A CFO-Friendly Limit Guide
Your CFO asks: “How much cyber insurance do we need?” Most SMBs default to $1M limits because that’s what the quote shows. But $1M might be dangerously thin for your actual exposure, or unnecessarily expensive for your risk profile.
The right limit depends on three things: how much downtime would cost you, how much data you hold, and how much you move in wire transfers. At The Coyle Group, we help business owners translate cyber risk into CFO-friendly numbers.
The Bottom Line (TLDR)

Business Profile |
Starting Limit Range |
|---|---|
|
Low data + minimal downtime risk |
$500K to $1M |
|
Typical SMB (10-100 employees) |
$1M to $2M |
|
High-revenue, regulated, or data-heavy |
$2M to $5M+ |
For a limit recommendation tailored to your risk profile.
How Much Cyber Insurance Do I Need for a Small Business?
Profile |
Revenue Range |
Typical Limit |
Monthly Cost |
|---|---|---|---|
|
Low risk (limited data, minimal digital operations) |
Under $2M |
$500K to $1M |
$80 to $150 |
|
Average SMB (some PII, standard digital presence) |
$2M to $10M |
$1M to $2M |
$120 to $300 |
|
Higher risk (healthcare, finance, heavy wire transfers) |
$5M to $25M |
$2M to $5M |
$200 to $500+ |
If you have a contract requirement specifying minimum limits, start there. Client contracts most often require a $1 million per-occurrence limit as a baseline.
What Does “$1M” of Cyber Insurance Actually Mean?
Term |
What It Means |
|---|---|
|
Per-occurrence limit |
Maximum payout for any single incident |
|
Aggregate limit |
Maximum payout across all claims in a policy year |
|
Retention/Deductible |
What you pay first (typically $2,500 to $10,000) |
|
Sublimits |
Caps on specific coverages within your total limit |
Critical: Sublimits often matter more than the headline number. A $2M policy with a $100K ransomware sublimit provides far less protection than a $1M policy with full ransomware coverage.
What Should I Base My Cyber Insurance Limit On?
The 3-Bucket Sizing Method
Add these three buckets together, then add 20-30% buffer. That’s your target limit range.
How Do I Estimate My Downtime Loss?
Daily Gross Profit × Expected Downtime Days + Extra Expense = Business Interruption Exposure
Example for a $5M revenue distribution company:

What 40+ Years Taught Me About This Risk
Business owners consistently underestimate downtime costs. A manufacturing client assumed they’d be back online in 3 days. Reality: 18 days, because their backup hadn’t been tested in 14 months. Their $500K BI limit was exhausted by day 12.
Most overlooked details:
Understanding the cyber insurance waiting period is essential before binding coverage.
How Do I Estimate Data Breach Costs?
Cost Category |
Typical Range |
What It Covers |
|---|---|---|
|
Breach counsel + forensics |
$50,000 to $150,000 |
Attorney fees, digital investigation |
|
Notification + call center |
$50 to $200 per record |
State-mandated notifications, victim support |
|
Credit monitoring |
$10 to $30 per person/year |
If offering to affected individuals |
|
Regulatory defense |
$50,000 to $250,000+ |
Responding to state AG inquiries, HIPAA investigations |
|
Third-party claims |
Variable |
Customer or vendor lawsuits |
Biggest cost drivers: Number of records, type of data (PHI/PCI costs more than basic contact info), and regulatory environment (HIPAA, PCI-DSS, state privacy laws).
Learn more about what cyber insurance actually covers.
Data Inventory Quick Check
What data do you actually store?
The more boxes you check, the higher your data exposure bucket.

How Much Social Engineering and Wire Fraud Coverage Do I Need?
This is where most SMBs are dangerously underinsured. Most cyber policies cap social engineering at $100,000 to $250,000, while the average BEC attack costs $200,000 to $300,000.
According to the FBI’s IC3 2024 report, BEC complaints totaled over 21,000 with losses approaching $2.77 billion.
Cyber vs. Crime: Which Pays?
Coverage |
Cyber Policy |
Crime Policy |
|---|---|---|
|
BEC/social engineering |
Usually sublimited ($100K to $250K) |
Often higher limits |
|
Wire transfer fraud (system hack) |
Typically covered |
May require endorsement |
|
Employee theft |
Usually excluded |
Primary coverage |
Key insight: Crime policies can layer on top of cyber. If cyber covers the first $250K and crime covers up to $500K additional, you have $750K total coverage.
Learn more about cyber insurance social engineering coverage.
What Cyber Insurance Limits Do Companies Like Mine Usually Buy?
Industry |
Common Limit Range |
Why |
|---|---|---|
|
Professional services |
$1M to $2M |
Client data, contractual requirements |
|
E-commerce/retail |
$1M to $3M |
PCI compliance, transaction volume |
|
Healthcare/medical |
$2M to $5M |
HIPAA penalties, PHI requirements |
|
Manufacturing/logistics |
$1M to $3M |
OT systems, BI exposure |
|
SaaS/technology |
$2M to $10M |
Third-party liability |
|
Financial services |
$3M to $10M |
SEC requirements, fiduciary exposure |
For industry-specific guidance, see cyber insurance for manufacturers and distributors and cyber insurance for technology startups.
What Limit Do I Need to Satisfy Client Contracts?
Many businesses need cyber insurance because clients require it, not because of regulations. Industry data shows a significant percentage of vendors lose contract opportunities due to insufficient coverage.
Approach contract requirements methodically:
What Sublimits Should I Check Before Binding?
Item |
Red Flag |
|---|---|
|
Ransomware/extortion sublimit |
Below $500K |
|
BEC/social engineering sublimit |
Below your largest wire |
|
Business interruption waiting period |
24+ hours |
|
Dependent BI sublimit |
No coverage or heavily sublimited |
|
PCI coverage |
Excluded or sublimited |
|
War/nation-state exclusion |
Overly broad language |
Review cyber insurance claims examples to understand how sublimits affect real claims.
Is $1M of Cyber Insurance Enough?
Our guide on how much cyber insurance should I buy walks through specific scenarios.
What Security Controls Affect Coverage?
Strong security unlocks better pricing, higher limits, and faster claim approval. Underwriting has shifted from questionnaires to proof of controls.
Control |
Why Required |
Implementation Time |
|---|---|---|
|
MFA everywhere (email, VPN, admin) |
Blocks 99.9% of automated attacks |
1-2 weeks |
|
EDR (endpoint detection & response) |
Catches ransomware before it spreads |
2-4 weeks |
|
Immutable backups + tested restore |
Only way to recover without paying ransom |
2-4 weeks |
|
Security awareness training |
Employees are the #1 attack vector |
Ongoing |
|
Patch management (30-day cadence) |
Unpatched systems are easy targets |
Ongoing |
According to Microsoft security research, MFA alone blocks 99.9% of automated attacks.
Why This Matters for Limits
Better controls = more capacity. Insurers offer higher limits and better terms to businesses with demonstrable security. Weak controls often result in denied applications or coverage restrictions.
Documentation is critical. You must prove your systems work, not just claim they exist. Expect underwriters to request screenshots, policy exports, and testing logs.
Good / Better / Best Coverage Tiers
Good |
Better |
Best |
|
|---|---|---|---|
|
Primary Limit |
$1M |
$2M |
$3M to $5M |
|
Social Engineering |
$100K to $250K |
$500K |
High limit or crime policy |
|
BI Waiting Period |
8-hour |
4-hour |
Minimal |
|
Dependent BI |
Excluded |
Sublimited |
Full coverage |
|
Annual Cost |
$1,200 to $2,500 |
$2,500 to $5,000 |
$5,000 to $10,000+ |
Understanding the difference between cyber and crime insurance helps you choose the right combination.
Frequently Asked Questions
Next Step: Get a Limit Recommendation You Can Defend
Your cyber insurance limit should be sized to your specific downtime, data, and fraud exposure, not industry averages or carrier defaults.
At The Coyle Group, we help business owners translate cyber risk into defensible numbers. 40+ years of commercial insurance expertise, access to 20+ cyber carriers, and no-pressure consultation.
To discuss your specific risk profile
Author’s Experience
This article was written by Gordon B. Coyle, CPCU, ARM, AMIM, PWCA, CEO of The Coyle Group, who has over 40 years of experience working with business owners of all sizes and industries across the United States, solving their insurance challenges. Gordon specializes in helping SMBs develop comprehensive cyber insurance programs that protect their operations and support their growth objectives.