Cyber Insurance Requirements: Meeting the Standards Insurers Expect

Cyber insurers won’t cover every business by default. To qualify, you need to meet baseline security standards that prove you can prevent, detect, and recover from attacks. This guide explains the core requirements most insurers expect, how they vary by business type, and what happens if you fall short.

Why insurers set requirements before offering cover

Cyber insurance is about managing risk for both you and the insurer. Before they agree to cover you, insurers want proof that your business can prevent and respond to common cyber threats. The stronger your defences, the less likely you are to claim and the more confident the insurer will be in offering cover at a competitive price.

Understanding an insurer’s risk appetite

Every insurer has a threshold for the level of risk it will accept. Businesses with no MFA, outdated systems, or poor backup practices often fall outside that threshold. Meeting baseline security standards shows you are a lower risk and gives you access to broader policy options.

How requirements protect you and the insurer

Security controls are not just for ticking boxes. They reduce the chance of a breach, limit the scale of damage if one occurs, and speed up recovery. This means fewer claims for the insurer, and less downtime and cost for your business.

Typical controls include:

  • Multi-factor authentication for email, systems, and cloud apps
  • Encrypted, offline backups
  • Anti-phishing tools and email filtering
  • Endpoint detection and response (EDR)
  • Regular patching of critical systems

Why failing to meet them can cost you

If you do not meet the insurer’s minimum standards, they may refuse cover altogether. Even if you get a policy, a breach linked to missing controls can lead to a reduced payout or a denied claim. Some insurers offer conditional cover with a set timeline for improvement, but until those changes are implemented, your cover may be limited.

Core cyber insurance requirements most UK insurers expect

Most insurers look for the same baseline controls before they agree to cover you. These measures protect your systems, limit the impact of attacks, and demonstrate to the insurer that you take security seriously.

Multi-factor authentication (MFA)

Passwords alone are no longer enough. MFA adds an extra layer, such as a code, mobile app approval, or hardware token, to confirm identity. Insurers often insist that MFA is enabled on email accounts, remote access, and critical cloud systems. Without it, stolen passwords can lead directly to a breach and a denied claim.

Regular software updates and patch management

Unpatched software is one of the most common causes of cyber attacks. Insurers expect you to apply security updates promptly, especially for internet-facing systems such as firewalls, servers, and VPNs. Many policies now require evidence that patching is scheduled and documented. 

A delay can give attackers an open door and may put your cover at risk.

Secure backups

Backups are your safety net in case ransomware or data loss occurs. Insurers seek encrypted backups stored offline or on a secure cloud platform. They may also ask if you test restores regularly, since an untested backup is as risky as having none at all. Proving you have resilient, immutable backups can also lower premiums.

Email filtering and anti-phishing tools

Phishing remains the most common attack method. Filtering tools scan incoming emails for malicious links, attachments, or spoofed domains before they reach staff inboxes. 

Insurers expect these controls as they drastically reduce the risk of ransomware or fraud. Without filtering, a single click could trigger a costly claim.

Endpoint detection and antivirus

Traditional antivirus is no longer enough. Insurers now expect endpoint detection and response (EDR) or equivalent advanced tools. These devices continuously monitor the network, detect suspicious activity, and isolate threats before they spread across the network. Laptops, desktops, and servers all need protection. Insurers often ask what endpoint solution you use during underwriting.

Incident response plan

A written incident response plan shows you are prepared. It outlines who to contact, what steps to take, and how to recover systems in the event of an attack. Insurers value this because it reduces downtime, minimises losses, and facilitates easier claim validation. Many will request a copy of your plan, or at least a summary of your escalation process.

Meeting these requirements is more than ticking boxes. Each one directly reduces the chance of a breach and ensures your insurer will stand by you if a claim is made.

Do you need Cyber Essentials to get covered?

Cyber Essentials is not a legal requirement for most cyber insurance policies. Many insurers will still offer cover without it. However, certification can speed up approval, reduce the number of security questions you need to answer, and in some cases, lower your premium.

When it’s required and when it’s not

Some insurers, particularly those covering public sector suppliers or regulated industries, require at least Cyber Essentials certification before offering a policy. For most SMEs, it is optional but strongly recommended.

The difference between Essentials and Essentials Plus

  • Cyber Essentials: Self-assessed, verified by an independent body, covering five core technical controls.
  • Cyber Essentials Plus: Includes all of the above, plus an independent audit and on-site or remote testing.

How certification can lower premiums or open up cover

Certification proves you meet a recognised security baseline. Insurers view this as a sign of lower risk, which can result in cheaper premiums, broader coverage, or fewer exclusions.

Related guide: Cyber Essentials & Insurance: How certification affects your cover

Are there different requirements by business size or sector?

Insurers adjust their expectations based on your turnover, headcount, industry, and the type of data you handle. Larger businesses or those in high-risk sectors often face stricter standards.

Micro and small businesses – under £1M turnover

Requirements are usually lighter, but core controls, such as MFA, backups, and antivirus, are still mandatory. Some insurers may waive advanced measures if your risk profile is low, though you may pay more without them.

Mid-sized businesses – up to £10M turnover

Expect more detailed risk assessments, written policies, and regular penetration testing. You may also need endpoint detection and response (EDR) and advanced email security.

Regulated industries – finance, legal, healthcare

These sectors face higher scrutiny because of the sensitivity of the data they hold. Insurers may require Cyber Essentials Plus, encryption for data in transit and at rest, and strict identity access management.

Tech-driven or SaaS companies

Insurers focus on intellectual property protection, data classification, and managing third-party risks. You may also need secure software development practices and regular code audits.

What happens if you don’t meet the requirements?

Not meeting an insurer’s security standards can put your cover at risk. In some cases, you may not be able to obtain a policy at all. In others, you might be approved but find your claim reduced or denied if the missing control is linked to the breach.

Cover may be refused or limited

Insurers check for baseline protections like MFA, patch management, and secure backups. If these are missing, they may decline your application or only offer reduced cover limits. In practice, this means you could pay the same premium but get far less protection.

Claims can be denied after a breach

Having a policy is not enough. If a breach occurs because your business failed to implement basic controls, the insurer may reject the claim. For example, if ransomware takes hold and you cannot restore from offline backups, recovery costs may not be paid.

Some insurers offer conditional cover with a timeline to improve

Occasionally, insurers issue cover on the condition that you close security gaps within a set timeframe. Until you do, higher premiums or exclusions may apply. You might also face stricter reporting obligations, such as quarterly security checks or evidence of patching.

{ "@context": "https://schema.org", "@type": "FAQPage", "name": "Cyber insurance claims FAQs", "description": "Making a claim can feel unclear if you have never faced one before. These common questions explain how claims work, what is covered, and why some are denied.", "mainEntity": [ { "@type": "Question", "name": "How do I make a cyber insurance claim in the UK?", "acceptedAnswer": { "@type": "Answer", "text": "Notify your insurer as soon as you become aware of an incident, typically within 24 to 48 hours. They will connect you with approved incident response teams, legal advisers, and PR support. You will need to share details of the event and evidence of what was affected." } }, { "@type": "Question", "name": "Does cyber insurance cover ransomware payouts?", "acceptedAnswer": { "@type": "Answer", "text": "Most UK policies cover ransomware, including negotiation and payment, as long as you meet the policy's security requirements. Insurers will also cover recovery costs, forensic investigation, and system restoration." } }, { "@type": "Question", "name": "What documents do I need to support a claim?", "acceptedAnswer": { "@type": "Answer", "text": "Provide system logs, emails, or IT reports that show how the incident happened and when. Keep copies of invoices, costs, and all relevant communications with customers or regulators. A clear paper trail streamlines the claim process." } }, { "@type": "Question", "name": "Can a cyber insurance claim be denied?", "acceptedAnswer": { "@type": "Answer", "text": "Yes. Claims are often denied if you miss the notification deadline, fail to meet basic security standards like MFA, or the event falls under an exclusion such as state-sponsored attacks. Always check your policy wording." } } ] }