Your Cyber Insurance Application Is Lying (And Your Insurer Knows It)

Let me paint a picture.

You're renewing your cyber insurance. The application is 12 pages long and full of questions like "Do you enforce multi-factor authentication on all remote access?" and "Are your backups stored offsite and tested regularly?" and "Do you have endpoint detection and response deployed on all devices?"

You check "yes" on all of them. Because you're pretty sure you do. Your IT guy set that stuff up. Probably. At some point.

Six months later, you get hit with ransomware. You file a claim. And that's when the insurer sends in their forensics team — not to help you recover, but to verify every single answer on that application.

MFA? It was enabled on email but not enforced on VPN. That's a no.

Backups? They existed, but they were on the same network as the encrypted servers. Ransomware got them too. That's a no.

EDR? The subscription expired in October. Nobody noticed. That's a no.

**Claim denied.**

This is happening to businesses every single day. And it's not because insurers are trying to screw you — it's because they tightened the rules and most businesses haven't kept up.

## The Questions Got Harder

Two years ago, a cyber insurance application was half a page. "Do you have antivirus? Do you have a firewall? Great, here's your policy."

Those days are gone.

Today's applications are detailed, technical, and specific. They're not asking if you *have* MFA — they're asking if it's *enforced* on all remote access, email, VPN, RDP, and cloud admin portals. They're not asking if you *do* backups — they're asking if they're encrypted, offsite, immutable, and tested within the last 90 days.

And here's the part that matters: your answers are warranties. That means if you say "yes" and the answer is actually "sort of" or "we used to" or "I think so" — you've just voided your own policy.

## The Most Common Lies (That Aren't Intentional)

Nobody's trying to commit insurance fraud. But the gap between what businesses think they have and what they actually have is enormous.

**"Yes, we enforce MFA."**

What they mean: We turned on MFA for Office 365 last year.

What the insurer means: MFA is enforced — not just enabled — on every remote access point. Email, VPN, RDP, cloud admin consoles, and any externally facing application. No exceptions. No "optional" enrollment.

**"Yes, we have endpoint protection on all devices."**

What they mean: We installed antivirus on the computers when we bought them.

What the insurer means: You have active endpoint detection and response (EDR) — not just antivirus — deployed on every endpoint in your environment, including servers. It's monitored, alerts are reviewed, and the subscription is current.

**"Yes, our backups are tested and stored offsite."**

What they mean: We have a backup drive. It's in the closet. Bob set it up.

What the insurer means: Backups run on a schedule, are stored offsite or in the cloud, are encrypted, ideally immutable (meaning ransomware can't touch them), and someone has actually restored from them recently to verify they work.

**"Yes, we have an incident response plan."**

What they mean: We'd probably call our IT guy.

What the insurer means: You have a written, documented plan that specifies roles, responsibilities, communication procedures, containment steps, and recovery processes. And your team has been trained on it.

## Why This Matters More Than You Think

Here's the math that should scare you.

You're paying $5,000-$15,000 a year for cyber insurance. You think you're covered. You get breached. The average cost of a data breach for a small business is north of $150,000 when you add up downtime, recovery, legal costs, and customer notification.

You file the claim. The insurer audits your controls. They find gaps between your application and reality. Claim denied.

You just paid for insurance you can't use, and you're on the hook for the full cost of the breach. That's the worst possible outcome — the cost of the insurance AND the cost of the incident.

## What You Should Do Instead

Get assessed before you fill out the application. Not after.

Bring in someone who knows what insurers are actually looking for — not what the questions seem to be asking, but what the technical requirements really are. Have them verify your MFA, your backups, your EDR, your segmentation, your patch management, all of it. Against the actual application.

Where there are gaps, fix them before you check "yes."

Then when you submit that application, every answer is backed by evidence. Screenshots. Configuration exports. Test results. Documentation. Not hopes and assumptions.

And if you do get breached, the insurer's forensics team finds exactly what you said they'd find. Claim approved.

## The Bottom Line

Your cyber insurance application isn't a formality. It's a contract. Every "yes" is a promise, and your insurer will hold you to it at the worst possible time.

Don't guess. Don't assume. Get verified.

*Sparrowhawk Technology — Making your technology safe and easy to use.*

Previous
Previous

5 Signs Your Business Has Already Been Hacked (And You Don't Know It)

Next
Next

Keeping Your Technology Safe: A Laughing Matter?