{"id":4704,"date":"2026-02-12T04:40:48","date_gmt":"2026-02-12T12:40:48","guid":{"rendered":"https:\/\/www.cardonet.com\/news\/?p=4704"},"modified":"2026-02-12T04:53:38","modified_gmt":"2026-02-12T12:53:38","slug":"cyber-insurance-keeps-moving-the-goalposts-business","status":"publish","type":"post","link":"https:\/\/www.cardonet.com\/news\/cyber-insurance-keeps-moving-the-goalposts-business\/","title":{"rendered":"When Cyber Insurance Keeps Moving the Goalposts: Remain Insurable While Expectations Rise"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Will your policy really pay out?<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/will-your-cyber-insurance-policy-pay-out-cardonet-1024x683.png\" alt=\"Will your cyber policy pay out?\" class=\"wp-image-4707\" title=\"Will your cyber policy pay out?\" srcset=\"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/will-your-cyber-insurance-policy-pay-out-cardonet-1024x683.png 1024w, https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/will-your-cyber-insurance-policy-pay-out-cardonet-300x200.png 300w, https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/will-your-cyber-insurance-policy-pay-out-cardonet-768x512.png 768w, https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/will-your-cyber-insurance-policy-pay-out-cardonet-280x187.png 280w, https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/will-your-cyber-insurance-policy-pay-out-cardonet-1170x780.png 1170w, https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/will-your-cyber-insurance-policy-pay-out-cardonet.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>If you had a serious ransomware or payment\u2011fraud incident tomorrow, how confident are you that your cyber insurance would pay out in full and on time? Many mid\u2011market businesses only discover the answer to this very basic question is \u201cno\u201d when their insurer digs up the proposal form and compares it to what is actually happening on their network, in their backups and inside their finance processes.<\/p>\n\n\n\n<p>The UK Government\u2019s Cyber Security Breaches Survey 2025 shows that 43% of businesses reported a breach or attack in the last 12 months. Admittedly, this is down from 50% in 2024 (following an increased awareness of how cybercriminals can destroy great businesses) but medium and large organisations remain more at risk than small firms.&nbsp;<\/p>\n\n\n\n<p>Within that statistic, the share of businesses reporting ransomware roughly doubled year\u2011on\u2011year, from under half a percent to around 1% &#8211; a material rise even if from a low base. Separate\u00a0<a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2025\/cyber-security-breaches-survey-2025\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">government research<\/a>\u00a0estimates the wider annual cost of cyberattacks to the UK economy at about \u00a314.7 billion, roughly 0.5% of GDP, once disruption, recovery and lost business are included.<\/p>\n\n\n\n<p>In the US, the\u00a0<a href=\"https:\/\/www.ic3.gov\/AnnualReport\/Reports\/2024_IC3Report.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">FBI\u2019s 2024 IC3<\/a>\u00a0report records about 16.6 billion dollars in reported cybercrime losses in a single year, with cyber\u2011enabled fraud such as business email compromise responsible for a large share of that amount. The real issue for your business is not whether attacks happen. It is whether your controls, evidence and declarations hold up when the insurer starts asking hard questions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Five critical controls insurers now expect to see<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/five-technologies-cyber-insurers-demand-cardonet-1024x683.png\" alt=\"\" class=\"wp-image-4708\" srcset=\"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/five-technologies-cyber-insurers-demand-cardonet-1024x683.png 1024w, https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/five-technologies-cyber-insurers-demand-cardonet-300x200.png 300w, https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/five-technologies-cyber-insurers-demand-cardonet-768x512.png 768w, https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/five-technologies-cyber-insurers-demand-cardonet-280x187.png 280w, https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/five-technologies-cyber-insurers-demand-cardonet-1170x780.png 1170w, https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/five-technologies-cyber-insurers-demand-cardonet.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Insurers have moved past simple tick\u2011box questions and now expect to see real, year\u2011on\u2011year improvement in your cyber controls, backed by evidence they can inspect. In both the UK and US, the same weak spots keep coming up in underwriting calls, renewal questionnaires and post\u2011incident reviews.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Effective identity and access management\u00a0<\/strong><\/h3>\n\n\n\n<p>Underwriters expect strong, enforced multi\u2011factor authentication (MFA) for remote access, admin accounts, cloud email and key business systems, not just for a handful of senior users. In practice, that means conditional access rules, least\u2011privilege permissions and clear ownership for who approves, reviews and revokes access.<\/p>\n\n\n\n<p>A managed IT partner should be able to show live MFA coverage, highlight legacy VPNs or third\u2011party tools that fall outside those controls and provide a simple plan for closing the gaps.&nbsp;<strong>If your answers look good but your logs tell a different story, a claim is likely to be challenged.<\/strong><\/p>\n\n\n\n<p>Why insurers care: if an attacker walks straight in on a weak password, they will ask why you ever said MFA was \u201cin place\u201d.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Endpoint protection and monitoring, not just antivirus<\/strong><\/h3>\n\n\n\n<p>Basic antivirus on some laptops does not satisfy most cyber insurers. They want to know how you monitor endpoints across your estate, how quickly you detect suspicious behaviour, and what you do in the first minutes after you spot a problem.<\/p>\n\n\n\n<p>In a well\u2011run environment, every laptop, desktop and server sits under centrally managed endpoint protection with logging and alerting into a service desk or security function. When an alert fires at night, there is a clear playbook for isolating the device, collecting evidence and starting recovery, so the incident can be documented and, if needed, reported to the insurer and regulators.<\/p>\n\n\n\n<p>Why insurers care: slow or patchy detection turns a small incident into a big, expensive one.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Backups, recovery and continuity that survive ransomware<\/strong><\/h3>\n\n\n\n<p>For insurers, the real test is not whether you have backups but whether you can recover quickly when everything looks encrypted or offline. The UK survey confirms that ransomware remains a persistent threat, even though it still affects a relatively small proportion of businesses overall.<a><\/a><a><\/a><\/p>\n\n\n\n<p>That means multiple backup layers, including at least one offline or immutable copy, clear recovery time objectives for critical systems and documented test restores on a regular schedule. Your managed IT provider should be able to show when you last tested recovery for your finance system, how long it took and what you changed afterwards to make the next recovery smoother.<\/p>\n\n\n\n<p>Why insurers care:&nbsp;<strong>strong, tested recovery is what stops a ransom demand turning into weeks of downtime and a huge claim<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. Patch and vulnerability management with real follow\u2011through<\/strong><\/h3>\n\n\n\n<p>Insurers do not take your word for patching anymore. External scans give them a direct view of unpatched internet\u2011facing systems, and if those scans do not match your answers about \u201cregular patching\u201d, confidence drops fast.<\/p>\n\n\n\n<p>A mature patch process covers operating systems, key applications, network devices and cloud services, with a clear timetable for testing, deploying and documenting exceptions. Your IT partner should be able to produce straightforward reports showing outstanding critical vulnerabilities, how long they have been open and when they are due to be fixed, instead of vague statements about \u201ckeeping things up to date\u201d.<\/p>\n\n\n\n<p>Why insurers care: known, unpatched holes look like negligence, not bad luck.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>5. Email, finance and payment verification that stops fraud<\/strong><\/h3>\n\n\n\n<p>In both the UK and US, insurers are seeing more business email compromise and payment\u2011redirection fraud, often powered by AI\u2011generated messages that look and feel authentic. The IC3 report shows that business email compromise alone has driven multi\u2011billion\u2011dollar losses over recent years, making it one of the most expensive cyber\u2011enabled fraud types.<a><\/a><a><\/a><a><\/a><\/p>\n\n\n\n<p>Underwriters now probe your payment\u2011approval processes, vendor\u2011bank\u2011detail changes and how you verify unusual instructions. Robust controls include dual approvals for sensitive payments, mandatory call\u2011backs to trusted numbers for bank\u2011detail changes and strict rules for creating new beneficiaries, backed by regular awareness training and realistic phishing simulations. The key is consistency under pressure: controls that colleagues bypass during busy periods will not impress an insurer after a loss.<\/p>\n\n\n\n<p>Why insurers care: most of the really painful cheques they write now involve money leaving through email and payment fraud.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>6. Incident response readiness that has been tested<\/strong><\/h3>\n\n\n\n<p>Insurers increasingly ask whether you have an incident response (IR) plan, who leads it and when you last tested it. They also want to know how quickly you can identify, contain and report incidents, both to them and to regulators.<\/p>\n\n\n\n<p>A good IR setup defines roles, escalation paths, decision\u2011making criteria and draft messages for customers and colleagues. In the UK, that sits alongside ICO expectations when personal data is involved, with the regulator\u2019s own statistics showing regular data\u2011security incident reporting across sectors. In the US, differing state breach\u2011notification laws and sector rules add their own timelines, so you need a process your IT and legal advisers can follow even on a bad day.<a><\/a><a href=\"applewebdata:\/\/16B47696-C9C7-44D4-ABFD-878FC0FBD83A#fn9\"><sup>[9]<\/sup><\/a><\/p>\n\n\n\n<p>Why insurers care: a rehearsed response means fewer surprises, fewer mistakes and usually a smaller, cleaner claim.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How cyber insurers are changing the rules every year<\/strong><\/h2>\n\n\n\n<p>Cyber insurance used to be a short form and a quick chat about limits and price. That world has gone. In both the UK and US, insurers now price you on how risky you look in practice, not on how tidy your proposal form seems.<a><\/a><\/p>\n\n\n\n<p>In the UK, official surveys confirm that a substantial minority of organisations are still experiencing attacks, and government analysis highlights the wider economic cost of those incidents across sectors. In the US, the FBI\u2019s IC3 report records 16.6 billion dollars in reported losses for 2024, with cyber\u2011enabled fraud such as business email compromise taking the largest share by value and other attack types like ransomware battering critical infrastructure and operations.<a><\/a><a><\/a><a><\/a><a><\/a><a><\/a><\/p>\n\n\n\n<p>That has turned renewals into something closer to a mini audit:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Longer, more technical questionnaires on MFA, backups, segmentation and endpoint monitoring.<\/li>\n\n\n\n<li>External perimeter scans to cross\u2011check your answers with what is visible from the internet.<\/li>\n\n\n\n<li>Requests for policy documents, process descriptions and selected logs or incident summaries where there have been claims.<\/li>\n<\/ul>\n\n\n\n<p>Most mid\u2011market firms have some gaps when they first go through this. The ones that progress fastest are clear about those gaps and treat each renewal as a step\u2011change in maturity rather than a box\u2011ticking exercise.<a><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Premiums, deductibles and sub\u2011limits: what weak controls cost you<\/strong><\/h3>\n\n\n\n<p>Insurers do not care what you hope will happen. They care what your day\u2011to\u2011day operations look like when something goes wrong. As claims have grown, they have become far more aggressive in using premiums, deductibles and sub\u2011limits to separate stronger\u2011control firms from weaker ones.<sup><\/sup><\/p>\n\n\n\n<p>Broadly, you will see the impact in three areas:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Premiums:<\/strong>\u00a0Firms with strong, evidenced controls can often negotiate flatter or slower\u2011rising premiums. Firms with patchy controls get moved into more expensive buckets quickly.<\/li>\n\n\n\n<li><strong>Deductibles:<\/strong>\u00a0Ransomware, business interruption and fraud deductibles tend to be higher when insurers doubt your ability to prevent or contain incidents.<\/li>\n\n\n\n<li><strong>Sub\u2011limits and exclusions:<\/strong>\u00a0Social engineering, data restoration, incident response and regulatory\u2011cost cover are often capped or tightly conditioned for firms that cannot demonstrate robust controls.<\/li>\n<\/ul>\n\n\n\n<p>Insurers put weaker\u2011control firms in costlier brackets. If you can prove your controls actually work, you usually avoid that bracket.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The dangerous gap between what you declare and what actually happens<\/strong><\/h2>\n\n\n\n<p>The most dangerous weakness is often not the attacker. It is the gap between what you declare on the proposal form and what actually happens in your systems and processes.<\/p>\n\n\n\n<p>Typical examples include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>MFA declared as \u201cin place\u201d but only used for Microsoft 365 and a few admin tools, with remote access and third\u2011party connections left on passwords alone.<\/li>\n\n\n\n<li>\u201cRegular backups\u201d claimed, but no recent recovery test for your finance system and backups stored online where ransomware can reach them.<\/li>\n\n\n\n<li>\u201cEndpoint protection across all devices\u201d while contractors, personal laptops and legacy servers fall outside central management.<\/li>\n\n\n\n<li>\u201cDual approval for payments\u201d in policy documents, but one\u2011person approvals in practice when signatories are travelling or under time pressure.<\/li>\n<\/ul>\n\n\n\n<p>The ICO\u2019s trend data shows that many incidents still come down to basic process failures and human error, not sophisticated, targeted exploits. When an insurer investigates a claim, they look closely at whether controls were implemented as described, whether exceptions were documented and whether incident and recovery timelines align with your declarations. If there is a material mismatch, they have room to delay, reduce or in serious cases decline payment.<a><\/a><\/p>\n\n\n\n<p>Most mid\u2011market firms have at least some of these gaps. The crucial question is whether you find and fix them before an incident, or whether an insurer finds them afterwards during a claim.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why leadership, finance and IT need to act as one team<\/strong><\/h2>\n\n\n\n<p>Cyber insurance now cuts across risk management, finance and technology. If any one of those is missing from the conversation, you are likely to leave money or coverage on the table.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Leadership sets risk appetite and decides how much disruption, data loss and downtime the business is prepared to tolerate<\/li>\n\n\n\n<li>Finance focuses on premiums, deductibles, likely uninsured losses and whether cover still matches the balance sheet<\/li>\n\n\n\n<li>IT and your managed providers own the real\u2011world controls, from MFA and backups to incident response and payment processes<\/li>\n<\/ul>\n\n\n\n<p>The mid\u2011market businesses that handle rising insurer expectations best usually share ownership of questionnaires between finance and IT, with leadership close enough to understand trade\u2011offs, while regular IT and cyber audits feed into renewal planning, not just technical backlogs.<\/p>\n\n\n\n<p>They also maintain a short, practical evidence pack that includes MFA coverage summaries, backup and recovery\u2011test logs, patch\u2011status reports and brief incident write\u2011ups.<\/p>\n\n\n\n<p>This turns insurer conversations into informed risk discussions instead of last\u2011minute scrambles.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Turning renewals into a strategic review, not a form\u2011filling exercise<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"631\" src=\"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/cyber-insurance-renewal-risk-review-cardonet-2-1024x631.jpg\" alt=\"\" class=\"wp-image-4711\" srcset=\"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/cyber-insurance-renewal-risk-review-cardonet-2-1024x631.jpg 1024w, https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/cyber-insurance-renewal-risk-review-cardonet-2-300x185.jpg 300w, https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/cyber-insurance-renewal-risk-review-cardonet-2-768x474.jpg 768w, https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/cyber-insurance-renewal-risk-review-cardonet-2-280x173.jpg 280w, https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/cyber-insurance-renewal-risk-review-cardonet-2-1170x722.jpg 1170w, https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/cyber-insurance-renewal-risk-review-cardonet-2.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>A cyber insurance renewal is one of the few times each year when your business is forced to look at cyber risk as a whole. If you treat it as a form\u2011filling exercise, you waste a golden opportunity.<\/p>\n\n\n\n<p>In the UK, government and NCSC guidance encourage organisations to adopt practical baselines like Cyber Essentials and to think in terms of resilience and recovery as well as prevention. In the US, official reports on cybercrime losses and cyber insurance trends have pushed many boards to bake cyber risk into normal financial decisions instead of treating it as a side topic.<a><\/a><a><\/a><a><\/a><a><\/a><\/p>\n\n\n\n<p>The more resilient mid\u2011market firms now:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Plan a joint finance\u2011IT\u2011leadership session three to four months before renewal<\/li>\n\n\n\n<li>Review current controls against insurer questionnaires and recognised best\u2011practice guidance such as the NCSC small business guide<\/li>\n\n\n\n<li>Pick a small number of improvements that will both reduce risk and strengthen their position when negotiating premiums and terms<\/li>\n<\/ul>\n\n\n\n<p>If you already work with a managed IT partner, this is the conversation where you should ask for clear, detailed input on where you are exposed, not just a clean bill of health.&nbsp;<\/p>\n\n\n\n<p>If you do not, renewal season is a strong sign that it is time to bring in a partner who can connect technology, operations and insurance expectations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What continuous managed IT and security actually look like in practice<\/strong><\/h2>\n\n\n\n<p>You do not buy resilience once. You earn it in the small, routine tasks your IT team carries out every week.<\/p>\n\n\n\n<p>In a typical mid\u2011market business, a mature managed service relationship will include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>24\/7 monitoring of key systems and endpoints, with clear triggers for when engineers are alerted and how they respond<\/li>\n\n\n\n<li>Structured patch cycles, with planned maintenance windows, short exception lists and visible deadlines<\/li>\n\n\n\n<li>Backup routines that include offline or immutable copies for critical systems, plus scheduled test restores that prove you can hit your recovery targets<\/li>\n\n\n\n<li>Simple, clear incident runbooks so that when something breaks, everyone knows who leads, who talks to the insurer and who keeps customers informed<\/li>\n<\/ul>\n\n\n\n<p>Every one of these activities leaves an evidence trail in tickets, reports and logs. That trail is exactly what insurers and regulators want to see after an incident, because it shows you took reasonable steps before the attack, not just after it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why this matters for business leaders<\/strong><\/h2>\n\n\n\n<p>For a managing director or finance director, cyber insurance is now a core tool for protecting cash flow and balance sheet strength when something goes badly wrong. It is not just another line in the insurance schedule.<\/p>\n\n\n\n<p>In the UK, official surveys underline how common cyber incidents remain and how much disruption and cost they can cause across sectors, even as overall breach rates move slightly down. In the US, government and law\u2011enforcement data shows rising reported cybercrime losses with business email compromise and other fraud\u2011type scams dominating by value, and ransomware and similar attacks often driving the most visible operational disruption.<a><\/a><a><\/a><a><\/a><a><\/a><a><\/a><\/p>\n\n\n\n<p>Treating cyber insurance as a strategic review, supported by strong IT operations and realistic security controls, protects more than your premiums. It helps you keep serving customers when others are scrambling. It also shows boards, investors and regulators that cyber risk is being managed with the same discipline as any other major financial exposure.<\/p>\n\n\n\n<p>If you are a CEO or founder, the decisions this points you towards are simple:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Treat cyber insurance renewal as a board\u2011level risk review, not paperwork<\/li>\n\n\n\n<li>Fund a basic but serious control uplift around MFA, backups and payment checks, and make sure you can evidence it<\/li>\n\n\n\n<li>Make sure finance and IT sign off the same story before you sign the proposal form<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Protecting your business: next steps<\/strong><\/h2>\n\n\n\n<p><strong>If you want your policy to respond properly when you need it, your IT reality, your documentation, and your insurer declarations must line up.&nbsp;<\/strong><\/p>\n\n\n\n<p>That does not require a massive transformation programme, but it does require a clear plan and a partner who understands both technology and insurer expectations.<\/p>\n\n\n\n<p>Over the next 30\u201390 days, you should:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Run a focused cyber security audit that maps your controls against what insurers now ask for, including MFA, endpoint protection, backups, patching, incident response and payment processes<\/li>\n\n\n\n<li>Build a short evidence pack for renewals, with named owners for MFA, backups, patching, monitoring and finance processes so nothing depends on one person\u2019s memory<\/li>\n\n\n\n<li>Set up a quarterly review with your managed IT partner to track improvements against insurer questions and record what has changed since last year<\/li>\n<\/ul>\n\n\n\n<p>Typical investment in tightening MFA, backups and payment controls sits at a fraction of the potential losses from a serious incident, especially once downtime, lost deals and uninsured loss are considered.&nbsp;<\/p>\n\n\n\n<p>While exact figures vary by business, it is common for direct and indirect costs from a major cyber event to run well beyond the initial claim value.<a><\/a><a><\/a><a><\/a><\/p>\n\n\n\n<p>Cardonet helps organisations carry out practical cybersecurity audits that feed directly into cyber insurance readiness and renewal discussions, not just technical reports.&nbsp;<\/p>\n\n\n\n<p>If you want to understand where your declarations and day\u2011to\u2011day IT operations are out of sync, arrange a conversation with Cardonet.<\/p>\n\n\n\n<p>Together we can review current controls, identify where insurers are most likely to challenge and agree a realistic plan to close the gaps before they become a problem for your business.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Cyber insurance and IT controls: FAQs<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. What cyber controls do UK and US insurers now expect as standard for mid\u2011sized businesses?<\/strong><\/h3>\n\n\n\n<p>Most underwriters now expect enforced MFA on key systems, centrally managed endpoint protection, resilient and tested backups, structured patching and clear incident response and payment\u2011verification processes. These expectations align closely with UK government and NCSC guidance, as well as the kinds of controls highlighted in official US cybercrime and cyber insurance reports.<a><\/a><a><\/a><a><\/a><a><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. How do AI\u2011driven attacks and fraud affect cyber insurance premiums and cover?<\/strong><\/h3>\n\n\n\n<p>AI is making phishing and fraud more convincing, contributing to higher reported losses and a greater share of claims linked to business email compromise and other cyber\u2011enabled scams. Insurers put weaker\u2011control firms into higher\u2011priced buckets and tighten sub\u2011limits and deductibles for fraud and ransomware. If you can show that your controls actually work in practice, you usually avoid the worst of that.<a><\/a><a><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Can a cyber insurer refuse to pay if my IT setup is different from what I put on the proposal form?<\/strong><\/h3>\n\n\n\n<p>If there is a significant gap between what you declared and what was actually in place, insurers may delay, reduce or, in serious cases, decline a claim under misrepresentation or non\u2011disclosure clauses. Regulators\u2019 data shows that many incidents come down to missing or poorly implemented controls, so insurers have a strong incentive to examine whether your declarations match real\u2011world practice.<a><\/a><a><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. How often should my business review IT security controls in line with our cyber insurance policy?<\/strong><\/h3>\n\n\n\n<p>At a minimum, you should complete a structured review before each renewal, but many organisations now run quarterly reviews that link technical change to insurance expectations and regulator guidance. Using frameworks such as the NCSC small business guide and Cyber Essentials helps you base those reviews on recognised best practice rather than one\u2011off checklists.<a><\/a><a><\/a><\/p>\n\n\n\n<p><strong>5. How can a managed IT partner help me negotiate better cyber insurance terms in the UK and US?<\/strong><br><br>A managed IT partner can translate insurer questions into specific controls, provide clear evidence of MFA coverage, backups, patching and monitoring, and support rapid investigation when something goes wrong. This gives brokers and underwriters more confidence in your risk profile and helps secure more favourable pricing and fewer restrictive conditions.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Will your policy really pay out? If you had a serious ransomware or payment\u2011fraud incident tomorrow, how confident are you that your cyber insurance would pay out in full and on time? Many mid\u2011market businesses only discover the answer to this very basic question is \u201cno\u201d when their insurer digs up the proposal form and<\/p>\n","protected":false},"author":2,"featured_media":4706,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[520],"tags":[975,955,682],"class_list":["post-4704","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cyber-insurance","tag-cyber-insurance-costs","tag-cyber-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>When Cyber Insurance Keeps Moving the Goalposts: How Businesses Stay Insurable<\/title>\n<meta name=\"description\" content=\"Cyber insurance requirements rise every year. See how UK and US mid\u2011market firms can stay insurable with stronger IT and security controls.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cardonet.com\/news\/cyber-insurance-keeps-moving-the-goalposts-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When Cyber Insurance Keeps Moving the Goalposts: How Businesses Stay Insurable\" \/>\n<meta property=\"og:description\" content=\"Cyber insurance requirements rise every year. See how UK and US mid\u2011market firms can stay insurable with stronger IT and security controls.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cardonet.com\/news\/cyber-insurance-keeps-moving-the-goalposts-business\/\" \/>\n<meta property=\"og:site_name\" content=\"News\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-12T12:40:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-12T12:53:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/cyber-insurance-moving-goal-posts-cardonet.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"334\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sagi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sagi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"When Cyber Insurance Keeps Moving the Goalposts: How Businesses Stay Insurable","description":"Cyber insurance requirements rise every year. See how UK and US mid\u2011market firms can stay insurable with stronger IT and security controls.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cardonet.com\/news\/cyber-insurance-keeps-moving-the-goalposts-business\/","og_locale":"en_US","og_type":"article","og_title":"When Cyber Insurance Keeps Moving the Goalposts: How Businesses Stay Insurable","og_description":"Cyber insurance requirements rise every year. See how UK and US mid\u2011market firms can stay insurable with stronger IT and security controls.","og_url":"https:\/\/www.cardonet.com\/news\/cyber-insurance-keeps-moving-the-goalposts-business\/","og_site_name":"News","article_published_time":"2026-02-12T12:40:48+00:00","article_modified_time":"2026-02-12T12:53:38+00:00","og_image":[{"width":600,"height":334,"url":"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/cyber-insurance-moving-goal-posts-cardonet.png","type":"image\/png"}],"author":"Sagi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sagi","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cardonet.com\/news\/cyber-insurance-keeps-moving-the-goalposts-business\/#article","isPartOf":{"@id":"https:\/\/www.cardonet.com\/news\/cyber-insurance-keeps-moving-the-goalposts-business\/"},"author":{"name":"Sagi","@id":"https:\/\/www.cardonet.com\/news\/#\/schema\/person\/402defdb075c0a6c1317a1b8fdf85481"},"headline":"When Cyber Insurance Keeps Moving the Goalposts: Remain Insurable While Expectations Rise","datePublished":"2026-02-12T12:40:48+00:00","dateModified":"2026-02-12T12:53:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cardonet.com\/news\/cyber-insurance-keeps-moving-the-goalposts-business\/"},"wordCount":3185,"commentCount":0,"publisher":{"@id":"https:\/\/www.cardonet.com\/news\/#organization"},"image":{"@id":"https:\/\/www.cardonet.com\/news\/cyber-insurance-keeps-moving-the-goalposts-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/cyber-insurance-moving-goal-posts-cardonet.png","keywords":["Cyber Insurance","Cyber Insurance Costs","Cyber Security"],"articleSection":["Cyber Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cardonet.com\/news\/cyber-insurance-keeps-moving-the-goalposts-business\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cardonet.com\/news\/cyber-insurance-keeps-moving-the-goalposts-business\/","url":"https:\/\/www.cardonet.com\/news\/cyber-insurance-keeps-moving-the-goalposts-business\/","name":"When Cyber Insurance Keeps Moving the Goalposts: How Businesses Stay Insurable","isPartOf":{"@id":"https:\/\/www.cardonet.com\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cardonet.com\/news\/cyber-insurance-keeps-moving-the-goalposts-business\/#primaryimage"},"image":{"@id":"https:\/\/www.cardonet.com\/news\/cyber-insurance-keeps-moving-the-goalposts-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/cyber-insurance-moving-goal-posts-cardonet.png","datePublished":"2026-02-12T12:40:48+00:00","dateModified":"2026-02-12T12:53:38+00:00","description":"Cyber insurance requirements rise every year. See how UK and US mid\u2011market firms can stay insurable with stronger IT and security controls.","breadcrumb":{"@id":"https:\/\/www.cardonet.com\/news\/cyber-insurance-keeps-moving-the-goalposts-business\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cardonet.com\/news\/cyber-insurance-keeps-moving-the-goalposts-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cardonet.com\/news\/cyber-insurance-keeps-moving-the-goalposts-business\/#primaryimage","url":"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/cyber-insurance-moving-goal-posts-cardonet.png","contentUrl":"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2026\/02\/cyber-insurance-moving-goal-posts-cardonet.png","width":600,"height":334,"caption":"Moving Goal Posts for Cyber Security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cardonet.com\/news\/cyber-insurance-keeps-moving-the-goalposts-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"News Home","item":"https:\/\/www.cardonet.com\/news\/"},{"@type":"ListItem","position":2,"name":"When Cyber Insurance Keeps Moving the Goalposts: Remain Insurable While Expectations Rise"}]},{"@type":"WebSite","@id":"https:\/\/www.cardonet.com\/news\/#website","url":"https:\/\/www.cardonet.com\/news\/","name":"News","description":"IT Services from Cardonet","publisher":{"@id":"https:\/\/www.cardonet.com\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cardonet.com\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cardonet.com\/news\/#organization","name":"Cardonet","url":"https:\/\/www.cardonet.com\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cardonet.com\/news\/#\/schema\/logo\/image\/","url":"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2018\/06\/it-support-london-cardonet.png","contentUrl":"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2018\/06\/it-support-london-cardonet.png","width":1920,"height":1080,"caption":"Cardonet"},"image":{"@id":"https:\/\/www.cardonet.com\/news\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cardonet.com\/news\/#\/schema\/person\/402defdb075c0a6c1317a1b8fdf85481","name":"Sagi","sameAs":["http:\/\/www.cardonet.co.uk"]}]}},"_links":{"self":[{"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/posts\/4704","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/comments?post=4704"}],"version-history":[{"count":2,"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/posts\/4704\/revisions"}],"predecessor-version":[{"id":4712,"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/posts\/4704\/revisions\/4712"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/media\/4706"}],"wp:attachment":[{"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/media?parent=4704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/categories?post=4704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/tags?post=4704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}