Employee Sent $50,000 to a 'Fake' CEO? Why Your Cyber Insurance Might Pay $0
It is Friday afternoon. Your accounts payable manager receives an urgent email—or even a voice message—from you (the CEO). The message says:
"Hi Sarah, I'm in a meeting. We need to pay this new vendor $50,000 immediately to secure the shipment. Here are the wire instructions. Please process it ASAP."
Sarah, wanting to be a good employee, processes the wire transfer. On Monday morning, you walk in and ask, "What transfer?"
You realize it was a spoof. In 2026, it might have even been an AI Deepfake mimicking your voice. The money is gone. You panic, but think, "It's okay, we have Cyber Liability Insurance."
Bad News: There is a very high chance your insurance company will deny this claim. Here is why.
It Was NOT a "Hack" (The 'Voluntary Parting' Problem)
Traditional Cyber Insurance covers you when a hacker breaks into your system, steals data, or installs ransomware. It covers "unauthorized access."
In the scenario above (known as Business Email Compromise (BEC)), no one "hacked" your bank account. No password was stolen. Your employee, Sarah, had the authority to send money, and she voluntarily pushed the button.
Insurance adjusters call this "Voluntary Parting." Since the transfer was technically "authorized" by an employee (even though they were tricked), standard Cyber policies often exclude it automatically.
The Missing Piece: "Social Engineering Fraud" Endorsement
To be covered for this, your policy must have a specific endorsement called Social Engineering Fraud or Funds Transfer Fraud. (Note: Sometimes this is found in a "Commercial Crime" policy rather than a Cyber policy).
This coverage is designed for situations where a human is manipulated into giving away money. If your policy doesn't explicitly list this, you are likely exposed.
⚠️ The "Sub-Limit" Trap
Even if you do have Social Engineering coverage, check the limit carefully.
- Policy Limit: Your main Cyber policy might cover up to $1 Million.
- Sub-Limit: But the Social Engineering section might be capped at just $25,000 or $50,000.
If you lost $150,000 and have a $25,000 sub-limit, you are out of pocket for $125,000. Always negotiate for a higher sub-limit (at least $250k).
The "Call-Back Warranty" (Condition Precedent)
In 2026, insurance companies are getting stricter. Many policies now contain a "Call-Back Requirement" as a condition of coverage.
This clause states: "We will only pay the claim IF your employee verified the request by calling the requestor at a pre-determined, known phone number (Out-of-Band Authentication)."
Translation: If Sarah sent the money without picking up the phone to verify the wire instructions verbally with you or the vendor, the insurance claim is denied—even if you paid for the coverage. The "Deepfake" excuse won't work if you didn't follow protocol.
How to Protect Your Business
Insurance is the safety net, but prevention is better.
- Training: Train employees to spot "spoofed" domains and educate them on AI Voice Cloning risks.
- Process: Implement a mandatory "Dual Authorization" rule for all wires over $5,000. Two people must sign off.
- Verification: Never trust email instructions for changing bank details. Always call the vendor using a number from your file (not the number in the email).
Patch the Human Firewall Today
Hackers have realized that humans are easier to hack than firewalls.
Pull out your Cyber Insurance AND Crime Insurance policies today. Look for the words "Social Engineering." If you don't see them, or if the sub-limit is tiny, call your broker immediately. One fake email shouldn't be enough to bankrupt your business.
0 Comments