Cyber insurance coverage checklist

As cyber threats continue to escalate, cyber insurance has shifted from a niche product to a critical safety net for businesses of all sizes. The statistics are unsettling — in 2024, the global average cost of a data breach has reached an all-time high of $4.88 million according to IBM [1]. Our insurance coverage checklist will help you understand what to look for in a policy, with an emphasis on the most important coverage areas. By knowing what your organization needs and what it’s signing up with a policy, your organization will be more resilient against the potentially devastating financial impact of cyberattacks.

Author image

Irma Šlekytė

December 11, 2025

20 min read
Background confetti decoration

Enjoy identity theft protection with fraud insurance

Get up to 71% off!

30-day money-back guarantee

View promotion details.

What is cyber insurance coverage?

Cyber insurance coverage is the specific scope of financial protection and entitlements provided by an insurance policy to protect individuals and businesses from losses related to cyber incidents, such as data breaches, ransomware attacks, and related legal liabilities. However, this guide focuses specifically on cyber insurance coverage for businesses.

Unlike the broad protection of general liability insurance, which often excludes digital risks, cyber insurance coverage specifically addresses the unique costs associated with data theft, system recovery, and digital crisis management. Your business’s risk exposure often determines the scope of protection, and insurers may limit coverage unless you show you’re using proactive cybersecurity measures to defend against online threats.

Types of cyber insurance coverage

Most cyber insurance policies fall under two main categories — first-party coverage and third-party coverage. It’s important to understand this distinction in order to protect your business against both direct losses and external claims.

First-party coverage

First-party coverage protects your business from the direct financial costs it incurs as a result of a cyber incident. This coverage is essential for getting business operations back up and running. Key areas typically covered are explained below:

  • Data breach response costs include expenses for managing the aftermath of a data breach, including notifying affected individuals and providing credit monitoring services to those whose personal information was compromised. Data breach response costs also include the expenses of incident response teams, customer notification systems, and other breach management expenses.
  • Business interruption and lost income is revenue lost while systems are offline. First-party coverage typically provides financial protection for income losses that occur when your systems are compromised and operations are disrupted.
  • Cyber extortion and ransomware payment coverage is a standard component of first-party coverage in most cyber insurance policies for large businesses.
  • Data recovery and system restoration costs include the expenses required to restore your digital assets and get systems operational again.
  • Crisis management and public relations costs typically consist of fees for experts to manage the reputational fallout. While not explicitly detailed in every policy description, these costs are usually included in first-party coverage from major insurers.
  • Forensic investigation expenses are the cost of hiring IT forensics to determine the cause and scope of the breach. Coverage for investigation expenses is a standard component of first-party cyber insurance coverage.

Third-party coverage

Third-party coverage protects your business against claims, lawsuits, and penalties filed by others — such as customers, partners, or regulators — who have been harmed by a security incident in your organization. Key areas typically covered are listed below:

  • Network security liability is the defense against claims that your security failure caused damage to a third party. Coverage for network security liability covers losses incurred by clients, customers, partners, or vendors as a result of a security failure.
  • Privacy liability are the costs arising from failing to protect sensitive personal information of third parties. 
  • Media liability is the protection against claims of defamation or copyright infringement in digital media. Third-party insurance provides coverage against defamation, libel, slander, IP theft, and copyright infringement in your digital communications.
  • Regulatory fines and penalties include fines levied by government bodies for non-compliance (where legally insurable), payments to consumers required by privacy laws, regulatory proceedings, and regulatory penalties.
  • Legal defense costs include legal defence costs (attorney fees) and court costs for cyber-related lawsuits, brought against your organization.
  • Settlements and judgments are payouts you are legally obligated to make to injured parties, such as settlements, damages, and regulatory fines and penalties resulting from cyber incidents.

Essentials items on your cyber insurance coverage checklist

To make sure the insurance policy protects your business on all relevant fronts, evaluate these 10 critical coverage areas. 

Your cyber insurance coverage checklist

Coverage area

What to check for

Data breach response expenses

Coverage for notification of affected individuals

Coverage for specialized attorney services

Credit monitoring services for affected individuals

Call center services for affected individuals

Coverage for timely notification of affected individuals

Cyber extortion and ransomware coverage

Ransom payment coverage 

Coverage limits for ransomware attacks

Ransomware sublimits

Coinsurance clauses

Insurer’s rules about ransomware payments

Business interruption and extra expenses

Waiting period before coverage begins

Maximum recovery period covered

Business interruption sublimits

Extra expenses coverage

Coverage for dependent business interruption

Data recovery and system restoration

Data recovery from backups

Manual recreation of lost data

Data restoration sublimits

Coverage for professional recovery specialists

System-related exclusions 

Coverage for system restoration to pre-attack state vs. security upgrades 

Network security and privacy liability

Coverage for security failures and privacy violations

Coverage for regulatory compliance failures

Coverage for claims resulting from your system being used to attack others

Exclusions for contractual liability

Coverage for different types of breached data

Regulatory fines and penalties

Coverage for penalties related to industry specific regulations

Coverage for regulatory fines

Costs of responding to regulatory investigations

Crisis management and reputation repair

Coverage for immediate crisis response

Coverage longer-term reputation restoration efforts

Coverage for PR consultants, media communications, and crisis management experts 

Sublimits for reputation repair

Duration of coverage for reputation management

Social engineering and funds transfer fraud

Social engineering fraud coverage

Sublimit for social engineering claims

“Callback verification” requirements

Coverage extensions for social engineering fraud

Incident response and forensic investigation

Immediate access to experts

A pre-approved vendor panel of forensic firms, breach counsel, and incident response specialists

A separate limit for incident response costs

A 24/7 access to incident response services

Legal defense costs and settlements

Defense costs — either “within limits” or “outside limits” 

“Burning limits”

Separate pools of money for different claims

Caps on legal defense costs

1. Data breach response expenses

A data breach triggers a cascade of immediate costs. These costs include forensic investigation to identify the source, legal counsel to determine notification obligations, and the costs of notifying affected individuals. Among said individuals may be your employees, customers, business partners, vendors and contractors, job applicants, stakeholders and investors, former employees, beneficiaries and dependants, and patients or students. The costs may skyrocket fast — that’s why your cyberattack coverage should include data breach response expenses.  

Checklist items:

  • Verify the policy covers all notification requirements across the various states and jurisdictions where your business operates.
  • Ensure coverage for a specialized attorney who coordinates your breach response and helps navigate legal obligations.
  • Confirm adequate coverage for credit monitoring services for affected customers, employees, and other individuals whose data was compromised.
  • Depending on the size of your business and the possible number of affected individuals, check if the policy includes call center services to handle inquiries from affected individuals.
  • Verify coverage meets specific timing requirements because some regulations require notification within as little as 72 hours.

2. Cyber extortion and ransomware coverage

With ransomware attacks becoming ubiquitous, cyber extortion and ransomware coverage assists with ransom demands, hiring professional negotiators, and covering recovery costs. In 2024, the average ransom demand reached $600,000 [2], and ransomware continues to be the leading cause of cyber insurance losses.

Checklist items:

  • Confirm the policy includes ransom payment coverage (where legally permissible) and post-attack system restoration, not just negotiation fees.
  • Verify coverage limits for ransomware attacks, which range from tens of thousands to several million USD.
  • Check for specific ransomware sublimits that may restrict coverage below the overall policy limit.
  • Review any coinsurance clauses that might require your business to pay a percentage of the ransomware loss (typically around 25%).
  • Make sure you know the insurer’s rules about ransomware payments. Most policies require insurer approval before making any ransom payment.

3. Business interruption and extra expenses

When a cyberattack halts your operations, you’re losing money by the minute. Business interruption and extra expenses coverage compensates for lost revenue and extra costs needed to keep your business running during recovery.

Checklist items: 

  • Check the waiting period before coverage begins (typically 6-12 hours for cyber incidents [3]).
  • Verify the maximum recovery period covered, which typically ranges from 60 days to 180 days.
  • Look for business interruption sublimits, which are often much lower than your overall policy limit.
  • Confirm whether the policy covers extra expenses like overtime pay.
  • Check if coverage extends to dependent business interruption when your vendors or service providers are attacked.

4. Data recovery and system restoration

When cyberattacks corrupt or destroy your data, recovery costs add up quickly. Data recovery and system restoration coverage pays for retrieving, restoring, or recreating your digital assets after an incident.

Checklist items:

  • Verify your policy covers both data recovery from backups and the more expensive manual recreation of lost data when backups aren’t viable.
  • Check for specific data restoration sublimits, which may be much lower than your overall policy limit.
  • Confirm coverage for professional recovery specialists who can properly restore affected systems.
  • Review any exclusions related to your systems that might void coverage.
  • Understand that most policies will restore systems to their pre-attack state but won’t pay for security upgrades (the so-called betterment).

5. Network security and privacy liability

Network security and privacy liability coverage protects you when third parties (customers, partners, or even other businesses) sue your business after a data breach or security failure. It covers legal expenses, settlements, and damages resulting from claims alleging your security failure harmed others.

Checklist items:

  • Confirm coverage for both security failures (breaches, malware infections) and privacy violations (mishandling customer data).
  • Verify coverage extends to claims related to regulatory compliance failures across all applicable jurisdictions.
  • Check if the policy covers claims resulting from your system being used to attack others (like malware distribution).
  • Review exclusions for contractual liability because claims based on service agreements might not be covered.
  • Make sure there’s no gap in coverage for different types of breached data (electronic, paper records, or employee information).

6. Regulatory fines and penalties

When regulators investigate a data breach, your business faces both defense costs and potential fines. Coverage for regulatory fines and penalties helps protect you from these significant financial impacts, which vary widely by industry and jurisdiction.

Checklist items:

  • Verify coverage includes fines and penalties related to your industry’s specific regulations (HIPAA, GDPR, PCI-DSS, etc.).
  • Check if regulatory fines are covered because some policies exclude them entirely.
  • Confirm coverage limits are adequate for your regulatory exposure (healthcare organizations should consider at least $1.5 million for HIPAA violations [4]).
  • Understand that regulatory fine insurability varies by jurisdiction — some regions prohibit insurance coverage for certain penalties.
  • Review whether your policy covers both the costs of responding to regulatory investigations and the actual penalties imposed.

7. Crisis management and reputation repair

A cyberattack doesn’t just damage your systems — it can devastate your brand reputation. Crisis management and reputation repair coverage pays for PR experts and communication strategies to protect your company’s image and customer trust following a security incident.

Checklist items:

  • Verify if your policy covers both immediate crisis response and longer-term reputation restoration efforts.
  • Check for specific “reputational harm coverage” that addresses lost earnings from adverse media coverage after an incident.
  • Confirm whether the policy covers the costs of PR consultants, media communications, and specialized crisis management professionals.
  • Review any sublimits for reputation repair, as these are often much lower than overall policy limits.
  • Check the duration of coverage for reputation management — some policies limit support to 60-90 days after the incident.

8. Social engineering and funds transfer fraud

When employees are tricked into transferring funds to fraudsters impersonating executives of vendors, many businesses are shocked to discover their cyber policy doesn’t cover the loss. So make sure your policy includes social engineering and funds transfer fraud coverage.

Checklist items: 

  • Look specifically for social engineering fraud coverage because standard cyber policies often exclude these losses.
  • Check the sublimit for social engineering claims, which is typically much lower than your overall policy limit.
  • Consider combining cyber and crime policies for better protection because this strategy allows you to stack coverage limits for these specific threats.
  • Review any “callback verification” requirements that might limit coverage if your staff doesn’t follow specific verification procedures before transfers. Callback verification is a security requirement in many policies that requires your team to verify fund transfer requests through a different communication channel than the original request.
  • Check for coverage extensions specifically designed to address social engineering fraud.

Incident response and forensic investigation

When a cyberattack occurs, every minute counts. Incident response coverage gives you immediate access to specialized experts who can investigate the breach, contain the attack, and preserve evidence for potential legal proceedings:

Checklist items:

  • Review whether the insurer offers a “nil deductible” for incident response, which allows immediate access to experts without out-of-pocket costs.
  • Check if the insurer maintains a pre-approved vendor panel of forensic firms, breach counsel, and incident response specialists.
  • Determine if you can choose your own response team or must use the insurer’s panel providers.
  • Verify if incident response costs have a separate limit from your main policy, which protects your coverage for other losses.
  • Confirm the policy includes 24/7 access to incident response services because breaches are rarely limited to business hours.

10. Legal defense costs and settlements

Litigation can drain your resources quickly. Legal defense coverage makes sure your legal fees are covered when facing lawsuits from affected customers, business partners, or class actions following a data breach

Checklist items:

  • Verify whether defense costs are “within limits” (eroding your coverage) or “outside limits” (preserving your full coverage for settlements).
  • Check if your policy has “burning limits” because most cyber policies deduct defense costs from your available coverage.
  • Check if your policy provides separate pools of money for different claim types (sometimes called “coverage towers”), which makes sure that expenses from one type of claim won’t reduce what’s available for other types of claims.
  • Review policy caps on legal defense costs because some policies limit defense coverage to a relatively small percentage of the total policy limit.
  • Consider higher coverage limits or umbrella policies because data breach litigation can quickly exhaust standard limits.

Common cyber insurance exclusions to watch for

Understanding what isn’t covered in your policy is as important as knowing what is. Common exclusions include:

  • Acts of war or cyber terrorism.
  • Pre-existing security vulnerabilities you knew about but didn’t fix.
  • Betterment costs, which means the insurer will pay to restore your system to its previous state but not to upgrade it to a better one.
  • Intentional acts by employees.
  • Physical damage to hardware or property.
  • Reputational damage beyond immediate crisis management.
  • Intellectual property theft or infringement claims.
  • Contractual liability.
  • Regulatory fines and penalties in certain jurisdictions.

Important: Always read the policy exclusions carefully and ask your cyber insurance provider to clarify any unclear language.

Cyber insurance requirements: What insurers look for

Insurance providers tend to view cybersecurity as a partnership rather than just a product. To qualify for a policy or secure better rates, businesses typically must demonstrate the following security controls:

  • Multi-factor authentication (MFA) is a standard security element required for remote access, email, and admin accounts. Most insurers demand the company to use MFA for policy issuance or renewal.
  • Endpoint detection and response (EDR) tools monitor devices for suspicious activity. Most insurers now require EDR rather than traditional antivirus software, especially for organizations looking for higher coverage limits.
  • Regular data backups. Insurance providers specifically look for backups that are encrypted and kept offline, air-gapped, or immutable to protect against ransomware. Many carriers now require testing of backups through recovery drills to verify their effectiveness.
  • Security awareness training helps employees recognize phishing and other online scams. Your company should carry out annual security awareness training and phishing simulations.
  • Vulnerability management. Regular patching of software and systems.
  • Incident response plan. A documented strategy for handling potential breaches.

Meeting these requirements not only helps qualify for coverage but can significantly lower your premiums. Larger organizations should also be prepared for questions about privileged access management and zero-trust architecture adoption because these newer security approaches are increasingly making their way onto insurers’ checklists for coverage.

How to choose the right cyber insurance policy

Finding the right cyber insurance relies on understanding your business needs and comparing policies. You can approach the process this way:

Assess your cyber risk profile

Start by evaluating your specific exposure. Consider the volume of sensitive data you handle, your reliance on digital infrastructure, and your industry’s regulatory requirements. A detailed risk assessment helps you avoid overpaying for unnecessary features or underinsuring critical risks.

Determine appropriate coverage limits

Calculate the potential financial impact of a breach. According to IBM’s 2024 Cost of a Data Breach Report, the global average cost of a data breach reached $4.88 million in 2024 [5], which is a significant increase from previous years.

According to multiple authoritative sources, smaller businesses with limited customer data typically start with $250,000 to $500,000 in coverage [6], while mid-sized organizations with more significant exposure may require $2-5 million in coverage, and large corporations often need over $10 million in protection [7]. The maximum coverage available from many providers typically caps at around $5 million [8], though businesses with higher needs can discuss additional coverage options with their insurers.

Compare policies and providers

Don’t just look at the premium price of a policy. Evaluate the breadth of first and third-party coverage, the reputation of the insurer for paying claims, and the specific sublimits for ransomware or fraud. Also, check if the policy includes value-added services like breach coaches or security training tools.

Industry-specific considerations

Different industries face their own unique cyber risks. Here’s what to look for in your sector:

  • Healthcare. Healthcare organizations face specific risks related to patient data protection and regulatory requirements, such as HIPAA compliance, coverage for regulatory fines, and protection for electronic health records.
  • Financial services. Financial institutions also need protection against fraudulent fund transfers (wire transfer fraud) and social engineering attacks, which often have lower coverage limits than the overall policy.
  • Retail and e-commerce needs coverage for PCI fines and business interruption, especially during peak sales seasons. Protection for payment card data security is crucial for this sector.
  • Manufacturing. Manufacturers need coverage for operational technology systems, production downtime, and supply chain disruptions. They face challenges protecting both IT and industrial control systems.
  • Education. Educational institutions store large amounts of sensitive information, so they require protection for student data breaches and ransomware attacks.

Common mistakes made when buying cyber insurance

Even the most careful businesses can fall into these traps when purchasing cyber insurance:

  • Assuming general liability covers digital security incidents. Standard business policies almost always exclude cyber risks.
  • Not reading policy exclusions carefully. Failing to notice exclusions for “unencrypted devices” or “social engineering” can leave you exposed when you need coverage most.
  • Choosing the cheapest option. Low premiums often mean lower limits or broader exclusions that could cost you far more in the long run after an incident.
  • Failing to disclose security gaps. Inaccurate information on your application can void the policy.
  • Not updating your coverage. As your business grows, your coverage limits should too.
  • Overlooking social engineering coverage. Standard cyber policies often exclude or severely limit coverage for phishing and business email compromise attacks through “voluntary parting” exclusions. You may need specific crime coverage for these increasingly common threats.
  • Not understanding coverage periods. Cyber policies often have specific reporting requirements that might not align with when you discover an incident, which may leave gaps in your protection.

Take the time to understand your company’s risk profile, carefully review policy provisions with a knowledgeable advisor, and remember that the right coverage is about much more than just price — it’s about finding protection that truly aligns with your specific business vulnerabilities.

How NordProtect can help

While cyber insurance protects the business entity, the human element remains a significant vulnerability. NordProtect offers individual identity theft protection that businesses can provide as a benefit to their employees, creating an additional layer of defense. 

By protecting your team’s personal identities, you help reduce the risk of distracted employees and compromised credentials. NordProtect features include:

  • Dark web monitoring. We check if employees’ personal information has been exposed, alerting them before it can be used for identity theft.
  • Credit monitoring. We alert our users about any new or suspicious credit activity that could potentially indicate identity theft.
  • Identity recovery. NordProtect offers up to $1M in coverage to help you get back on track after identity theft as well as expert support in navigating the identity recovery process.
  • Cyber extortion protection. Users who are targeted by cyber extortion can claim financial help and professional advice on handling the situation.
  • Online fraud coverage. NordProtect provides reimbursement for employees who fall victim to various online scams and internet fraud, helping them recover financially.

By offering your teams identity theft protection as a perk, you’re boosting your employees’ confidence in you as an employer. Beyond showing your employees that you care about their digital safety, you’re also raising awareness about cyber threats and the importance of security best practices. You’re helping your employees discover how to protect their personal information.

This heightened security mindset often carries over to workplace behaviors and helps create a stronger overall security culture that benefits both your organization and your team members. 

Background confetti decoration

A deal to celebrate!

Up to 71% off on identity theft protection with fraud insurance

30-day money-back guarantee

View promotion details.

References

[1] Bonderud, D. “Cost of a data breach 2024: Financial industry.” IBM. 2024. [Online]. Accessed December 8, 2025. https://www.ibm.com/think/insights/cost-of-a-data-breach-2024-financial-industry

[2] Attig, C.J., Pennesi E.J. “Cybersecurity insurance — a burgeoning global market.” Morgan Lewis. Published October 10, 2025. Accessed December 8, 2025. https://www.morganlewis.com/blogs/sourcingatmorganlewis/2025/10/cybersecurity-insurance-a-burgeoning-global-market

[3] Butler J, Stransky S. “Differences between traditional business interruption and cyber business interruption policies.” PLUS. Published October 22, 2024. Accessed December 8, 2025. https://plusweb.org/news/differences-between-traditional-business-interruption-and-cyber-business-interruption-policies/

[4] Trang B. “Frustrated with Change Healthcare breach, senators propose removing limits on HIPAA fines.” STAT News. Published October 23, 2024. Accessed December 8, 2025. https://www.statnews.com/2024/10/23/change-healthcare-hipaa-violation-fines-new-bill-eliminates-caps/

[5] IBM. “Cost of a data breach report 2024.” Published July 2024. Accessed December 8, 2025. https://cdn.table.media/assets/wp-content/uploads/2024/07/30132828/Cost-of-a-Data-Breach-Report-2024.pdf

[6] Collier K. “What cyber insurance limits should your firm carry?” ACEC/MA. Published November 9, 2021. Accessed December 8, 2025. https://www.acecma.org/news/what-cyber-insurance-limits-should-your-firm-carry/

[7] FirstPolicy. “Industry benchmarks for cyber insurance policy: what the latest data says about coverage adequacy.” Published November 21, 2024. Accessed December 8, 2025. https://firstpolicy.com/industry-benchmarks-for-cyber-insurance-policy-what-the-latest-data-says-about-coverage-adequacy/

[8] TechInsurance. “How much cyber liability insurance do you need?” Accessed December 8, 2025. https://www.techinsurance.com/cyber-liability-insurance/how-much-do-you-need

Author image
Irma Šlekytė

Focusing on identity theft prevention, Irma breaks down the latest online threats and how to stay ahead of them. She wants to help readers stay informed and shares practical solutions to protect themselves.