{"id":54897,"date":"2022-10-17T19:07:50","date_gmt":"2022-10-17T15:07:50","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=54897"},"modified":"2025-11-19T15:45:15","modified_gmt":"2025-11-19T11:45:15","slug":"cyber-insurance-5-important-things-msps-must-know","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/cyber-insurance-5-important-things-msps-must-know\/","title":{"rendered":"Cyber Insurance: 5 Important Things MSPs Must Know"},"content":{"rendered":"<p>As an MSP offering cybersecurity services and engaging with customers about securing their environment, you\u2019re going to need to know a thing or two about cyber insurance.<!--more--><\/p>\n<p>You\u2019re seen by your customers as a trusted advisor in all things tech. And because cyber insurance is so closely associated with cybersecurity, it\u2019s likely going to be seen as something you should know a thing or two about, in order to help the customer consider whether they need a policy, what kinds of coverage they should have, etc.<\/p>\n<p>To get you started, here are five pieces of information about cyber insurance you should know as a foundation.<\/p>\n<h2>1. Cyber Insurance Isn\u2019t a Must<\/h2>\n<p>Like any part of a business\u2019s risk mitigation efforts, cyber insurance is just another tool to choose from in order to help offset the risk that cyberattacks present to your customers\u2019 operations. Remember how backups used to be seen as gimmicky and just \u201can insurance policy\u201d? Well, that\u2019s exactly what they are \u2013 a technology put in place just in case the unforeseen happens.<\/p>\n<p>In the same way, cyber insurance isn\u2019t a catch-all, broodingly protecting the customer with a safety net of sorts should a cyberattack occur. It\u2019s quite the opposite; cyber insurance is a way for your customers to transfer the financial risk of a cyberattack to the insurer. And, given that most insurers evaluate a prospective insured\u2019s cybersecurity stance before issuing a policy (more on this later), policies should be seen as a last resort should every other aspect of your customer\u2019s cyber defenses fail.<\/p>\n<p>That being said, it\u2019s not necessary (unless specified by some regulatory or governing body) for a given business to have cyber insurance. It\u2019s an option for those businesses and scenarios where having a policy in place makes sense.<\/p>\n<p>And, given the massive <a href=\"https:\/\/blog.knowbe4.com\/cyber-insurance-expected-to-continue-to-rise-as-sophistication-and-cost-of-ransomware-attacks-increase\" target=\"_blank\" rel=\"noopener noreferrer\">increases in cyber insurance costs that have both already occurred and are expected to continue<\/a>, it may become cost-prohibitive for a small business to participate at all.<\/p>\n<blockquote><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-1ff16dd1-0f56-4b3a-b023-2fae75e14b55\" data-portal=\"5442029\" data-id=\"1ff16dd1-0f56-4b3a-b023-2fae75e14b55\"><span class=\"hs-cta-node hs-cta-1ff16dd1-0f56-4b3a-b023-2fae75e14b55\" id=\"hs-cta-1ff16dd1-0f56-4b3a-b023-2fae75e14b55\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/1ff16dd1-0f56-4b3a-b023-2fae75e14b55\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-1ff16dd1-0f56-4b3a-b023-2fae75e14b55\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/1ff16dd1-0f56-4b3a-b023-2fae75e14b55.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/blockquote>\n<h2>2. There Are Two Kinds of Coverage Your Customers May Want<\/h2>\n<p>While a given company may be issued a single policy, there are two types of claims that may be presented against a policy which, in turn, dictates the coverages that may need to be covered within the policy. The two types of claim coverages are:<\/p>\n<ul>\n<li><strong>1st Party Claim Coverage<\/strong> \u2013 This cyber insurance coverage protects your customer should they be the victim of a data breach, cyber event, ransomware attack, a loss of funds (fraud), other situational types of coverage against things like reputational harm, voluntary shutdown of the business, business interruption reimbursement, and more.<\/li>\n<li><strong>3rd Party Claims Coverage<\/strong> \u2013 This cyber insurance coverage protects against lawsuits by another party. For example, if your customer has a data breach and personal customer data (think social security numbers, credit card info, etc.) has been published on the dark web, your customer could be the subject of a lawsuit. This kind of coverage protects against class action claims, regulatory claims, and private rights of action claims.<\/li>\n<\/ul>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/why-cyber-insurance-is-crucial-for-msp-clients-an-unavoidable-necessity\/\">Why Cyber Insurance Is Crucial for MSP Clients: An Unavoidable Necessity<\/a><\/p>\n<h2>3. There Are Some Tech Basics Needed<\/h2>\n<p>In 2022, not every cyber insurer has the exact same requirements. Cyber insurance is still somewhat in its infancy today, with many insurers learning from the outcomes of claims placed against initially issued policies and formulating what specific technologies need to be in place before they\u2019ll even consider issuing a policy. The most rudimentary list that almost all insurers agree on includes (but certainly isn\u2019t limited to):<\/p>\n<ul>\n<li><strong>Backups<\/strong> \u2013 This is on every insurer\u2019s radar. The idea that a business can get itself back up and operational quickly means less impact to the insured (your customer) and, therefore, less damages to be presented in a claim.<\/li>\n<li><strong>Endpoint Protection<\/strong> \u2013 Insurers realize that phishing remains the number-one attack vector for most cyberattacks, so they require you to have protection on endpoints as a minimum.<\/li>\n<li><strong>Patch \/ Vulnerability Management<\/strong> \u2013 Keeping operating systems and applications up to date is critical to minimize the use of supply chains (read: the software vendors that make the applications your customers utilize) as an attack vector.<\/li>\n<\/ul>\n<h2>4. Policies Are Cheaper Than a Breach<\/h2>\n<p>According to <a href=\"https:\/\/www.ibm.com\/account\/reg\/us-en\/signup?formid=urx-51643\" target=\"_blank\" rel=\"noopener noreferrer\">IBM\u2019s Cost of a Data Breach report<\/a> this year, the average data breach costs the victim organization around $4.5 million. That seems very much an enterprise number, so let\u2019s use the last published number available, which came from Ponemon\u2019s 2019 \u201cState of Cybersecurity in Small &amp; Medium Size Businesses\u201d report, where the average cost after a cyberattack was $1.2 million. Even if you scale that number down a bit to better reflect the size of your typical customer, it\u2019s still evident that the cost of a cyber insurance policy is materially lower than dealing with a breach. But, in the spirit of keeping things real, be sure to check out the last consideration\u2026<\/p>\n<h2>5. Pay Attention to Policy Specifics<\/h2>\n<p>Insurers aren\u2019t just offering a blanket \u201cyou\u2019re protected against all things cyber\u201d, as they wouldn\u2019t remain in business for very long. There are plenty of cases where a claim was denied, the insured sued the insurer, and lost in court because of a technicality involving the policy covering specific types of threat actions that weren\u2019t present in the attack that prompted the claim in the first place. So, whether you\u2019re involved in helping your customer choose a policy, or just providing them with guidance, make sure they understand that the only way a claim will be paid is if the attack actions follow the policy coverage to the letter.<br \/>\nGetting the Most out of Cyber Insurance<br \/>\nDoes your customer absolutely need a cyber insurance policy? No. Should they have one? Probably. Will it definitely cover the customer\u2019s losses should an attack occur? It depends.<\/p>\n<p>The reality is that cyber insurance is an opportunity for you as the customer\u2019s trusted technology partner to ensure they are as protected as possible, minimizing the risk of a successful attack and, therefore, the need for a claim. By providing your customer with proper guidance, you set them and you up for success through better cybersecurity controls and incident response plans in place, and a proper level of dependency on a cyber insurance policy as just one of many parts of the overarching cybersecurity strategy.<\/p>\n<h3>Explore more solutions from MSP360<\/h3>\n<p><span style=\"font-weight: 400;\">We offer <\/span><a href=\"https:\/\/www.msp360.com\/backup\/cloud-backup\/\"><span style=\"font-weight: 400;\">\u00a0reliable cloud backup<\/span><\/a><span style=\"font-weight: 400;\"> and image-based protection. A key feature is the dedicated<\/span><a href=\"https:\/\/www.msp360.com\/saas-backup\/\"> <b>SaaS backup<\/b><\/a><span style=\"font-weight: 400;\"> for popular platforms like <\/span><a href=\"https:\/\/www.msp360.com\/saas-backup\/m365\/\"><span style=\"font-weight: 400;\">Microsoft 365<\/span><\/a><span style=\"font-weight: 400;\">, including<\/span><a href=\"https:\/\/www.msp360.com\/saas-backup\/m365\/onedrive-backup\/\"> <b>OneDrive backup<\/b><\/a><b>,<\/b><a href=\"https:\/\/www.msp360.com\/saas-backup\/m365\/outlook-backup\/\"> <span style=\"font-weight: 400;\">Outlook Backup<\/span><\/a><span style=\"font-weight: 400;\"> features, <\/span><a href=\"https:\/\/www.msp360.com\/saas-backup\/google-workspace\/.\"><span style=\"font-weight: 400;\">Google Workspace<\/span><\/a><span style=\"font-weight: 400;\"> and the benefits of <a href=\"https:\/\/www.msp360.com\/resources\/blog\/company-management-for-microsoft-365-and-google-workspace\/\">Domain Management.<\/a><\/span><\/p>\n<p><a href=\"https:\/\/www.msp360.com\/rmm\"><b>RMM<\/b><\/a> <b>Platform:<\/b><span style=\"font-weight: 400;\"> This flagship product provides powerful<\/span><a href=\"https:\/\/www.msp360.com\/rmm\/monitoring-and-alerting\/\"><span style=\"font-weight: 400;\"> monitoring and alerting<\/span><\/a><span style=\"font-weight: 400;\"> and automated<\/span><a href=\"https:\/\/www.msp360.com\/rmm\/patch-management\/\"><span style=\"font-weight: 400;\"> patch management<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.msp360.com\/msp-software\/halo-psa-integration\/\"><span style=\"font-weight: 400;\">HALOPSA integration<\/span><\/a><span style=\"font-weight: 400;\">, to ensure endpoints remain secure and operate smoothly.<\/span><\/p>\n<p>Find what <a href=\"https:\/\/www.msp360.com\/resources\/blog\/powershell-vs-cmd-the-difference-explained\">PowerShell and Command Prompt are, what is the difference,<\/a> and when to use each of these tools.<\/p>\n<p><span style=\"font-weight: 400;\">Start securing your IT environment today with our<\/span><a href=\"https:\/\/www.msp360.com\/backup\/free-backup-software\/\"><span style=\"font-weight: 400;\"> Free Backup Software<\/span><\/a><span style=\"font-weight: 400;\"> or explore the full range of features. We are a<\/span><a href=\"https:\/\/www.msp360.com\/company\/\"><span style=\"font-weight: 400;\"> trusted company<\/span><\/a><span style=\"font-weight: 400;\"> committed to your success and here we share some tips on how <a href=\"https:\/\/www.msp360.com\/resources\/blog\/msp-marketing-should-msps-target-one-or-several-verticals\/\">MSP marketing can help you grow in a niche better<\/a>, or <a href=\"https:\/\/www.msp360.com\/resources\/blog\/setting-up-a-new-it-department\/\">setting up a new IT department<\/a>.<\/span><\/p>\n<p>Finally, find videos aimed to guide you through installation <a href=\"https:\/\/www.msp360.com\/resources\/video-tutorials\/msp360-explorer\/\">processes for the cloud storage of your choice<\/a>, with advanced features of MSP360 Explorer, an overview the support for <a href=\"https:\/\/www.msp360.com\/resources\/blog\/using-aws-kms-with-backup\/\">AWS Key Management Service in MSP360 Backup<\/a>, or <a href=\"https:\/\/www.msp360.com\/resources\/blog\/how-to-configure-vmimport-role\/\">how to configure a CM import role<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As an MSP offering cybersecurity services and engaging with customers about securing their environment, you\u2019re going to need to know a thing or two about cyber insurance.<\/p>\n","protected":false},"author":85,"featured_media":54898,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,884],"tags":[],"class_list":["post-54897","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-msp-business-articles"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/54897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=54897"}],"version-history":[{"count":6,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/54897\/revisions"}],"predecessor-version":[{"id":61349,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/54897\/revisions\/61349"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/54898"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=54897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=54897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=54897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}