Featured image: Ransomware demand averages now exceed $850k — far beyond what most small businesses can absorb.
Cyberattacks on small and mid-sized businesses (SMBs) are no longer a "big company" problem. According to Verizon's 2025 Data Breach Investigations Report, 43% of all breaches now target SMBs — and those breaches have a roughly 60% chance of putting the business out of operation within six months. Cyber insurance has become as essential as workers' comp, but the policies are dense, the underwriting has gotten strict, and it's easy to buy the wrong coverage.
Why the market changed in 2025–2026
After three brutal years of ransomware losses, the cyber insurance market hardened sharply: premiums up 28% in 2024, then leveled out in 2025 as carriers got picky. Today, no major carrier will issue a policy without verified security controls — meaning if you don't already have multifactor authentication (MFA), endpoint detection (EDR), and tested backups, you can't even buy coverage at any price.
That's actually good news. The carriers that made it through the worst of the ransomware era have refined their products and pay claims faster than they used to.
What cyber insurance actually covers
Cyber policies bundle two very different categories of coverage. Confusing them is the #1 cause of denied claims.
First-party coverage (your losses)
- Ransomware payments and negotiation services
- Forensic investigation to identify the breach scope
- Business interruption from a system outage
- Data restoration costs
- Notification expenses when customer data is exposed
- Credit monitoring for affected customers
- PR and crisis management
- Cyber extortion beyond ransomware
Third-party coverage (what you owe others)
- Privacy liability for lawsuits from affected customers
- Regulatory fines under GDPR, CCPA, HIPAA, PCI
- Defense costs for litigation
- Media liability for content-related claims
A common mistake is buying a policy with a $1M aggregate that covers both — and then finding the third-party suit alone consumes the entire limit, leaving nothing for the actual recovery costs.
What insurers now require before issuing a policy
This is the single biggest change since 2023. Every reputable carrier now requires a security questionnaire — and they verify it. Standard requirements:
| Control | Typical requirement |
|---|---|
| Multifactor authentication (MFA) | Required on email, VPN, remote access, admin accounts |
| Endpoint Detection & Response (EDR) | CrowdStrike, SentinelOne, Defender for Business, etc. |
| Backups | Offline or immutable, tested quarterly |
| Email filtering | Anti-phishing with sandboxing |
| Patch management | Critical patches within 14 days |
| Employee security training | Annual minimum |
| Privileged Access Management (PAM) | For mid-market and up |
If you can't truthfully check most of these, fix the gaps before applying. Misrepresentation on the application is the easiest reason for a carrier to void coverage after a breach.
How much coverage should you actually buy?
A useful rule of thumb: annual revenue × 0.10, with a $1M floor for any business handling customer data and a $5M floor if you process payment cards or PHI. Real-world examples:
- 10-person digital agency, $2M revenue → $1M policy (~$1,800–$3,500/yr)
- 50-person SaaS company, $10M revenue → $3M policy (~$8,000–$18,000/yr)
- 100-person e-commerce shop with PCI exposure, $25M revenue → $5M+ policy (~$25,000–$60,000/yr)
These are illustrative — your industry, security posture, and claims history move the price ±50%.
What cyber insurance does NOT cover
- Acts of war (this exclusion expanded sharply after Lloyd's 2022 guidance)
- Pre-existing breaches unknown at policy inception
- Bodily injury / property damage (that's general liability)
- Patent infringement
- Insider fraud (often a separate crime/fidelity policy)
- Failure to maintain represented controls (read this carefully)
Incident response: the part that actually matters
The "claim experience" with cyber insurance is fundamentally different from other lines. When you call the breach hotline at 3 a.m., what shows up matters more than what's printed in the policy:
- A panel of pre-vetted forensics firms (Mandiant, Coalition, CyberCX, Arete)
- Ransom negotiators who handle the threat actor for you
- Privacy counsel familiar with your state's notification laws
- PR specialists
When evaluating carriers, ask specifically about response-time SLAs and which IR firms are on the panel. A policy with great limits and a slow response team can still bankrupt you.
How to actually buy: 6-step playbook
- Inventory your sensitive data (customer PII, payment data, PHI, IP)
- Audit and remediate against the standard control list above
- Get three quotes from independent cyber-specialty brokers (not generalists)
- Compare per-incident sublimits carefully (ransomware sublimit, social engineering sublimit, regulatory fine sublimit)
- Verify the IR panel and demand a sample notification template
- Renew with documentation of any control improvements — premiums often drop at renewal
Key takeaways
- Cyber insurance is now table stakes for any SMB handling customer data.
- MFA, EDR, and tested backups are non-negotiable underwriting requirements.
- First-party and third-party coverage are different — make sure both have meaningful limits.
- Incident response panel quality matters as much as policy limits.
Frequently asked questions
See the FAQ block below for the questions readers ask most.
Final word
Cyber insurance is the rare line of coverage where buying the policy forces you to fix problems you should have fixed anyway. The underwriting questionnaire alone is the cheapest cybersecurity assessment your business will ever get. Use it as a roadmap, lock in coverage, and revisit annually — the threat landscape moves faster than any other category we cover.
Related reading on InsureLab
Sources & further reading
Frequently asked questions
Do I really need cyber insurance for a small business?+
If you handle any customer data, payment information, or rely on email and cloud apps to operate, yes. Even a $1M policy at $1,800–$3,500/year is usually trivial compared to a single ransomware incident.
Will my general liability or BOP cover cyber incidents?+
Almost never. Standard CGL and BOP policies explicitly exclude cyber events. A standalone cyber policy or a true cyber endorsement on a BOP is required.
What if I can't pass the underwriting requirements?+
Some carriers offer a basic 'cyber starter' policy with sub-limits and higher deductibles for businesses still implementing controls. Use it as a bridge — and remediate fast.
Does cyber insurance cover paying the ransom?+
Yes, in most policies, ransomware payments are covered — subject to OFAC sanctions screening (you can't pay a sanctioned threat actor under U.S. law). The carrier's negotiator usually handles this for you.
Found this helpful?
Share it with a friend who's about to renew their policy — and browse our other guides while you're here.
