Cyber Insurance
What kind of work do you do?
Female computer engineer working in server room.
Choose from the nation's best insurance providers
Logos of Insureon's business insurance carrier partners

Bricking coverage

Bricking coverage protects small businesses from financial losses after a cyberattack or hardware failure makes computers, servers, and other devices inoperable. Here’s how to secure this crucial cyber coverage.

What does the term “bricking” mean?

Bricking is when a business’s computer, server, or other essential device is rendered useless, essentially making it “as useful as a brick." A device can be bricked accidentally, such as by installing incompatible software, or intentionally, such as permanent denial of service (PDoS) attacks, which use malware to permanently disable devices.

When a company’s systems are bricked, the business can suffer a complete loss of hardware functionality, disrupted operations, extended downtime, high recovery costs, and the loss of valuable data.

Without bricking coverage, small business owners face the full cost of replacing expensive equipment, hiring specialists to restore systems, and recovering lost revenue—all while trying to bring their business back from a cyberattack.

Two types of bricking

There are two types of device bricking:

Soft bricking is when a device malfunctions, such as a boot loop, but can be recovered with software remedies, such as a factory reset or reflashing the firmware.

Hard bricking occurs when a device’s firmware is severely corrupted or when a hardware issue renders the device completely inoperable. Hard-bricked devices typically can’t be fixed.

What is bricking coverage in cyber insurance?

Bricking insurance, sometimes called computer replacement coverage, is a crucial part of a cyber insurance policy. This coverage protects your business from devastating financial damages if laptops, point-of-sale (POS) systems, or other essential devices are unintentionally or maliciously turned into an unusable brick.

If your small business suffers a bricking attack, a cyber insurance policy would cover expenses such as:

  • Hardware replacement costs, such as buying new laptops, servers, POS systems, and other essential devices that can’t be recovered.
  • Recovery expenses, including installation, labor, and equipment disposal costs.
  • Reduced downtime costs, providing funds to speed up replacement needs.

Here are some common causes of bricking incidents:

Malware and viruses

Cybercriminals can use social engineering attacks, malicious downloads, and other cyber incidents to infect devices with malware. These cyberattacks can corrupt or delete system files, destroy operating systems, and wipe entire hard drives.

For example, an e-commerce retail employee clicks on a malicious email link, which allows malware to corrupt the site’s point-of-sale (POS) system, rendering the system inoperable.

Ransomware

Hackers can use ransomware to encrypt critical data and lock access to crucial systems, causing permanent damage to hardware that makes a device useless. In some cases, they’ll use ransomware for cyber extortion, threatening to brick essential equipment if the business owner doesn’t pay a specified ransom.

For example, cybercriminals demand that a healthcare clinic pay a ransom, or they’ll corrupt their servers, making the devices unusable and causing the business to lose crucial customer data.

Supply chain attacks

Cybercriminals can inject malicious code into legitimate software updates, compromised firmware, or physical hardware components before a device is even sold. These attacks typically aim to disrupt operations and make devices unrecoverable.

For example, a software developer’s server is compromised by hackers, allowing them to insert malicious code into the developer’s legitimate software update. This code spreads to hundreds of customers’ devices, destroying invaluable data and making their computers inoperable.

Software updates

Bricking can also be caused by accidents that lead to permanent damage, such as installing the wrong firmware on a device, or having a critical software update interrupted by a power outage or user error.

For example, a management consultant’s office has a power outage during a Windows update, corrupting the operating systems and causing the machines to have Blue Screens of Death (BSOD) and system instability.

Get cyber insurance coverage
A cybersecurity consultant working on a project for a client

How does bricking coverage work?

Although commercial property insurance covers damaged business property, most policies won’t cover bricked hardware because corrupted firmware isn’t typically considered tangible damage.

And, while some cyber liability insurance policies include limited bricking coverage, most insurance providers require you to purchase bricking coverage as an endorsement to a cyber policy. This crucial add-on fills the coverage gap between cyber and property insurance policies so that you’re not stuck with significant losses after a bricking incident.

Why bricking coverage is important for your business

Because many small businesses lack adequate or any cybersecurity protocols, they’ve become big targets for cyber threats. Hackers send 3.4 billion phishing emails every day, primarily to smaller companies, and 43% of data breaches involve small businesses.

Having cyber insurance coverage is key to helping your business recover from a cyberattack. For example, this policy can include business interruption coverage, which kicks in after a waiting period to cover operating expenses and lost revenue when a business’s computer systems are down.

If your business suffers a cyber event that permanently disables hardware, the financial losses could be devastating. That’s why bricking coverage is a crucial add-on to a cyber insurance policy.

Bring in IT experts: Contact your company’s internal IT team or an external cybersecurity firm to begin the recovery process.

What should you do if your device is bricked from a cyberattack?

If your business laptops, servers, or other essential systems are bricked by a cyberattack, you must act quickly and strategically to minimize damage and downtime. Here’s how to take immediate action:

  • Contain the breach: Immediately disconnect compromised equipment from the internet and internal networks to stop the attack from spreading.
  • Notify your insurance agency: The sooner you call your cyber insurance provider, the smoother the claims process should go.
  • Collect evidence: Document everything—error messages, ransom notes, system logs, and a timeline of events. This information is crucial for your insurance claim, forensic investigations, and legal proceedings.
  • Bring in IT experts: Contact your company’s internal IT team or an external cybersecurity firm to begin the recovery process.
  • Get legal advice: Speak with a cyber law attorney to identify legal obligations, regulatory requirements, and potential third-party liabilities.

What is excluded from bricking coverage?

It’s important to understand what your bricking coverage will and won’t cover after a cyberattack. Here are some possible exclusions:

  • Certain types of data loss, such as if a ransomware attack wipes a system’s data but doesn’t fully disable the device.
  • Hardware failures due to company negligence over standard cybersecurity controls, such as strong passwords, multi-factor authentication (MFA), or regular patching.
  • Incidents that occur to devices with known cybersecurity vulnerabilities that weren’t resolved before the bricking policy was purchased.

Two policy endorsements can help fill coverage gaps relating to compromised hardware and data loss issues not covered by bricking insurance or a standard cyber insurance policy.

How to protect your devices against being bricked

Insurance protection and proactive cybersecurity measures work hand-in-hand to help your small business avoid the devastation from a bricking incident. Here are some steps you can take to help prevent an attack:

  • Perform regular software and firmware updates, which often provide crucial security patches and bug fixes that prevent vulnerabilities.
  • Establish strong cybersecurity protocols, including firewalls, antivirus software, and encryption tools to protect against unauthorized access to systems.
  • Enforce strong authentication policies, such as MFA and strong passwords that are regularly updated.
  • Routinely back up important data to external drives, cloud storage, or other secure locations.
  • Train employees on cybersecurity protocols, including how to spot potential social engineering and ransomware attacks, and report network security concerns.
  • Implement a cyberattack incident response plan to minimize downtime and mitigate damages.
You may also like
A man working on several screens.
How to prevent a data breach at your business
Data breaches are costly to recover from, so it's critical for small businesses to learn and practice preventative techniques.

Find bricking loss coverage for a small business

Get free quotes for crisis management insurance from top-rated providers by filling out our easy online application. You can speak with a licensed insurance agent if you have questions about which types of insurance policies meet your small business needs, or if you want to add on specialized coverages such as bricking insurance.

Once you find the right policies for your small business, you can begin coverage in less than 24 hours and get a certificate of insurance (COI) for your small business.

What our customers are saying

Updated: December 11, 2025
Small business owner signing up for Insureon e-mail newsletter.

Want free expert advice right in your inbox?

By entering your email address and subscribing, you agree to our Terms of Use and Privacy Policy

Find cyber insurance quotes

Save money by comparing insurance quotes from multiple carriers.
EXPLORE ON INSUREON
How much does cyber insurance cost?What information is needed for a cyber insurance application?Is cyber insurance worth it for small businesses?How to get cheap cyber insuranceBring your own device (BYOD) security risks for small businessesBest cyber insurance for small businesses