs of repairing or replacing those assets.

What is the cyber exclusion endorsem*nt? ›

The Cyber Incident Exclusion endorsem*nt adds an exclusion for loss or damage to covered property caused directly or indirectly by a cyber incident. 1. Unauthorized access to or use of any computer system (including “electronic data”).

Which one of these things will a comprehensive cyber insurance not protect you from? ›



A cyber insurance policy covers data breaches and this necessarily does not need to physically injure a person thus, a physical injury is not covered. There are some policies which will cover the mental stress and distress that can be caused due to data breaches and claim.

References

Top Articles
Latest Posts
Article information

Author: Mr. See Jast

Last Updated:

Views: 6269

Rating: 4.4 / 5 (75 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Mr. See Jast

Birthday: 1999-07-30

Address: 8409 Megan Mountain, New Mathew, MT 44997-8193

Phone: +5023589614038

Job: Chief Executive

Hobby: Leather crafting, Flag Football, Candle making, Flying, Poi, Gunsmithing, Swimming

Introduction: My name is Mr. See Jast, I am a open, jolly, gorgeous, courageous, inexpensive, friendly, homely person who loves writing and wants to share my knowledge and understanding with you.