Back

Cyber Insurance Requirements Changing in 2022

The number and severity of cyberattacks in 2021 and preceding years have triggered significant changes in the cyber insurance marketplace Historicall...

6 min read
Published on Jun 21, 2022
cyber-insurance-requirements-changing-2022

The number and severity of cyberattacks in 2021 and preceding years have triggered significant changes in the cyber insurance marketplace. Historically, this marketplace was viewed as being relatively soft. The consequence was that firms could get coverage at somewhat lower premiums. However, the exponential growth in adverse security events in the past year has led to the hardening of the cyber insurance marketplace.

Here’s a breakdown of some of the cyber insurance changes resulting from this hardened stance.

Increase in Demand for Cyber Insurance

If 2021 is anything to go by, no business is safe from cyberattack. With the increase in the number and cost of cyber incidents, more firms have recognized how vulnerable they are to an attack. The consequence has been an increase in demand for cyber insurance. Further, this increase in demand is captured by the National Association of Insurance Commissioners (NAIC), which points to a 21.3% increase between 2019 and 2020.

It would seem that businesses are feeling the pressure of the looming costs of a potential intrusion. This comes in the backdrop of a 2021 IBM report that shows, on average, a data breach costs $4.24 million. These high costs seem to be driving more businesses to seek cyber insurance coverage.

Tighter Terms and Exclusions

Insurance providers aren’t jumping at the opportunity to provide the much-needed cyber insurance. Specifically, insurers and reinsurers are taking a step back to reevaluate their risk appetite. What’s more, these providers have moved towards requiring more documentation to evaluate the client’s cyber programs.

Insurers are working closely with cybersecurity professionals in somewhat of an investigative process to better understand the inherent risk that an organization is subject to. Ultimately, firms that fail to provide sufficient documentation or without the required controls might not receive coverage. Alternatively, the business might be required to pay higher premiums or risk having lower coverage limits for the account.

Rising Premiums

There seems to be a supply and demand imbalance within the cyber insurance marketplace. Expectedly, this has resulted in higher premiums. Unfortunately, following the Colonial Pipeline and Kaseya attacks, rates further went higher, so much so that Marsh reported a 174% increase in premium rates.

Lower Cyber Insurance Coverage Limits

Given the past cyber events and the ensuing payouts, insurers have had to reexamine their cover. Add the enhanced scrutiny and the rise in premiums, and you expect the amount of coverage available to dwindle. Businesses could access up to $10 million in coverage and then only receive $5 million.

Other than lowering coverage limits, some insurers are now reconsidering coverage altogether. This could be in response to the growing losses that insurers have had to incur while processing insurance payouts for cyberattacks.

Steps to Take to Ensure You Retain Your Cyber Insurance Coverage and Minimize a Premium Increase

In 2021, cyber insurance premiums continued to climb to record highs. This was fueled by high-profile cyber events and ensuing massive payout. Specifically, according to the Council of Insurance Agents and Brokers, there was an average 27.6% increase in premiums during Q3 2021, atop a rise of 25% in the previous quarter. Going forward, how then do you ensure that you retain your coverage and minimize the premium increase? Here are a few tips to consider:

Multi-Factor Authentication (MFA) 

increasing cybersecurity to decrease cyber insurance premiums.

Adopt a practice to navigate the new cyber insurance requirements that have MFA across your network and all surfaces that might be exposed to threat actors. These points of exposure include privileged accounts within your network as well as cloud and SaaS-based applications.

Endpoint Detection and Response (EDR) and Managed Detection and Response (MDR)

With EDR, monitor end-user devices to detect and respond to cyber threats soon as they occur. On the other hand, MDR is significantly more expansive than EDR. By design, it should be able to cover the entire network environment and will include 24/7 Security Operation Center (SOC) monitoring and scanning for all open ports.

Regular Updates and Patches 

You will require a documented cadence of updates and patches. The need for regular updates and patches is brought about by the sheer speed and volume of cyber threats.

Secure Backups and Recovery 

Insurance providers now require that your business has current backups that are in a separate, secured location. This backup should have MFA to restrict unauthorized access and should include a solid disaster recovery plan. That way, potential downtime reduces significantly.

Documented and Tested Incident Response Plan 

Carriers now require that you have a documented incident response plan in place. This plan should include how you’ll coordinate actions with the insurance provider, IT partner, legal, public relations, and your clientele.

Employee Training 

Your human capital remains the weakest link as it pertains to cyber threats and events. Specifically, 26% of all the cyber incidents in 2021 were due to inside criminal activity, while the remaining 74% were a result of employee negligence or phishing and consequently theft of login credentials. Insurance providers, therefore, require regular employee training to help your staff identify security threats. You could even go a step further and design a phishing campaign to train your employees on how to stay vigilant. Overall, adopting a controls-focused cyber governance approach coupled with a deep understanding of your business’s security posture is the best way to ensure that your premiums are not insanely high.

Learn More About Cyber Insurance Requirements Changing in 2022

Concisely, in 2022, you’ll have to grapple with rate increases, reduced capacity, ransomware sub-limits, higher deductibles, and supplemental applications. As cybercriminals continue to flourish and expand their attack scope, expect coverage to be significantly more expensive and requiring of more significant institutional safeguards. Additionally, you are likely going to have to deal with increased underwriting scrutiny and somewhat of a painful application process that includes a Ransomware Supplemental Application. Seeing as the security controls you have in place factor majorly into whether or not you meet the new cyber insurance requirements, it’s only prudent that you look at your cybersecurity from an aggregate level.

Agile IT provides security and compliance services against the most stringent requirements in the world and can help your company understand its risk profile and provide a comprehensive plan to meet cyber insurance requirements, thus reducing the overall possibility of a cyber incident. To learn more, schedule a free consultation today.

This post has matured and its content may no longer be relevant beyond historical reference. To see the most current information on a given topic, click on the associated category or tag.

Related Posts

AvePoint Backup for Microsoft 365 & Azure | Data Protection Guide

Integrating AvePoint Backup for Microsoft 365 and Azure for Comprehensive Data Protection

Learn how to integrate AvePoint Backup for Microsoft 365 and Azure to strengthen data protection, streamline recovery, and meet compliance requirements.

Oct 10, 2025
5 min read
Best Third-Party Backup Solutions for Microsoft 365

Top Third-Party Backup Solutions for Microsoft 365

Explore the top third-party backup solutions for Microsoft 365. Compare tools that enhance data protection, restore capabilities, and compliance readiness.

Oct 10, 2025
5 min read
Key Features and Benefits of Azure Backup

Overview of Azure Backup: Features and Benefits

Explore the core features and advantages of Azure Backup, including built-in security, scalability, and compliance for cloud-based data protection.

Oct 6, 2025
6 min read
NIST 800-53 vs. NIST 800-171: Key Differences and Why They Matter

NIST 800-53 vs. NIST 800-171: What’s the Difference?

Understand the key differences and importance of NIST 800-53 and NIST 800-171, how they apply to agencies and contractors, and which framework your organization needs for compliance.

Oct 6, 2025
5 min read
Tenant-to-Tenant Migration for CMMC Compliance

How to Perform a Tenant-to-Tenant Migration for CMMC Compliance

Planning a tenant-to-tenant migration for CMMC compliance? Learn best practices, tool options, and common pitfalls when moving data between tenants under CMMC.

Oct 6, 2025
7 min read
Critical Data Backup in Azure | Identify & Protect What Matters

Identifying Critical Data and Applications for Backup in Azure

Learn how to identify and prioritize your critical data and applications for backup in Azure to reduce risk, ensure business continuity, and meet compliance requirements.

Oct 3, 2025
5 min read

Ready to Secure and Defend Your Data
So Your Business Can Thrive?

Fill out the form to see how we can protect your data and help your business grow.

Loading...
Secure. Defend. Thrive.

Let's start a conversation

Discover more about Agile IT's range of services by reaching out.

Don’t want to wait for us to get back to you?

Schedule a Free Consultation

Location

Agile IT Headquarters
4660 La Jolla Village Drive #100
San Diego, CA 92122