
Introduction
Cyber insurance works differently from traditional insurance policies. Coverage depends on policy wording, security controls, disclosure accuracy, and how the business responds after an incident. A ransomware attack or data breach may still lead to claim disputes if the insurer finds gaps in cybersecurity practices or policy compliance.
For many companies, the biggest risk is not the attack itself. It is discovering too late that the policy does not respond as expected.
Understanding why cyber insurance claims get rejected in India helps businesses strengthen both cybersecurity and financial protection. It also helps companies avoid costly mistakes before an incident occurs.
Why Cyber Insurance Claims Get Rejected
Cyber insurance policies are built around risk assessment. Insurers evaluate how a business manages digital risk before offering coverage. Businesses that fail to maintain basic cybersecurity controls create higher claim exposure for insurers.
Many claim disputes happen because:
• Security controls were weaker than declared
• Reporting timelines were ignored
• Systems remained outdated
• Policy exclusions were misunderstood
• Important risks were not disclosed properly
Cyber insurance is not designed to replace cybersecurity discipline. It supports recovery when reasonable security measures already exist.
Weak Passwords and No Multi Factor Authentication
One of the most common reasons for cyber insurance claim disputes involves poor access control practices.
Many businesses still rely on:
• Shared admin credentials
• Weak passwords
• Reused passwords across systems
• Disabled multi factor authentication
Attackers frequently exploit leaked credentials from phishing attacks or previous data breaches. Once access is gained, attackers move across payment systems, email accounts, and cloud platforms.
Delayed Incident Reporting
Time matters during cyber incidents. Delayed reporting often worsens financial damage and affects forensic investigation quality.
In India, CERT In guidelines require certain cyber incidents to be reported within specific timelines. Many cyber insurance policies also require immediate or urgent notification to insurers after discovering an attack.
Businesses sometimes delay reporting because:
• Internal teams try solving the issue alone
• Leadership fears reputational damage
• The incident initially appears minor
• Evidence gets overlooked during panic response
This delay can create serious claim complications.
Why Delayed Reporting Creates Problems
Delayed reporting may:
• Destroy forensic evidence
• Increase financial losses
• Prevent containment efforts
• Make root cause analysis difficult
• Violate policy conditions
Insurers may reduce or deny claims if they believe earlier reporting could have reduced damage.
Unpatched Software and Known Vulnerabilities
Cybercriminals actively target outdated systems. Many attacks exploit vulnerabilities that already have publicly available security patches.
Common examples include:
• Outdated VPN software
• Unsupported operating systems
• Unpatched firewalls
• Old ecommerce plugins
• Expired endpoint security tools
Employee Negligence and Social Engineering Fraud
Human error remains one of the biggest cybersecurity risks for businesses.
Attackers often use:
• Phishing emails
• Fake invoices
• CEO impersonation scams
• Fraudulent payment requests
• Malware infected attachments
Many businesses assume cyber insurance automatically covers all employee mistakes. That is not always true.
Some policies:
• Exclude certain social engineering losses
• Apply sub limits for fraud claims
• Require verification procedures for fund transfers
Misrepresentation During Policy Purchase
Cyber insurance proposal forms require detailed information about security controls and past incidents. Some businesses provide inaccurate answers to improve approval chances or reduce premiums.
Common disclosure mistakes include:
• Hiding previous cyber incidents
• Overstating cybersecurity maturity
• Claiming security tools are active when they are not
• Misrepresenting backup systems
• Providing incomplete infrastructure details
If insurers discover incorrect disclosures during a claim investigation, they may reject coverage entirely.
Why Accurate Disclosure Matters
Cyber insurance depends heavily on trust during underwriting. Insurers calculate premiums based on declared risk controls.
Even unintentional misstatements can create serious disputes later.
Businesses should treat proposal forms as legal risk documents, not simple paperwork.
Failure to Maintain Secure Backups
Ransomware attacks often target backup systems first. Businesses without secure and tested backups face longer downtime and higher recovery costs.
Many companies assume backups exist because files sync automatically to cloud platforms. During incidents, they discover:
• Backups were corrupted
• Recovery systems failed
• Backup access was compromised
• Restoration testing never occurred
Third Party Vendor and Cloud Service Gaps
Modern businesses depend on multiple external providers.
These include:
• Cloud hosting companies
• SaaS platforms
• Payment gateways
• Managed IT vendors
• CRM providers
A cyber incident affecting a third party vendor can still disrupt your operations directly.
However, not all cyber insurance policies automatically cover:
• Vendor related outages
• Cloud platform failures
• External service provider breaches
• Contractual liabilities involving vendors
Businesses often assume third party risk is fully covered without reviewing policy wording carefully.
This creates exposure for:
• Ecommerce businesses
• SaaS startups
• Fintech firms
• Digital agencies
• Remote operations dependent on cloud infrastructure
War and Nation State Attack Exclusions
Some cyber insurance policies contain exclusions related to cyber warfare or nation state attacks.
This area remains legally complex because attribution is difficult. Insurers may investigate whether an attack connects to organized geopolitical activity.
While this exclusion does not affect most routine cyber incidents, businesses should still understand:
• Policy wording
• Attribution clauses
• Exclusion scope
• Applicable sub limits
Large scale global malware attacks have already triggered disputes internationally over cyber war exclusions.
How Businesses Can Improve Cyber Insurance Claim Success
Businesses improve claim outcomes by combining cybersecurity discipline with proper policy management.
Practical Cyber Readiness Checklist
• Enable multi factor authentication across critical systems
• Maintain documented cybersecurity policies
• Patch software and systems regularly
• Conduct employee phishing awareness training
• Maintain secure and tested backups
• Create a formal incident response plan
• Monitor third party vendor risks
• Report incidents quickly to insurers and regulators
• Review cyber insurance wording annually
• Disclose risks honestly during underwriting
Cyber insurance works best when supported by strong operational controls.
What Businesses Should Check Before Buying Cyber Insurance
Many companies compare premiums without reviewing coverage conditions carefully. This creates major surprises during claims.
Before purchasing cyber insurance, businesses should review:
• Policy exclusions
• Ransomware sub limits
• Social engineering fraud coverage
• Business interruption wording
• Vendor related coverage
• Regulatory fine coverage
• Incident reporting timelines
• Forensic investigation support
• Retroactive dates
• Claim response services
Policy wording matters more than marketing brochures.
Why Policy Review Matters
Cyber risk changes quickly. Businesses adopt new software, expand remote operations, onboard vendors, and collect more customer data over time.
A cyber insurance policy purchased two years ago may no longer match current operational exposure.
Regular policy reviews help businesses:
• Identify coverage gaps
• Adjust limits
• Align coverage with business growth
• Improve underwriting outcomes
• Reduce claim disputes
At Mialtus Insurance Broking Pvt. Ltd., cyber insurance discussions focus on practical business exposure instead of generic policy comparison. Understanding exclusions, operational dependencies, and reporting obligations helps businesses build stronger financial protection against evolving cyber threats.
The Mumbai Police have arrested a 27-year-old interior designer from Haryana’s Ambala for his alleged involvement in a cyberattack on HDFC Life Insurance. The suspect reportedly collaborated with a mastermind based in Hong Kong to steal sensitive customer data and blackmail the company.
HDFC Life Insurance had reported a cyberattack that compromised confidential customer information. The breach, which occurred between November 19 and November 21, 2024, involved cybercriminals using an email address and a WhatsApp account to access sensitive policyholder data.
The stolen data included policy numbers, names, addresses, mobile numbers, and critical health information related to illnesses. The attackers initially contacted HDFC Life on November 19, threatening to release the data unless their extortion demands were met. They sent a second, escalated threat through WhatsApp shortly thereafter.
HOW BREACH WAS EXECUTED
According to the investigation, the accused entered HDFC Life’s server system under the pretence of purchasing policies. By intercepting OTPs (One-Time Passwords), they gained unauthorised access to the database. This information was shared with the Hong Kong-based hacker, who downloaded the stolen data.
The cybercriminals sent samples of the stolen data to HDFC Life via email as proof of their capabilities, demanding a ransom to prevent its public release.
COMPANY’S RESPONSE TO BREACH
HDFC Life lodged a complaint with the South Region Cyber Police, prompting a case under various sections of the BNS Act and IT Act. The company’s Associate Vice President (Legal) detailed the sequence of events in the complaint.
In a statement to stock exchanges, HDFC Life had acknowledged the breach and assured stakeholders that they had initiated a detailed investigation with cybersecurity experts.
Source: Business Standard

