Cyber & Crime Insurance
Coverage guidance for businesses reviewing cyber incidents, breach response, ransomware, fraudulent transfers, social engineering, employee dishonesty, and digital business interruption.

Review Areas
Cyber events
Fraud
MFA and backups
Response plan
Coverage planning for digital operations, fraud, and cyber response.
Cyber and crime coverage helps businesses think through the financial, operational, and response costs that can follow cyber incidents or dishonest acts.
Cyber incident response
Coverage may include breach response, forensic support, notification, ransomware, and recovery resources depending on the form.
Funds transfer and social engineering
Fraudulent instructions, invoice manipulation, and wire transfer scams need careful review of policy language.
Employee dishonesty and crime
Crime coverage can address certain dishonest acts, theft, forgery, or business crime exposures when included.
Digital continuity
Business interruption, extra expense, restoration, and dependency coverage can be important after a covered cyber event.
Cyber Coverage Areas
Response resources and financial protection after digital events.
A&G helps business owners review both insurance wording and practical controls that carriers increasingly ask about.
- Breach response and forensic support
- Ransomware and extortion considerations
- Cyber business interruption and extra expense
- Data restoration and system recovery
- MFA, backups, endpoint security, and vendor questions
Crime and Fraud
Financial fraud and dishonest acts need separate attention.
Crime coverage may respond differently than cyber coverage, especially around funds transfer and social engineering.
- Funds transfer fraud and social engineering
- Employee dishonesty and theft
- Forgery, alteration, and computer fraud
- Invoice manipulation and vendor impersonation
- Limit, sublimit, verification, and exclusion review
Cyber and crime coverage depends on policy form, security controls, limits, sublimits, retentions, endorsements, conditions, and exclusions.
Common cyber and crime scenarios.
Cyber and crime risks often start with ordinary business workflows: email, payments, vendors, employees, and access controls.
A fraudulent email tricks an employee into wiring funds.
A ransomware event disrupts systems and daily operations.
A vendor or customer data incident requires response coordination.
An employee dishonesty event creates financial loss.
A carrier asks about MFA, backups, endpoint protection, or security training.
Useful for businesses that use email, payments, customer data, vendors, or digital systems.
Professional offices, retailers, restaurants, contractors, and service firms
Businesses handling customer, employee, payment, or vendor information
Companies using online banking, wire transfers, or invoice workflows
Organizations dependent on software, cloud tools, or digital operations
How A&G helps structure cyber and crime coverage.
Review digital workflows
A&G looks at payments, email, data, vendors, access controls, backups, and business interruption sensitivity.
Separate cyber from crime
Cyber, crime, funds transfer, and social engineering wording are reviewed so assumptions do not blur together.
Prepare for carrier questions
Security controls like MFA, backups, endpoint protection, and verification procedures are discussed in practical language.
Coordinate response expectations
Limits, retentions, sublimits, response vendors, and reporting conditions are reviewed before an incident occurs.
Related coverage for digital and management risk.
Cyber and crime exposure often overlaps with employment risk, liability limits, property, and business continuity.
EPLI
Review employment-related allegations and workplace policy exposure.
Commercial Property & Liability
Coordinate business interruption and liability assumptions with core coverage.
Umbrella & Excess Liability
Review where added liability limits may or may not apply.
Business Insurance Overview
See how cyber and crime fit into the broader program.
Questions businesses ask about cyber, crime, and fraud coverage.
Practical answers around cyber incidents, ransomware, fraud, controls, and policy wording.
Is cyber insurance only for technology companies?
No. Any business using email, payments, customer data, cloud tools, or digital operations can have cyber exposure.
Does cyber insurance cover funds transfer fraud?
It depends. Funds transfer fraud and social engineering may be handled by cyber, crime, or specific endorsements and often include sublimits or conditions.
Why do carriers ask about MFA and backups?
Carriers often use security controls to evaluate ransomware, access, recovery, and fraud exposure. Strong controls can affect eligibility and options.
Is crime coverage different from cyber coverage?
Yes. Crime coverage may address employee dishonesty, theft, forgery, or computer fraud differently than cyber incident response coverage.
Clear Next Steps
Review cyber and crime coverage with A&G.
A&G can help compare cyber, crime, funds transfer, social engineering, and response coverage around how your business actually operates.
Start with the path that matches your need. A&G will guide the next step from there.