Cyber insurance helps protect people and businesses from the damage caused by data breaches, system outages, and online attacks like ransomware. While it feels like a modern invention, it actually dates back to 1997. What started as a small insurance product for early online businesses has since grown into a global industry, shaped by real-world hacks, new regulations, and changing risks.

Lukas Grigas
December 16, 2025
Enjoy identity theft protection with fraud insurance
Get up to 71% off!
Get the Deal
30-day money-back guarantee
View promotion details.
The origin story of cyber insurance has been nicknamed “Breach on the beach.” In April 1997, at the Risk and Insurance Management Society (RIMS) conference in Honolulu, insurance broker Steven Haase gathered a small audience — about 20 people — under a tent near the shoreline. He presented a concept that few executives recognized as actionable: cyber liability insurance.
Haase had spent more than two years urging insurers to recognize that companies holding digital information faced real exposure. If unauthorized access occurred, if customer card numbers or private records were stolen, then claims and costs incurred would follow. In his view, if businesses insured fire, theft, and other negligence driven losses, the same logic should apply to a digital breach.
The American International Group, Inc. (AIG) — an American multinational finance and insurance corporation with operations in more than 80 countries and jurisdictions — agreed. Together they introduced the Internet Security Liability (ISL) policy — widely recognized as the first modern cyber insurance product in the history of cyber insurance. Its structure looked familiar to underwriters because it borrowed heavily from traditional liability insurance concepts. The ISL policy covered certain third-party losses tied to unauthorized access or the disclosure of customer data. If records were compromised and liability claims emerged, the insurer undertook specific financial consequences.
The policy’s exclusions revealed the uncertainty of the era. Internal sabotage or what now is known as insider threats fell outside coverage, not because insurers dismissed the problem, but because there was no accepted method for identifying intent or separating malicious tampering from system error. There were no actuarial tables to assess risk. Banks, processors, and retailers avoided disclosing cyber incidents, so loss histories didn’t exist. Haase said pricing was guided mostly by intuition.
Context made the moment more striking. The internet had about 40 million users in 1996. By 1997, estimates surpassed 100 million. Online commerce remained small. Amazon’s revenue rose from roughly $16M in 1996 to about $148M in 1997, figures that illustrate how young digital markets were at the time. Most early policyholders were e-commerce merchants storing credit card information on servers that would now be considered fragile: unpatched, minimally monitored, tucked into backrooms.
The first buyers weren’t aiming to insure complex infrastructure. They wanted financial protection if a stolen password or unauthorized access allowed someone to make off with card data. The ISL policy did not offer extortion coverage, business interruption, or first party reimbursement. But it formalized a principle — a digital breach could inflict financial harm measurable enough to insure.
It also marked the first entry in cyber insurance history — the recognition that networks could fail in ways that triggered legal, financial, and reputational consequences.
For several years, cyber insurance grew quietly and slowly. Y2K anxieties dominated budgets in 1999 and 2000. Companies poured resources into safeguarding their clocks, worrying that systems might misfire at midnight. Funding a novel liability policy felt unnecessary.
When the dot-com bubble burst soon after, many of the early online merchants — the intended core market for cyber policies — collapsed. Haase later recalled losing a third of his clients “overnight.” Those events stalled adoption, but they also exposed how fragile early e-commerce companies were, both technically and financially.
Companies generally underestimated their cyber risks. Many believed exposure rested with banks, payment processors, or software firms — not ordinary retailers. Some executives assumed that if a breach occurred, the costs incurred would be minor. Litigation, regulatory inquiries, and identity remediation felt remote.
Pricing instability didn’t help. Because insurers had no actuarial model — a mathematical framework used in insurance to assess risk, calculate premiums, and predict future claims — premiums varied by multiples from one carrier to another. One policy might include limited notification coverage, another might exclude remediation entirely. The absence of standardization made comparison nearly impossible. The phrase “information security” itself came with inconsistent definitions. Early policies were sometimes described as prototypes because each carrier wrote exclusions, triggers, and coverage terms differently.
Threat awareness lagged as well. Unauthorized access often began with missteps rather than sophisticated attacks: an unpatched server, an exposed credential, a misconfigured network segment. These weaknesses enabled spoofing attempts, crude phishing, as well as early forms of internet fraud that extracted passwords, payment data, or other identifiers. Internal mishandling was equally common: corrupted data due to mistakes or poor controls. Yet early policies frequently excluded internal sabotage or employee-related failures.
Still there was progress. Around 2000, Lloyd’s of London partnered with Counterpane Security to assess network vulnerabilities before binding coverage. That collaboration introduced the logic that later defined underwriting: Questionnaires, security controls, log practices, password standards, and assessments of how much personally identifiable information a company stored on its systems.
Although adoption remained limited, one thing became clear — any business collecting customer data could be breached. And even without consistent models, insurers were learning that unauthorized access did not belong solely to banks and large enterprises. The foundational logic of cyber coverage began to solidify, even if the cyber insurance market moved slowly.
The decisive push came from legislation. On July 1, 2003, California’s Security Breach Information Act (SB 1386) took effect — the first data breach notification law in the United States. It required organizations to notify California residents if personal data had been accessed unlawfully. Names, authentication details, account information, and other identifiers all fell under its protection.
This law mattered because it inserted real financial consequence into breach response. Notification was rarely simple. Companies needed legal counsel, forensic reviews, staffed call centers, and sometimes credit services. When other states passed similar laws, breach response became an unavoidable expense category.
With time, cyber insurance policies adjusted. First party coverage, once an exception, began to include forensic services, notification expenses, public relations, and crisis management. Remediation and identity support also appeared, especially as fraud followed stolen data. When records were compromised, many organizations began offering identity theft protection to affected customers.
SB 1386 also did something insurers had struggled to do — quantify consequences. When a breach requires disclosure, its impact becomes visible. That visibility turned cyber insurance from theoretical risk management into a practical tool — one intended to help organizations minimize cyber risks and meet obligations that no longer could be quietly handled or ignored.
Once notification laws settled into place, cyber insurance policies expanded. The line between liability insurance and broader protection sharpened. Policies began to include both third party and first party coverage. Businesses wanted reimbursement for internal expenses they carried after breaches: forensic investigation, legal guidance, external response vendors, and communication with regulators.
Coverage widened to address business interruption — an acknowledgment that networks could shut down entirely after intrusion. Encryption driven ransom demands introduced early versions of cyber extortion protection. Those early clauses eventually evolved into modern cyber extortion coverage, which addresses negotiation, reimbursement, and forensic support.
Healthcare institutions faced mounting risks under HIPAA. Breaches of protected medical records carried regulatory consequences. Policies reflected this by adding specific liability provisions tied to privacy failures in healthcare systems. At the same time, investigations revealed how deceptively small data fragments could enable fraud. A leaked identifier (password, email, etc.) might be used for account takeover, or as the foundation for online scams targeting individuals whose records had been exposed.
By 2010, more than 50 carriers offered standalone cyber insurance policies. Underwriting inquiries deepened. Applications asked about segmentation, incident plans, credential hygiene, backups, patching cadence, and how organizations approached the protection of personal information in internal databases.
Coverage growth had friction, though. Sublimits were common. Excess layers were difficult to place. The cyber insurance market was cautious, uncomfortable with how other carriers priced unfamiliar exposures. Early projections suggested cyber coverage premiums might hit $1 billion by 2003. In reality, it took until 2013 to reach that milestone.
Slow as the climb was, a steady foundation had been formed. Third party liability coverage evolved into comprehensive frameworks that addressed investigation, notification, extortion, business interruption, and data restoration. Cyber insurance had expanded because reality demanded it.
The next inflection point in the history of cyber insurance arrived in the mid-2010s, when breach disclosure became impossible to ignore. In 2014, often referred to as “the year of the retail breach,” several large U.S. retailers experienced high-profile intrusions. Target, Home Depot, Neiman Marcus, and others disclosed that unauthorized access had compromised tens of millions of payment card records. Attackers entered systems through a stolen login credential — a reminder that vulnerability did not always originate in complex malware. Sometimes it began with a single password.
Executives and boards that once regarded cyber liability insurance as optional now saw what major breaches could cost. Liability claims, class actions, regulatory inquiries, and remediation efforts all appeared on balance sheets. Insurers tracked these cases closely. The financial fallout transformed policy language from hypothetical response to documented loss estimation.
In 2015, hospitals and medical networks became high-value targets. Anthem, Premera Blue Cross, and CareFirst disclosed that millions of health records were accessed unlawfully. Exposure of medical and identifying information carried its own weight.
Leaked records led to identity misuse, account takeovers, altered health profiles, financial fraud, and even full blown identity thefts. Even limited fragments of data enabled criminals to simulate identity for malicious transactions or targeted internet fraud.
Market indicators shifted. More than 100 carriers entered the cyber insurance market. Coverage limits increased. Demand broadened beyond retailers and technology companies. Cyber insurance companies saw that if hospitals, pharmacies, and clinic networks could be breached, then any organization holding regulated records was at risk. Regulatory defense clauses became standard. So did coverage for notification, forensic work, investigation, reputational support, and contracts tied to cyber extortion mitigation.
The numbers behind these breaches made their own argument. Tens of millions of exposed records. Litigation costs measured in hundreds of millions of dollars. Even the best intrusion detection tools did not prevent compromise every time. Those facts became the strongest catalyst for adoption the market had yet seen.
COVID-19 reshaped the cyber insurance market quickly. Remote work became the default across entire industries. Office networks stretched through home routers, personal devices, and improvised configurations. Attack surfaces multiplied. Criminal groups adapted with speed, launching targeted social engineering campaigns, credential harvesting, and ransomware.
Ransomware attacks surged. Intrusions often began with routine lapses — reused passwords, misconfigured access controls, or outdated services. The rise in claims altered underwriting models. Insurers observed that “expected loss” was climbing, and cyber extortion costs — once a smaller subcategory — became central to policy calculations.
Some breaches led to credit card fraud, others led to account takeovers, unauthorized transactions, and coordinated online scams. Attackers exploited the blurred line between work systems and personal devices. When people wondered how records might be misused, echoes of older questions resurfaced: if personal identifiers vanish from protected servers, or if an attacker acquires pieces such as contact details, what can someone do with your phone number when it sits beside passwords or card data?
Cyberattack volume spiked more than 300% from the onset of the pandemic. Analysts estimated that the average U.S. data breach cost exceeded $8.6 million in 2020. Globally, billions of records were exposed throughout 2019 and 2020.
The cyber insurance market reacted quickly. Premiums climbed as loss ratios increased. Underwriters introduced stricter controls and required demonstrable security maturity before binding coverage. Companies faced questionnaires about multi-factor authentication, credential hygiene, access logs, segmentation, incident response plans, patch cadence, and much more. Many insurers examined how organizations protected personally identifiable information on internal networks, and whether failure to apply encryption or maintain backups could invalidate certain coverage triggers.
Despite volatility, demand grew. Analysts forecasted that cyber insurance premiums would reach the $20-billion threshold by mid-decade. The pandemic years accelerated both awareness and adoption, confirming that cyber liability insurance was no longer marginal. It was structural.
The cyber insurance market today reflects nearly three decades of evolution and maturity. Policies still share DNA with the original liability structure, but their scope is much wider and more detailed. Most include both third party and first party coverage. Business interruption, ransom-related costs, regulatory defense, data restoration, and breach response obligations are now core elements, not negotiated exceptions.
Carriers assess risk differently than they once did. Underwriting processes examine authentication controls, vulnerability scanning, patching schedules, endpoint detection, logging, access segmentation, and the formal practices organizations apply in decisions about how to protect your personal information. If controls fail to meet baseline standards, some carriers narrow coverage or decline quotations.
The consumer angle has widened, too. Individuals look to cyber guidance when confronted with internet fraud, online scams, leaked credentials, compromised banking information, or exposure to cyber extortion coverage concerns. What once seemed rare — unauthorized card transactions traced to a breached merchant, password theft, or simulated corporate emails — now fits into a well-documented threat landscape.
Variation still exists across carriers. Some policies maintain narrow triggers while others include digital asset restoration, negotiation vendors, forensic teams, and credit monitoring. Market appetite shifts yearly. Pricing differs widely. Regulatory fines and penalties are included in many forms, especially where breach notification statutes and privacy regimes hold organizations accountable for delayed disclosure or insufficient safeguards.
The history of cyber insurance shows a progression shaped by events rather than speculation.
History matters because it explains why policies look the way they do now. Every clause was shaped by real incidents, not theoretical fears. When you enter login details on a checkout page today, the act is quietly connected to a moment in 1997, when Haase tried to persuade a handful of skeptics that stolen card numbers could lead to claims and costs incurred.
Today’s cyber insurance policies — including provisions tied to breach response, forensic analysis, data restoration, negotiation support, or legal defense — emerged from that lineage.
Understanding cyber insurance history also helps explain why underwriting asks about authentication requirements, why premiums vary, why limits are scrutinized, and why coverage extends beyond cyber liability insurance into comprehensive frameworks that absorb operational, legal, and remediation costs. It also clarifies why policies do not replace security controls. They exist alongside them — a companion layer to the practices that reduce risk in the first place.
If the Honolulu gathering looks small from this distance, it’s only because the scale of digital life has grown. The questions remain familiar: What happens when systems fail? Who holds responsibility? How do you rebuild trust after unauthorized access or data loss? In 1997, those were new questions. Today, they are foundational.
A deal to celebrate!
Up to 71% off on identity theft protection with fraud insurance
Get the Deal
30-day money-back guarantee
View promotion details.
Lukas is a digital security and privacy enthusiast with a passion for playing around with language. As an in-house writer at Nord Security, Lukas focuses on making the complex subject of cybersecurity simple and easy to understand.
Enjoy identity theft protection with fraud insurance
Get up to 71% off!
Get the Deal
30-day money-back guarantee
View promotion details.
The credit scores provided are based on the VantageScore 3.0® credit score by TransUnion® model. Lenders use a variety of credit scores and may utilize a different scoring model from VantageScore 3.0® credit score to assess your creditworthiness.
You have numerous rights under the FCRA, including the right to dispute inaccurate information in your credit report(s). Consumer reporting agencies are required to investigate and respond to your dispute but are not obligated to change or remove accurate information that is reported in compliance with applicable law. While this plan can provide you assistance in filing a dispute, the FCRA allows you to file a dispute for free with a consumer reporting agency without the assistance of a third party.
No single product can fully prevent identity theft or monitor every single transaction.
Some features may require authentication and a valid Social Security Number to activate. To access credit reports, scores, and/or credit monitoring services (“Credit Monitoring Services”), you must successfully pass your identity authentication with TransUnion®, and your VantageScore 3.0® credit score file must contain sufficient credit history information. If either of these requirements is not met, you will not be able to access our Credit Monitoring Services. It may take a few days for credit monitoring to start after a successful enrollment.
NordProtect's dark web monitoring service scans various sources where users' compromised personal information is suspected of being published or leaked, with new sources added frequently. Service logos displayed in dark web monitoring alerts are provided by Logo.dev and represent services where users have accounts. These logos are included in alerts to help users quickly identify which service may have experienced a data breach affecting their personal information.
However, there is no guarantee that NordProtect will locate and monitor every possible site or directory where consumers' compromised personal information is leaked or published. Accordingly, we may not be able to notify you of all your personal information that may have been compromised.
Identity and cyber protection benefits are available to customers residing in the U.S., including U.S. territories and the District of Columbia, with the exception of residents of New York and Washington. Benefits under the Master Policy are issued and covered by HSB Specialty Insurance Company. You can find further details and exclusions in the summary of benefits.
Our identity theft restoration service is part of a comprehensive identity theft recovery package that offers a reimbursement of up to $1 million for identity recovery expenses. To access the support of an identity restoration case manager, you must file a claim with HSB, which NordProtect has partnered with to provide the coverage. HSB is a global specialty insurance company and one of the largest cyber insurance writers in the U.S.