15 min read

In 2024, the average cost of a data breach reached $4.88 million globally -- the highest figure ever recorded. Ransomware attacks surged 68% year-over-year, with the average ransom demand exceeding $1.5 million. Forty-three percent of all cyberattacks targeted small and mid-sized businesses, and 60% of small businesses that suffered a significant breach closed permanently within six months. These are not projections or worst-case scenarios. They are the documented reality of operating a business in a digital economy.

And yet, as of early 2026, an estimated 55% of small businesses in the United States still carry no cyber insurance whatsoever. Many business owners assume their general liability or Business Owner's Policy covers digital risks. It does not. Others believe they are too small to be targeted. They are not. The gap between cyber risk exposure and cyber risk protection remains one of the most dangerous blind spots in American business.

Cyber insurance -- also called cyber liability insurance or data breach insurance -- is a specialized policy designed to cover the financial losses that result from cyber events: data breaches, ransomware attacks, network security failures, business email compromise, social engineering fraud, and system outages. In 2026, it is no longer a niche product for technology companies. It is a fundamental component of the business insurance portfolio for every company that touches digital systems, which means every company.

This guide explains exactly what cyber insurance covers, how policies are structured, what it costs, what insurers require, and how to position your business for the best coverage at the lowest price.

Related reading: Commercial Auto Insurance in 2026: The Complete Cost, Coverage, and Savings Guide for Every Business | How 2026 Tariffs Are Reshaping Small Business | Business Model Innovation: How Companies Are Reinventing Growth in 2026

What Cyber Insurance Covers: First-Party vs. Third-Party Protection

Key Takeaways

  • The average cyberattack costs an SMB $200,000 — enough to permanently close most small businesses (Hiscox Cyber Readiness Report 2023).
  • The average ransomware payment was $408,644 in Q1 2023, with total ransomware damages projected to surpass $57 billion globally in 2026 (Coveware).
  • Businesses required by insurers to implement security controls file 25% fewer claims than uninsured peers (Coalition).
  • Cyber insurance premiums grew 50% in 2021 as insurer losses mounted; proactive risk management is now the key to securing affordable coverage (AM Best).

Cyber insurance policies are structured around two fundamental categories of coverage: first-party and third-party. Understanding the distinction is essential because the coverage you need depends on whether you are protecting your own business from direct losses or protecting yourself against claims from others.

First-party coverage pays for your direct costs when a cyber event hits your business. The major first-party components include:

Data breach response costs. This covers the expenses of responding to a breach: forensic investigation to determine what happened and what data was compromised, legal counsel to navigate notification requirements, notification to affected individuals (required by law in all 50 states and most international jurisdictions), credit monitoring and identity protection services for affected individuals, and call center services to handle inquiries. For a breach affecting 10,000 records, these response costs alone typically range from $200,000 to $500,000.

Business interruption. When a cyberattack forces your systems offline, business interruption coverage pays for lost revenue and extra expenses during the outage. This includes the revenue you would have earned during the downtime, the costs of temporary workarounds (manual processes, temporary systems), and in some policies, the costs of restoring operations to normal. The average ransomware-related business interruption in 2025 lasted 22 days -- long enough to devastate a small or mid-sized business without coverage.

Data restoration. Covers the cost of recovering, recreating, or restoring data that was destroyed, corrupted, or encrypted by an attack. This goes beyond simply restoring backups (if they exist and are usable) to include the labor and systems required to validate data integrity and rebuild databases.

Ransomware and cyber extortion. Covers ransom negotiation costs, ransom payments (if authorized and legal), and the forensic investigation surrounding the extortion event. We will examine ransomware coverage in detail in a dedicated section below, as it has become the most complex and consequential component of modern cyber policies.

Crisis management and public relations. Covers the cost of professional communications support to manage reputational damage following a breach. This includes media relations, customer communications, social media monitoring, and brand rehabilitation efforts. The reputational cost of a breach often exceeds the direct financial cost, making this coverage far more valuable than many policyholders initially realize.

Third-party coverage protects you against claims and liabilities arising from a cyber event:

Privacy liability. Covers defense costs, settlements, and judgments when individuals or businesses sue you for failing to protect their data. Class action lawsuits following major breaches routinely result in settlements of $10 million to $100 million or more for large companies, and even small businesses face individual and small-group lawsuits with defense costs averaging $200,000-$500,000.

Regulatory proceedings. Covers fines, penalties, and defense costs from regulatory actions. In 2026, businesses face an increasingly complex web of privacy regulations: state laws (California's CCPA/CPRA, Virginia's CDPA, Colorado's CPA, and over a dozen others), federal regulations (HIPAA for healthcare, GLBA for financial services), and international frameworks (GDPR, DORA). Regulatory fines can be substantial -- GDPR fines alone have exceeded $4 billion cumulatively since 2018.

PCI DSS liability. If your business processes credit card payments and suffers a breach, the payment card brands (Visa, Mastercard, American Express) can impose fines of $5,000-$100,000 per month and require you to fund card replacement and fraud monitoring. Cyber insurance covers these costs.

Media liability. Covers claims arising from your website content, social media, and digital advertising -- including defamation, copyright infringement, and invasion of privacy.

Ransomware Coverage: The Most Critical and Complex Component

Ransomware has transformed the cyber insurance market more than any other single threat. The economics are staggering: the average ransomware payment exceeded $1.5 million in 2025, up from $812,000 in 2024. Total ransomware damages -- including downtime, data loss, reputational harm, and recovery costs -- are projected to surpass $57 billion globally in 2026. For insurers, ransomware claims now account for 40-50% of all cyber insurance payouts. The Colonial Pipeline attack in May 2021 illustrated the stakes in visceral terms: attackers shut down 5,500 miles of fuel pipeline serving the U.S. East Coast, the company paid a $4.4 million ransom within hours, and the resulting fuel shortage triggered emergency declarations across multiple states. That single incident accelerated underwriting changes across the entire U.S. cyber insurance market.

As a result, ransomware coverage has become the most heavily conditioned, most carefully underwritten, and most frequently disputed element of cyber policies. Here is what you need to know:

Coverage scope. Most cyber policies cover ransomware negotiation expenses (professional negotiators are now standard), ransom payments (if deemed legal and authorized by the insurer), forensic investigation to determine the attack vector and scope, data restoration costs, business interruption during the recovery period, and notification and regulatory costs if data was exfiltrated before encryption.

Sub-limits and co-insurance. A growing number of insurers apply sub-limits to ransomware -- meaning your $2 million cyber policy might have a $500,000 sub-limit specifically for ransomware events. Additionally, many policies now include co-insurance provisions requiring the policyholder to bear 40-50% of the ransom payment. The purpose is twofold: to discourage ransom payments (which fund criminal enterprises and incentivize future attacks) and to incentivize stronger preventive controls.

Preconditions for coverage. Insurers have learned, painfully, that poor security hygiene is the primary enabler of successful ransomware attacks. As a result, most carriers now require specific security controls as preconditions for ransomware coverage. The most universally required control is multi-factor authentication (MFA) on all remote access, email, and privileged accounts. Businesses without MFA are virtually uninsurable for ransomware risk in 2026. Other common preconditions include endpoint detection and response (EDR), offline and tested backups, privileged access management, and network segmentation.

OFAC compliance. Under U.S. Treasury Department regulations administered by the Office of Foreign Assets Control (OFAC), ransom payments to sanctioned entities or jurisdictions are illegal regardless of the circumstances. Cyber insurers will not authorize payments that would violate OFAC sanctions, and making such payments exposes businesses to severe civil and criminal penalties. Before any ransom payment, insurers conduct sanctions screening -- a process that can take 24-72 hours during an active crisis. Businesses need to understand that ransomware coverage does not guarantee that a ransom can legally be paid.

Get Smarter About Business & Sustainability

Join 10,000+ leaders reading Disruptors Digest. Free insights every week.

Incident Response: The Hidden Value of Cyber Insurance

The single most underappreciated benefit of cyber insurance is not the financial coverage itself -- it is the access to incident response resources. When a breach occurs, the first 48 hours are decisive. The decisions made during that window determine how much data is compromised, how long systems remain offline, whether regulatory obligations are met, and how severely the company's reputation is damaged.

Virtually every cyber insurance policy includes access to a "breach response panel" -- a pre-vetted network of specialists that can be mobilized immediately. This typically includes:

Forensic investigators who determine the scope and cause of the breach, preserve evidence for potential legal proceedings, and provide the technical findings needed for regulatory notification. Top-tier forensic firms charge $300-$600 per hour, and an investigation for a mid-sized breach can cost $100,000-$500,000. Having this covered by insurance -- and pre-arranged for rapid deployment -- is invaluable.

Breach counsel -- specialized attorneys who manage the patchwork of notification requirements across multiple states and jurisdictions, manage regulatory communications, assess litigation exposure, and ensure compliance with all applicable laws. Breach notification requirements vary by state: some require notification within 30 days, others within 60 or 72 hours. Missing these deadlines triggers additional penalties.

Notification and call center vendors who handle the logistics of notifying affected individuals, providing credit monitoring enrollment, and managing the flood of inquiries that follows a public breach disclosure. For a breach affecting 50,000 individuals, notification costs alone can exceed $500,000.

Public relations and crisis communications firms that manage media inquiries, draft public statements, monitor social media, and develop communications strategies to preserve customer trust. Companies that communicate transparently and quickly during a breach suffer 15-25% less reputational damage than those that delay or minimize disclosure.

The key insight is this: a small or mid-sized business attempting to manage a breach without these resources is at a severe disadvantage. The insurer has already negotiated preferred rates with panel providers, established response protocols, and can coordinate the entire response within hours. This operational capability, not just the financial indemnification, is what makes cyber insurance a strategic asset rather than a mere cost center.

Compliance Requirements Driving Cyber Insurance Adoption

The regulatory landscape for data protection and cybersecurity has intensified dramatically over the past three years, and compliance obligations are now one of the primary drivers of cyber insurance adoption. Understanding the regulatory context is essential for evaluating your coverage needs.

State privacy laws. As of early 2026, 20 states have enacted comprehensive consumer privacy laws, with several more in legislative process. California's CCPA/CPRA remains the most stringent, with enforcement actions by the California Privacy Protection Agency accelerating and fines reaching into the millions. Each state law has distinct breach notification requirements, consumer rights provisions, and penalty structures. A business operating across multiple states faces a complex web of overlapping obligations that are expensive to handle without both legal counsel and insurance backing.

Healthcare (HIPAA). The Health Insurance Portability and Accountability Act imposes strict requirements on any entity that handles protected health information (PHI). HIPAA breaches carry penalties of up to $2.13 million per violation category per year, with a maximum of $2.13 million for all violations of an identical provision per year. The HHS Office for Civil Rights has increased enforcement actions by 60% since 2023. Healthcare organizations, their business associates, and any vendor that touches PHI should carry cyber insurance with explicit regulatory coverage.

Financial services (GLBA, NYDFS, SEC). The Gramm-Leach-Bliley Act, the New York Department of Financial Services Cybersecurity Regulation (23 NYCRR 500), and SEC cybersecurity disclosure rules impose overlapping security and notification requirements on financial institutions. The NYDFS regulation is particularly aggressive, requiring 72-hour breach notification, annual certification of compliance, and specific technical controls. Financial services firms that fail to comply face enforcement actions, fines, and potential loss of licensure.

PCI DSS 4.0. The Payment Card Industry Data Security Standard version 4.0, fully enforceable since March 2025, introduced significant new requirements for businesses that process card payments: mandatory multi-factor authentication for all access to cardholder data environments, enhanced monitoring and logging, customized security approaches, and continuous risk assessments. Non-compliance can result in PCI fines of $5,000-$100,000 per month, increased transaction fees, and ultimately loss of the ability to process credit cards.

International frameworks. The EU's General Data Protection Regulation (GDPR) applies to any business that processes data of EU residents, regardless of where the business is located. GDPR fines can reach 4% of global annual revenue or 20 million euros, whichever is higher. The EU's Digital Operational Resilience Act (DORA), effective January 2025, imposes specific ICT risk management requirements on financial institutions and their critical service providers. Businesses with international operations or customers need cyber policies that explicitly cover cross-border regulatory proceedings.

Contractual requirements. Beyond regulatory mandates, contractual obligations are driving cyber insurance adoption at every level of the supply chain. Enterprise clients routinely require vendors to carry $1 million to $5 million in cyber liability coverage. Government contracts increasingly mandate cyber insurance as a condition of eligibility. Commercial landlords are beginning to require tenants to carry cyber coverage, particularly for businesses handling sensitive data. These contractual requirements effectively make cyber insurance mandatory for any business that wants to compete for enterprise, government, or institutional clients.

Cost Factors: What Drives Cyber Insurance Premiums

Understanding the factors that drive your cyber insurance premium gives you direct control over your costs. Insurers evaluate eight primary variables when pricing a cyber policy:

Industry. This is the single largest pricing factor. Healthcare, financial services, and technology companies pay the highest premiums because they hold the most sensitive data and face the most stringent regulatory requirements. A healthcare organization pays 50-100% more than a professional services firm of comparable size. Retail and hospitality businesses that process high volumes of credit card transactions also face elevated premiums.

Revenue. Premiums scale with revenue because larger businesses have more data, more systems, more employees, and more exposure. A business with $1 million in revenue pays substantially less than one with $50 million, even in the same industry.

Volume and type of sensitive data. The more personally identifiable information (PII), protected health information (PHI), financial data, or intellectual property you store, the higher your premium. Insurers assess data volume, data types, data retention practices, and data minimization efforts during underwriting.

Security controls. This is the factor most directly within your control and the one with the greatest impact on premium after industry and revenue. Businesses that can demonstrate robust security controls -- MFA, EDR, backups, training, incident response planning, network segmentation, patch management -- qualify for preferred rates. Businesses with weak controls pay 25-75% more or may be declined entirely. We will detail the specific controls insurers evaluate in the next section.

Claims history. A prior cyber claim does not make you uninsurable, but it significantly increases your premium and may result in exclusions or higher retentions (deductibles) for similar events. A ransomware claim in the past three years can increase premiums by 30-60%.

Coverage limits and retention. Higher limits cost more; higher retentions (deductibles) cost less. A $1 million policy with a $10,000 retention costs substantially more than the same policy with a $50,000 retention. The right retention depends on your cash reserves and your tolerance for absorbing smaller losses.

Geographic scope. Businesses with international operations, particularly those subject to GDPR, pay higher premiums due to the expanded regulatory exposure. Multi-jurisdictional coverage costs more because the insurer assumes liability across multiple legal frameworks.

Third-party vendor risk. Insurers increasingly evaluate your supply chain risk: what vendors have access to your systems, how much data you share with third parties, and what security requirements you impose on your supply chain. A high-profile supply chain breach (like the SolarWinds or MOVEit incidents) can affect thousands of downstream businesses simultaneously.

For reference, approximate annual premium ranges in 2026 are: $1,000-$3,000 for small businesses (under $5M revenue, $1M limit); $3,000-$15,000 for mid-sized businesses ($5M-$100M revenue, $1M-$5M limit); $15,000-$100,000 for upper mid-market ($100M-$500M revenue, $5M-$10M limit); and $100,000-$500,000+ for large enterprises ($500M+ revenue, $10M+ limit).

How to Qualify for Lower Premiums: The Security Controls Insurers Demand

Cyber insurance underwriting has become dramatically more rigorous since 2022. Insurers learned through painful claims experience that businesses with weak security controls generated disproportionate losses. In response, the industry has shifted from trust-based underwriting (accepting the applicant's self-reported security posture) to evidence-based underwriting that verifies specific technical controls.

Here are the controls that directly impact your insurability and premium in 2026, ranked by their weight in underwriting decisions:

1. Multi-factor authentication (MFA). This is the single most important control. Insurers require MFA on all remote access (VPN, RDP), all email accounts, all privileged and administrative accounts, and all cloud service accounts. MFA on remote access alone reduces the probability of a successful ransomware attack by an estimated 90%. Businesses without full MFA are effectively uninsurable at reasonable rates in 2026.

2. Endpoint detection and response (EDR). Traditional antivirus is no longer sufficient. Insurers require EDR solutions that provide real-time monitoring, behavioral analysis, automated threat response, and forensic capability across all endpoints (workstations, servers, and increasingly mobile devices). Leading EDR platforms include CrowdStrike Falcon, Microsoft Defender for Endpoint, and SentinelOne. Insurers may request evidence of deployment coverage (percentage of endpoints protected) and alert response times.

3. Backup strategy. Insurers want to see the "3-2-1 rule" implemented: three copies of critical data, on two different media types, with one copy stored offline (air-gapped) or immutable. Critically, backups must be regularly tested through restoration exercises. Untested backups are as good as no backups -- multiple organizations have discovered during active ransomware incidents that their backup systems had silently failed months earlier. Demonstrating tested, offline, immutable backups can reduce your premium by 10-20%.

4. Employee security awareness training. Human error remains the leading cause of breaches. Phishing accounts for over 80% of initial access in ransomware attacks. Insurers require at least annual security awareness training for all employees, with many preferring quarterly training supplemented by simulated phishing exercises. Businesses that conduct regular phishing simulations and can demonstrate declining click rates over time receive premium credit.

5. Incident response plan. A documented, tested incident response plan demonstrates organizational preparedness. Insurers want to see a plan that identifies the response team, defines roles and responsibilities, establishes communication protocols, includes contact information for legal counsel and forensic firms, and has been tested through a tabletop exercise within the past 12 months. Simply having a plan on a shelf is not enough -- insurers increasingly ask when the plan was last tested and what changes resulted.

6. Patch management. Unpatched vulnerabilities are a primary attack vector. Insurers expect critical vulnerabilities to be patched within 14-30 days of disclosure, with emergency patches for actively exploited vulnerabilities applied within 48-72 hours. Automated patch management systems and documented patch policies earn premium credit.

7. Network segmentation. Flat networks -- where a breach of one system gives attackers access to everything -- generate the worst claims. Insurers prefer networks that segment critical systems, isolate operational technology from IT systems, and limit lateral movement through zero-trust architecture principles.

8. Privileged access management (PAM). Administrative and privileged accounts are the primary targets in sophisticated attacks. Insurers evaluate whether privileged accounts use dedicated credentials (not shared with daily-use accounts), are protected by MFA, have access logged and monitored, and follow least-privilege principles. Implementing a PAM solution can reduce your premium and, more importantly, dramatically reduce your actual risk.

The investment in these controls is not just an insurance play -- it is a direct risk mitigation strategy. Every dollar spent on improving your security posture reduces both your insurance premium and your probability of suffering a breach. The compounding return on security investment is one of the strongest economic arguments in modern business risk management.

Common Exclusions and Coverage Gaps to Watch

No insurance policy covers everything, and cyber policies contain important exclusions that every business owner should understand before a claim arises:

War and terrorism exclusions. Most cyber policies exclude losses arising from acts of war, including cyberwar. This exclusion gained prominence after the 2017 NotPetya attack, which was attributed to Russian state actors and caused $10 billion in global damages. Several insurers denied claims under war exclusions, leading to protracted litigation. In 2026, the industry has moved toward more precisely defined "hostile cyber activity" exclusions, but the language varies significantly between carriers. If your business is in a sector that could be targeted by nation-state actors (critical infrastructure, energy, financial services, defense supply chain), scrutinize this exclusion carefully.

Prior known events. Cyber policies do not cover breaches that were known or should reasonably have been known before the policy inception date. If you are aware of a vulnerability that has been exploited, or if you have received evidence of unauthorized access, purchasing a cyber policy after the fact will not cover the resulting losses.

Failure to maintain security controls. If your application represents that you have carried out specific controls (MFA, EDR, backups) and you fail to maintain those controls, the insurer may deny a claim. This is not hypothetical: there have been multiple reported cases of claim denials based on material misrepresentation of security controls in the application. Be accurate and conservative in your application responses.

Infrastructure and utility failures. Most policies exclude losses caused by failures of public infrastructure (power grid, internet backbone, cloud provider outages) that are not the result of a cyberattack directed at your systems. A widespread cloud outage that takes your systems offline is typically not covered unless it results from a targeted cyber event.

Betterment. Cyber policies pay to restore your systems to their pre-breach condition, not to upgrade them. If a breach exposes the need for a complete infrastructure overhaul, the insurer covers restoration, not improvement. Understanding this limitation is important for post-incident budgeting.

Bodily injury and property damage. Cyber policies cover digital losses, not physical ones. If a cyberattack on your operational technology systems causes a physical explosion, equipment damage, or personal injury, your cyber policy likely will not respond -- your general liability and property policies need to address those scenarios. As operational technology and IT systems become increasingly interconnected, this gap is one that businesses need to address explicitly with their broker through coordinated coverage across multiple policies.

Building Your Cyber Insurance Strategy: A Practical Roadmap

Purchasing cyber insurance is not a one-time transaction -- it is an ongoing risk management discipline. Here is a practical framework for building and maintaining your cyber insurance program:

Step 1: Assess your risk profile. Before approaching insurers, understand your own risk. What data do you collect, process, and store? Where does it reside? Who has access? What are your regulatory obligations? What would be the financial impact of a 7-day, 14-day, or 30-day system outage? What is the realistic cost of a breach affecting your customer base? This risk assessment informs both your coverage needs and your security investment priorities.

Step 2: Put in place baseline controls. Before applying for coverage, ensure you have MFA, EDR, tested backups, an incident response plan, and employee training in place. Applying without these controls results in either declination or prohibitively expensive quotes. Every dollar invested in security before applying for insurance pays dividends in lower premiums for years.

Step 3: Work with a specialized broker. Cyber insurance is a specialty line that requires expertise most general insurance brokers do not have. Work with a broker who specializes in cyber risk, understands the nuances of policy language, and has relationships with multiple cyber insurers. A good broker will benchmark your application against underwriting standards, identify coverage gaps, negotiate policy terms, and advocate on your behalf during claims.

Step 4: Right-size your coverage. Match your coverage limits to your actual exposure. A reasonable starting framework: $1 million for businesses with less than $10 million in revenue and limited sensitive data; $2-$5 million for businesses with $10-$100 million in revenue, significant data holdings, or regulatory exposure; $5-$10 million or more for businesses with $100 million+ in revenue, critical infrastructure dependencies, or extensive regulatory obligations. Your broker should model breach cost scenarios specific to your business to validate these figures.

Step 5: Review and renew strategically. Cyber insurance is not set-and-forget. Review your policy annually -- ideally 90-120 days before renewal. Update your application to reflect security improvements (which should lower your premium), report any incidents or near-misses that could affect underwriting, and reassess your coverage limits as your business grows. Between renewals, notify your broker immediately if you acquire another company, launch a new line of business, expand internationally, or experience a material change in your technology environment. These events can create coverage gaps that need to be addressed before a claim arises.

The businesses that get the most value from cyber insurance are those that treat it as one component of a thorough compliance and risk management strategy -- not as a substitute for security, but as the financial backstop that verifies a cyber event is a setback rather than a shutdown. In 2026, that distinction is increasingly the line between businesses that survive digital disruption and those that do not.

Disclaimer: This article is for informational purposes only and does not constitute insurance, legal, cybersecurity, or financial advice. Cyber insurance policies, coverage terms, exclusions, and pricing vary by insurer, state, and individual risk profile. The coverage descriptions, cost estimates, and regulatory information referenced in this article are general in nature and may not reflect your specific situation. Insurance requirements and cybersecurity regulations change frequently. You should consult with a licensed insurance professional specializing in cyber risk, a qualified cybersecurity advisor, and legal counsel before making cyber insurance or cybersecurity decisions for your business. Gray Group International is not an insurance provider, broker, or licensed advisor.

Discover more insights in Business — explore our full collection of articles on this topic.

Frequently Asked Questions

What does cyber insurance cover?+

Cyber insurance covers two broad categories: first-party losses (your direct costs) and third-party claims (liability to others). First-party coverage includes data breach notification and credit monitoring, forensic investigation, business interruption from cyber events, data restoration, ransomware negotiation and payment, crisis management, and public relations. Third-party coverage includes legal defense against lawsuits from affected individuals or businesses, regulatory fines and penalties, PCI (payment card industry) fines, and media liability. Most policies also include access to a breach response panel of pre-vetted forensic investigators, attorneys, and PR firms who can mobilize within hours of an incident.

How much does cyber insurance cost for small businesses?+

For small businesses with less than $5 million in revenue, cyber insurance typically costs $1,000 to $3,000 per year for $1 million in coverage. Mid-sized businesses with $5 million to $100 million in revenue pay $3,000 to $15,000 per year. Costs vary based on industry (healthcare and financial services pay more due to regulatory exposure), revenue, volume of sensitive data, security controls in place, and claims history. Businesses that can demonstrate strong cybersecurity hygiene -- multi-factor authentication, endpoint detection, encrypted backups, employee training, and an incident response plan -- qualify for significantly lower premiums than those with weak controls.

Does cyber insurance cover ransomware attacks?+

Most cyber insurance policies cover ransomware-related expenses, including ransom negotiation, ransom payment (if authorized), forensic investigation, data restoration, and business interruption losses during the recovery period. However, coverage conditions have tightened significantly since 2023. Many insurers now require policyholders to demonstrate specific security controls -- particularly offline backups, multi-factor authentication, and endpoint detection -- as preconditions for ransomware coverage. Some policies include sub-limits for ransomware that are lower than the overall policy limit, and a growing number of insurers require co-insurance (typically 50%) on ransom payments to discourage payment and incentivize stronger defenses. Always review your policy's ransomware endorsement carefully.

What security controls do insurers require for cyber insurance?+

In 2026, most cyber insurers require the following as minimum conditions for coverage: multi-factor authentication (MFA) on all remote access, email, and privileged accounts; endpoint detection and response (EDR) on all endpoints; regular, encrypted, and tested offline backups; a documented incident response plan; employee security awareness training (at least annually); network segmentation between IT and operational technology; timely patch management (critical patches within 30 days); and email filtering with anti-phishing protections. Insurers verify these controls through detailed application questionnaires and, for larger policies, independent security assessments. Failure to maintain declared controls can result in claim denial.

Is cyber insurance required by law?+

Cyber insurance is not explicitly required by federal law in the United States as of 2026, but it is effectively mandatory in many contexts. Several states require businesses handling personal data to maintain 'reasonable security measures,' and regulators increasingly view cyber insurance as evidence of such measures. Industry-specific regulations like HIPAA (healthcare), GLBA (financial services), and PCI DSS (payment processing) impose breach-related obligations that are extremely expensive to meet without insurance. Many enterprise contracts, government RFPs, and commercial leases now require vendors and tenants to carry minimum cyber liability coverage of $1 million to $5 million. The EU's DORA regulation (Digital Operational Resilience Act), effective January 2025, has accelerated the trend globally by requiring financial institutions to address ICT-related risks, which has driven cyber insurance adoption across the supply chain.

What is the difference between cyber insurance and general liability insurance?+

General liability insurance covers bodily injury, property damage, and personal injury claims from third parties -- physical-world risks like slip-and-fall accidents or product defects. It does not cover digital risks. Cyber insurance specifically covers losses arising from cyber events: data breaches, ransomware attacks, network security failures, and electronic data loss. General liability policies contain broad technology and data exclusions that explicitly remove coverage for cyber incidents. Some Business Owner's Policies (BOPs) offer minimal cyber endorsements with limits of $50,000 to $100,000, but these are wholly inadequate for any real cyber event. A standalone cyber liability policy is the only way to get meaningful coverage for digital risks, and the two policies complement each other rather than overlap.

GGI

GGI Insights

Editorial team at Gray Group International covering business, sustainability, and technology.

View all articles →

Resource from gardenpatch

Marketing Strategy Playbook

27 interactive modules covering research, targeting, demand generation, automation, and attribution. Build a marketing engine that compounds.

Get the playbook → $27 • Instant access

Key Sources

  • The average cyberattack costs an SMB $200,000 — enough to permanently close most small businesses (Hiscox Cyber Readiness Report 2023).
  • The average ransomware payment was $408,644 in Q1 2023, with total ransomware damages projected to surpass $57 billion globally in 2026 (Coveware).
  • Businesses required by insurers to implement security controls file 25% fewer claims than uninsured peers (Coalition).