Back to Resources

Cyber Insurance Applications Are Getting Harder — Here's What They're Asking

ComplianceMarch 25, 2026·7 min read

The application process has changed dramatically

Five years ago, getting a cyber insurance policy was straightforward. Fill out a short questionnaire, check a few boxes, and receive a quote. The questions were vague — "Do you have security measures in place?" — and the underwriter rarely followed up to verify the answers.

That era is over. Between 2020 and 2025, the cyber insurance industry absorbed massive losses from ransomware claims, business email compromise payouts, and widespread data breach incidents. Insurers responded by fundamentally rewriting their applications. Today's questionnaires are detailed, technical, and specific. They ask about individual security controls by name. Many insurers now require external vulnerability scans or security assessments as part of the application process itself.

If you have not applied for or renewed a cyber insurance policy recently, the new process will look nothing like what you remember.

What insurers are asking now

Modern cyber insurance applications focus on a specific set of controls that underwriters have identified as the strongest predictors of whether a business will experience a successful attack. Here are the most common requirements.

Multi-factor authentication (MFA)

Nearly every insurer now asks whether MFA is enabled on email, remote access, and administrative accounts. Many will not issue a policy at all if MFA is not in place for email. This is not negotiable — insurers have seen too many claims originating from compromised email accounts that had only password protection.

The question is usually specific: "Is MFA enforced for all users accessing email remotely?" Note the word "enforced" — having MFA available but optional is not the same as having it required for every user.

Phishing awareness training

Insurers ask whether employees receive regular security awareness training, how often it occurs, and whether it includes simulated phishing exercises. The best answers reference a documented training program with measurable results — completion rates, phishing simulation click rates over time, and evidence of improvement.

A one-time training session from two years ago will not satisfy modern underwriters. They want to see ongoing, recurring training with documented participation.

Incident response plan

"Do you have a documented incident response plan?" is now a standard question. Underwriters want to know that if a breach occurs, you have a defined process for containment, investigation, notification, and recovery. They may ask for a copy of the plan or ask follow-up questions about specific procedures — who is responsible for what, how quickly systems can be isolated, and whether the plan has been tested.

An incident response plan does not need to be a 50-page document. For a small business, a clear two-to-three page plan that covers the essential steps is sufficient. What matters is that it exists, that employees know about it, and that it has been reviewed within the past year.

Security policies

Insurers increasingly ask about documented security policies — acceptable use policies, data handling procedures, access control standards, and password requirements. These policies demonstrate that your organization has thought about security systematically rather than handling it ad hoc.

The policies themselves do not need to be complex. They need to exist, be current, and be communicated to employees. Having employees formally acknowledge that they have read and understood the policies adds another layer of documentation that insurers value.

Vulnerability scanning and patch management

"How frequently do you scan for vulnerabilities?" and "What is your process for applying security patches?" are now common application questions. Insurers want to see that you are actively monitoring your systems for known weaknesses and have a process for addressing them.

Regular scanning results — showing findings over time and evidence of remediation — provide concrete documentation that you are managing your attack surface. This is far more convincing than simply checking "yes" on a questionnaire.

Endpoint detection and response (EDR)

Traditional antivirus is no longer sufficient for most insurers. They ask specifically about endpoint detection and response solutions — software that monitors devices for suspicious behavior, not just known malware signatures. If you are still relying on basic antivirus, expect pushback from underwriters.

Backup and recovery

Insurers ask detailed questions about backup procedures: How often are backups performed? Are backups stored offline or in a separate environment? Have you tested restoring from backup? The ransomware epidemic taught insurers that businesses without tested, isolated backups are far more likely to pay ransoms — and file larger claims.

What happens if you misrepresent your security

Here is something many business owners do not realize: cyber insurance applications are legal documents. If you claim to have security controls in place and a claim later reveals that you did not, the insurer can deny the claim entirely.

This is not theoretical. Insurers have denied claims worth millions of dollars after discovering that the policyholder misrepresented their security posture on the application. In one widely reported case, a company claimed to have MFA enabled across all systems. After a breach, the insurer's forensic investigation revealed that MFA had been disabled on several critical accounts. The claim was denied.

The temptation to check "yes" on every box is understandable — especially when a "no" answer means a higher premium or outright denial of coverage. But the consequences of misrepresentation far outweigh the cost of implementing the controls properly. A denied claim after a breach leaves you with both the cost of the breach and the premiums you paid for coverage that will never pay out.

How to answer the questions honestly — and well

Document what you have

Before starting the application, take inventory of your actual security controls. Do you have MFA enabled? On which systems? Is it enforced or optional? When was your last phishing training? Do you have written policies? Knowing your real baseline prevents you from accidentally overstating or understating your posture.

Fill gaps before applying

If your inventory reveals gaps — no incident response plan, no phishing training program, no recent vulnerability scans — address them before submitting the application. Most of these controls can be implemented in days or weeks, not months. The cost of implementing them is almost always less than the premium increase you would face by answering "no."

Provide evidence, not just answers

Where applications allow attachments or additional documentation, provide evidence. Attach your most recent vulnerability scan report. Include your incident response plan. Reference your training program's completion statistics. Concrete documentation signals to underwriters that your answers are genuine, which can result in better pricing and terms.

Keep records continuously

The strongest position for insurance applications is having continuous documentation of your security program — scan results over time, training completion logs, policy acknowledgement records, phishing simulation results. This history tells a story of ongoing diligence, not a last-minute scramble before renewal.

How continuous monitoring changes the conversation

The businesses that have the easiest time with cyber insurance applications are the ones that treat security as an ongoing process rather than an annual checkbox exercise. When you have a platform that continuously monitors your vulnerabilities, tracks employee training completion, manages security policies, and documents everything automatically, answering insurance questionnaires becomes a matter of pulling up your dashboard rather than scrambling to reconstruct what you did last year.

Continuous monitoring also catches problems before they become claims. A vulnerability scan that identifies an exposed service gives you the chance to close it before it is exploited. A phishing simulation that reveals high click rates tells you which employees need additional training before they fall for a real attack. Breach monitoring that alerts you to compromised credentials lets you force password resets before those credentials are used against you.

This is the shift insurers are trying to drive: from reactive security that responds to incidents to proactive security that prevents them. The businesses that make this shift get better coverage, lower premiums, and — most importantly — fewer breaches.

Start with visibility

You cannot document controls you do not have, and you cannot improve a security posture you cannot measure. The first step — whether you are applying for cyber insurance next month or next year — is understanding what your current security exposure actually looks like.

Run a free security assessment to see your vulnerabilities, email security configuration, and exposed services. The results give you a concrete starting point for both your security program and your insurance application.

Protect your firm with Kaspera Shield

Vulnerability scanning, email security monitoring, phishing simulation, and compliance — all in one platform built for businesses without a security team.

Start Free Trial

More Resources

© 2026 Kaspera Shield. A product of Kaspera.

Built for the businesses attackers target most.