AI security, cybersecurity, and cyber insurance research for modern businesses.

Cyber Insurance Exclusions to Watch For Before You Sign

Updated May 4, 2026

TL;DR: As cyber insurance markets harden, carriers are increasingly using specific exclusions to limit their liability in the face of systemic risks and poor security hygiene. To ensure your policy actually pays out during an incident, business leaders must scrutinize language regarding war acts, prior knowledge, failure to maintain security standards, and unencrypted mobile devices. Understanding these "gotchas" is critical for aligning your internal security posture with your contractual obligations.

The "all-perils" era of cyber insurance is over. In the early days of the market, policies were broad and exclusions were minimal as carriers competed for market share. Today, insurers are facing massive losses from ransomware and supply chain attacks, leading to a much more granular—and restrictive—underwriting process. For a modern business operator, the policy's exclusions are just as important as the limit of liability. If you don't account for these carve-outs, you may find your claim denied at the very moment you need capital most.

Understanding these exclusions requires a deep dive into how carriers categorize risk. While you might assume a policy covers "any hack," the reality is often contingent on how the hack occurred and what geopolitical tensions were at play.

1. The "Failure to Maintain" and Retroactive Date Clauses

Perhaps the most common trap for businesses is the "failure to maintain" exclusion. This clause essentially states that if your organization fails to maintain the security standards outlined in the original insurance application, the carrier can deny the claim. If you stated on your application that you utilize Multi-Factor Authentication (MFA) across all endpoints, but an attacker gained entry through a legacy VPN account that lacked MFA, your coverage is in jeopardy.

Furthermore, the Retroactive Date is a temporal exclusion. It specifies that the policy only covers incidents that occurred after a certain date. If a dormant piece of malware was planted in your network in 2023, but you didn't purchase the policy—or change carriers—until 2024, the carrier may argue the "occurrence" predates the policy inception, leading to a denial.

Critical Insight: Cyber insurance is not a substitute for a security program; it is a financial backstop for a functioning security program. Discrepancies between your insurance application and your actual security environment are the leading cause of denied claims.

2. Infrastructure and Outage Exclusions

Many policyholders are surprised to learn that cyber insurance does not provide a blanket guarantee for all business interruptions. A common exclusion involves failures of infrastructure that are not under the "direct operational control" of the insured.

  • Utility Failure: If a power grid failure or a regional internet backbone outage takes your business offline, standard cyber policies typically won't pay out, even if the outage was caused by a cyberattack on the utility provider.
  • System Failure vs. Security Breach: Some policies only trigger if a system goes down due to a malicious act. If an internal IT error or a botched software update (like the 2024 CrowdStrike incident) causes a global outage, you need specific "System Failure" endorsements to be covered.

When reviewing Cyber Insurance Coverage Types Explained: First-Party vs Third-Party, it is vital to check if "Dependent Business Interruption" is included, which extends coverage to outages at your critical vendors or cloud providers.

3. The Evolving "Act of War" and State-Sponsered Attacks

Historically, "Act of War" exclusions were meant to protect insurers from the catastrophic costs of physical battlefield conflicts. However, in the digital age, the line between criminal hacking and state-sponsored cyber warfare has blurred.

Following high-profile incidents like NotPetya, carriers like Lloyd’s of London have introduced modern war exclusions. These clauses may exclude coverage if an attack is deemed to be "attributed" to a sovereign state.

Exclusion TypeWhat it Typically ExcludesCommon Loophole/Defense
Traditional WarKinetic warfare, declared or undeclared.Usually does not apply to digital-only events.
State-Sponsered CyberAttacks by entities acting on behalf of a government."Attribution" is difficult; some policies require the government to officially "attribute" the attack.
Cyber OperationBroadly defined "major" attacks meant to disrupt another state.Carve-outs for "collateral damage" may exist for non-targeted businesses.
Infrastructure AttackAttacks on power grids, water, or telecommunications.Can be mitigated through specific "contingent business interruption" riders.

Given how Cyber Insurance Cost Factors: What Drives Your Premium are shifting, businesses should specifically look for "carve-back" language that ensures coverage for "cyber terrorism"—which is often treated differently than formal "acts of war."

4. Prior Knowledge and Pending Litigation

The "Prior Knowledge" exclusion prevents businesses from "buying insurance while the house is on fire." If senior management or the IT director was aware of a vulnerability, a network intrusion, or a suspicious series of pings before the policy began, those issues are excluded.

This is a major risk during mergers and acquisitions. For instance, Cyber Insurance for SaaS Companies: A Practical Guide often highlights the need for specialized "tail coverage" to handle liabilities that might be discovered after an acquisition but originated from prior mismanagement. If your team ignores a "critical" security alert in December and signs a new policy in January, a resulting breach in February will likely be excluded under the prior knowledge clause.

5. Betterment and Post-Incident Upgrades

A common point of friction during the recovery process is the "Betterment" exclusion. Insurance is designed to "make the insured whole"—essentially returning you to the state you were in before the loss. It is not intended to fund your digital transformation.

If your outdated servers are encrypted by ransomware, the insurance company will pay to restore the data and potentially replace the hardware with equivalent models. However, they will not pay the difference to upgrade you to the latest enterprise-grade flash storage or a more expensive cloud architecture.

  1. Hardware Replacement: Coverage typically pays for the "actual cash value" or "replacement cost" of similar equipment.
  2. Software: You are covered for the cost of reinstalling existing licenses, not for upgrading to a more secure version of the software.
  3. Security Improvements: If your forensic firm recommends installing a new $50k EDR (Endpoint Detection and Response) tool to prevent the breach from happening again, the insurer likely will not cover that cost.

Understanding How Cyber Insurance Claims Work: From Incident to Payout is essential for managing expectations regarding what the carrier will actually fund during remediation.

6. Social Engineering and Voluntary Transfers

While ransomware is the most famous cyber threat, Business Email Compromise (BEC) and social engineering actually cause more financial loss in many sectors. However, many "standard" cyber policies exclude—or severely limit—coverage for "voluntary" transfers of funds.

If an employee is tricked into wiring money to a fraudulent account, the insurer may argue that the company voluntarily authorized the transfer, rather than a "hack" occurring on the system itself. Many policies now require a specific "Social Engineering" or "Crime" endorsement, which often carries a much lower sub-limit (e.g., a $100k sub-limit on a $1M total policy).

Key takeaways

  • Audit Your Application: Ensure every security control claimed on your application (MFA, backups, patching) is actually in place; failures here lead to total claim denial.
  • Check the Sub-limits: Exclusions often come in the form of "sub-limits" for things like social engineering or regulatory fines.
  • Verify Retroactive Dates: Avoid gaps in coverage when switching carriers by ensuring your "Retroactive Date" remains as far in the past as possible.
  • Differentiate Cyber vs. War: Understand how your policy defines state-sponsored attacks and ensure "Cyber Terrorism" is covered.
  • Consult the SOC: Your security operations team should review the "Failure to Maintain" clauses to ensure they can meet the technical requirements of the contract.

For a broader look at the landscape, consult our Cyber Insurance: The Complete 2026 Buyer's Guide for Modern Businesses.

Frequently asked questions

Related reading