Should IT Consultant Carry Cyber or Technology E&O Liability Insurance?

Should IT Consultants Carry Cyber Or Technology E&O Liability Insurance?

Cyber Liability for IT Consultants is moot. What you really should be considering is a Technology E&O policy. Here’s why:

A Cyber Liability policy is intended to cover you related to breaches you (or others) sustain not related to your professional service. Think in terms of a medical office being breached physically or virtually and data is being stolen. Since their professional service is handling health issues of patience, Cyber Liability is ideal for them.

As an IT Consultant, which is a broadly used term (will explain below), you have a reasonable expectation to keep sensitive information private or to prevent 3rd parties from accessing not only your networks but potentially your clients. Enter Tech E&O:

Technology E&O (Tech E&O) is designed to cover you on a few distinct levels. It is purposely tailored for technology companies because the claims or wrongful acts associated with your operations will likely be a blend of professional liability and other areas.

Here are the main highlights of what is typically included on a Technology E&O policy:

Errors & Omissions / Professional Liability (PL)

This covers you in the event that your product or service you provide fails to do what is expected and causes your client to have a financial loss or loss of data. In many policy forms this can also extend to rogue employees.

Network / Security / Privacy / Cyber Liability

Much of these terms are synonymous with each other but the main takeaway is that it is designed to cover you in the event you sustain a data breach that results from Personal Identifiable Information (PII) being released, you are alleged to be responsible for a breach of a 3rd party’s network (often a client), your actions have lead to a privacy violation and/or you are alleged to be responsible for network downtime (denial of service) including but not limited to beyond the scope of stated SLA or Terms of Conditions.

The main difference between a straight Cyber Liability coverage and the above aforementioned coverage is that this will extend to disputes that alleged that your professional service contributed to a data breach, denial of service and/or privacy violation.


IT Consultants wear many hats.
IT Consultants

Note: As stated above IT Consultant is a broadly used term. In insurance it means advice only and in the IT world it means so much more: Network Engineer, Systems Integrator, Software Developer, DevOps, Penetration Tester, SOC Analyst, Auditor.


Here are some common examples that would be excluded from a Cyber Liability policy but would typically be addressed on a Tech E&O:

  • Network Engineer: Security Misconfiguration of firewalls and ports
  • Systems Integrator: Default Passwords not changed contributing to breach
  • Software Developer: Exploitation of Faulty/Buggy Code
  • Web Developer: Exploitation of Outdated Code, XSS
  • SaaS / Hosting Company: DDOS, DOS, Data breach
  • All: Phishing Credentials of Clients where you have a reasonable expectation to keep it private.

Media / Electronic Liability

This is designed to cover you for any content you provide that infringes upon someone else’s intellectual property (including source code) or is alleged to cause personal or advertising injury such as liable, slander, misrepresentation, wrongful eviction, false arrest, malicious prosecution ect.

As part of Risk Transference, insurance is a viable tool and should be included as part of your Business Continuity Plan. If you are serious about purchasing insurance to protect yourself, I would recommend speaking with at licensed agent/broker who can help you with the details.

Be sure that they furnish you with a copy of the carrier’s specimen form and pay close attention to what is not covered. I hope you found this post helpful and good luck.

*Full Disclosure: Although I work in the insurance industry, these viewpoints are my own and not reflective of the position of the company, past, present or future.

Always consult a licensed agent before purchasing insurance.


To support this blog, this post may contain affiliate links. Please read our Privacy Policy for more information.

Drawing on over two decades of experience in the Information Technology industry, I have acquired a diverse range of roles that have shaped my distinctive outlook. Through this journey, I have developed into an accomplished authority in risk management, catering to Fortune 500 companies and small businesses on a global scale. Over the past 12 years, my primary focus has centered on empowering small business owners and insurance professionals to comprehend the ramifications of cyber incidents and effectively mitigate the risks associated with potential data breaches. My passion for cybersecurity has inspired me to create the Sage Knows IT blog. Through this platform, I aim to help small business owners and aspiring IT professionals understand the roadmap of the IT industry based on my experiences. Information Technology and Information Security are crucial for our future, and I hope my blog will motivate those who are interested in joining this ever-evolving field.

Related Posts

Delete Me Not: How One API Call Could Wipe Accounts Clean

Bug bounty programs continue to prove their value by helping organizations uncover security flaws that would otherwise slip through the cracks. For those of us in cybersecurity,…

Title Image: AI Security Realities: Rethinking PII as the Sole Indicator

AI Security Realities: Rethinking PII as the Sole Risk Indicator

During a client meeting, I addressed misconceptions about cybersecurity, especially the notion that absence of PII equates to no risk. I discussed how cyber threats extend beyond data theft to include system vulnerabilities that could disrupt operations and impact users, citing the SolarWinds and New York Times attacks as examples. I explained that comprehensive assessments are crucial for understanding broader cybersecurity risks, not just those involving PII. Additionally, I highlighted the importance of protecting AI models from poisoning, underscoring the need for robust security measures in AI development.

Client Confidence Crisis: How Neglecting Security Practices Can Drive Customers Away

In today’s digital landscape, establishing an Information Systems Security Program (ISSP) is no longer optional but a crucial necessity for organizations. This blog post explores the vital importance of implementing an ISSP early on and understanding the factors that influence its establishment and modification. Senior management’s role in championing ISSPs is emphasized, as their buy-in and recognition of its significance set the tone for organizational security practices.

However, misconceptions and flawed reasoning often hinder the adoption of robust security measures. From the belief that “it will never happen to us” to relying solely on insurance coverage, these notions can prove detrimental to an organization’s security posture. Furthermore, assumptions that clients don’t care about security or that the cloud provides ultimate protection are debunked, shedding light on the evolving expectations and regulations surrounding data protection.

The ugly truth emerges as we delve into the constant threat of internet vulnerability scans and the risks organizations face when vulnerabilities are discovered. This post aims to dismantle these flawed mindsets, highlighting the need for a comprehensive security approach beyond insurance coverage and the importance of addressing vulnerabilities proactively.

Stay tuned for the upcoming parts of this conversation, where we will explore additional influential factors and provide insights into developing effective ISSPs. Together, let’s navigate the complex world of system security and ensure the protection of your organization’s invaluable assets.

Maximizing Email Security: Understanding the Importance of DKIM, SPF, and DMARC

Email is a crucial part of our daily lives, but unfortunately, it’s also a popular target for cybercriminals who use various tactics like spam, phishing, and spoofing to scam people. The FTC recently issued a warning to users of MetaMask and PayPal about phishing scams that are currently circulating through fake emails. The scam claims that the user’s cryptocurrency wallet has been blocked and encourages them to click a link and update their wallet to prevent the loss of their crypto. To protect email users from these threats, authentication protocols like DKIM, SPF, and DMARC are strongly recommended.

Investigating the FAA Outage: Separating Fact from Fiction

On January 11th, the Federal Aviation Administration (FAA) experienced a nationwide outage that caused widespread delays and cancellations for flights across the United States. The outage was caused by a problem with the FAA’s NOTAM (Notice To Air Mission) system.

NOTAMs are messages issued by the FAA to provide pilots with important information about flight restrictions, hazards, and other critical information. The NOTAM system is a critical component of the FAA’s air traffic control infrastructure, and the outage caused a ripple effect throughout the entire aviation system.

RSS302
Twitter638
YouTube0
YouTube
Pinterest0
fb-share-icon
LinkedIn
Share
20