Definitive Guide

Common Cyber Insurance Exclusions and How to Avoid Them

Your cyber insurance policy has exclusions that could leave you unprotected when you need coverage most. Here is what to watch for and how to close the gaps.

FK

Farhad Mirza Khawar

Founder of HIPAA Agent and Cyber Defense Agent. Compliance infrastructure for SMBs. Sacramento, CA.

2026-05-01

Why exclusions matter more than limits

Most business owners focus on their cyber insurance limit — the maximum the policy will pay. But exclusions determine whether the policy pays at all. A $5 million policy with a broad exclusion that applies to your incident pays exactly zero dollars. Cyber insurance policies contain more exclusions than most other commercial insurance products. The cyber risk landscape evolves rapidly, and carriers use exclusions to manage emerging risks they are not yet comfortable underwriting. This means the exclusions in your policy today may be different from those in your policy last year — and different from those in the policy you are comparing from another carrier. The challenge for SMB owners is that exclusions are written in dense legal language buried deep in the policy document. Most business owners never read them. Most brokers provide only a summary. And the first time many businesses discover an exclusion is when their claim is denied. Reading and understanding your policy exclusions before an incident is one of the most valuable things you can do for your business. This guide covers the most common and most dangerous exclusions, explains how they work in practice, and shows you how to close the gaps.

The war and nation-state exclusion

The war exclusion is the most controversial and potentially devastating exclusion in cyber insurance. Originally designed to exclude losses from conventional warfare, carriers have attempted to apply this exclusion to cyberattacks attributed to nation-state actors. The landmark case is Merck v. Ace American Insurance, where Merck suffered $1.4 billion in losses from the NotPetya malware. Ace American (now Chubb) denied the claim under the war exclusion, arguing that NotPetya was a Russian military cyberattack. A New Jersey court ruled against the carrier, finding that the war exclusion applied to traditional armed conflict, not cyberattacks. However, the ruling applied to Merck's specific policy language, and carriers have since revised their war exclusions to explicitly address cyber warfare. Modern cyber policies use updated "cyber war" or "hostile cyber activity" exclusions that specifically address cyberattacks by nation-state actors. The language varies significantly between carriers. Some exclude only attacks that occur during a declared cyber war (narrow exclusion). Others exclude any cyberattack attributed to a nation-state actor (broad exclusion). The difference can be millions of dollars. To protect yourself, request policies with narrow war exclusions that require a formal attribution by a recognized government authority before the exclusion applies. Avoid policies with broad war exclusions that allow the carrier to deny claims based on their own assessment of attribution. Discuss this specific exclusion with your broker — it is one of the most important coverage details in your policy. Cyber Defense Agent cannot prevent a nation-state attack, but strong security controls reduce the likelihood of your business being collateral damage in state-sponsored campaigns. Most nation-state-attributed malware exploits basic security gaps that CDA identifies.

The most common exclusions that trip up SMBs

Beyond the war exclusion, several other exclusions frequently catch SMBs off guard. Failure to maintain minimum security standards is becoming more common. If your policy requires specific controls (MFA, encryption, patching) and you fail to maintain them, the carrier can deny claims. This is different from material misrepresentation on your application — this exclusion applies even if you truthfully told the carrier about your controls at application time but subsequently stopped maintaining them. Cyber Defense Agent's continuous monitoring creates documented evidence that you maintained controls throughout the policy period. Prior knowledge or prior acts exclusions deny coverage for incidents that began before the policy inception or that you knew about before purchasing coverage. If you discovered a vulnerability, experienced suspicious activity, or were notified of a breach before your policy started, related claims may be excluded. This is why retroactive dates matter — a policy with a retroactive date that predates any potential prior acts provides better protection. Unpatched or known vulnerability exclusions deny claims for incidents exploiting vulnerabilities for which patches were available but not applied within a reasonable timeframe (typically 30-60 days after patch release). Ransomware groups routinely exploit vulnerabilities that have been patched for months. This exclusion is entirely avoidable with a disciplined patch management program. Social engineering exclusions are particularly dangerous because BEC and social engineering attacks are among the most common cyber incidents. Many standard policies exclude losses resulting from employees being tricked into transferring funds or sharing credentials. You need a specific social engineering endorsement to cover these losses. Infrastructure and utility failures may be excluded. If a power outage, internet service provider failure, or cloud service outage causes your data loss or business interruption, standard cyber policies may not cover the resulting losses. These events are not cyberattacks, so they fall outside the policy's triggering events. Bodily injury and property damage are almost universally excluded from cyber policies. If a cyberattack causes physical harm (compromised medical devices, manipulated industrial controls), the resulting bodily injury and property damage claims are excluded from your cyber policy and may or may not be covered by your general liability or property policies.

How to close exclusion gaps

No policy covers everything, but you can significantly reduce your exposure to exclusions through proactive measures. Read your policy before an incident. This sounds obvious, but most business owners have never read their cyber policy exclusions. Set aside one hour to read the exclusions section with your broker. Identify every exclusion and assess whether it applies to your business. Negotiate narrower exclusions. Many exclusions can be narrowed or removed through negotiation. Carriers have more flexibility than most businesses realize. Use your Cyber Defense Score as leverage — carriers are more willing to narrow exclusions for businesses that demonstrate strong security controls. Add endorsements for critical gaps. Social engineering coverage, system failure coverage, contingent business interruption, and other endorsements can close common gaps. Each endorsement adds cost, but the coverage is worth it if the risk applies to your business. Maintain the controls your policy requires. If your policy requires MFA, encryption, patching, or other specific controls, maintain them continuously throughout the policy period. Cyber Defense Agent's weekly scanning creates documented evidence of ongoing compliance with policy requirements, protecting you from the "failure to maintain" exclusion. Coordinate with other policies. Exclusions in your cyber policy may be covered by other policies (general liability, property, professional liability). Review all your policies together with your broker to identify and close coordination gaps. The goal is a coverage program with no gaps between policies. Document everything. In the event of a claim dispute over an exclusion, documentation is your best defense. Cyber Defense Agent scan history, remediation records, and continuous monitoring evidence all support your position that you maintained reasonable security practices throughout the policy period.

Key Takeaways

TL;DR

Exclusions determine whether your policy pays at all — a $5 million policy with an applicable exclusion pays zero.

The war/nation-state exclusion is the most controversial — insist on narrow language that requires formal government attribution before the exclusion applies.

Failure to maintain security controls, unpatched vulnerabilities, and social engineering are common exclusions that trip up SMBs.

Cyber Defense Agent's continuous monitoring creates documented evidence that you maintained security controls throughout the policy period, protecting against "failure to maintain" exclusions.

Review your exclusions with your broker annually and negotiate narrower language or add endorsements to close gaps.

FAQ

Frequently asked questions

Can I negotiate to remove exclusions from my policy?

Some exclusions can be removed or narrowed, others cannot. Standard exclusions like prior knowledge and intentional acts are generally non-negotiable. However, exclusions like social engineering, system failure, and war clause language can often be modified. Carriers are more willing to negotiate with businesses that demonstrate strong security controls. Bring your Cyber Defense Score to the negotiation and work with a broker who has experience negotiating cyber policy terms.

What happens if an exclusion is ambiguous?

In most jurisdictions, ambiguous policy language is interpreted in favor of the policyholder (the "doctrine of contra proferentem"). However, relying on ambiguity is risky and expensive — you may need to litigate to enforce this principle. It is far better to clarify ambiguous language before an incident occurs. Ask your broker to identify any ambiguous exclusions and request clear language from the carrier.

Do all carriers have the same exclusions?

No. Cyber insurance policies are not standardized, and exclusions vary significantly between carriers. Some carriers have broad war exclusions while others use narrow ones. Some exclude social engineering by default while others include it. Some have strict "failure to maintain" exclusions while others are more lenient. Comparing exclusions is as important as comparing limits and premiums when evaluating policies.

How do I know if an exclusion applies to my claim?

When you file a claim, the carrier evaluates whether any exclusions apply. If they invoke an exclusion, they must provide a written explanation citing the specific policy language. You have the right to dispute this determination. Having documented evidence of your security practices (from Cyber Defense Agent scanning) and legal counsel experienced in cyber insurance coverage disputes can help you challenge improper exclusion applications.

Get your Cyber Defense Score™ in 60 seconds.

100 tools. No installation. No credit card. Real evidence.