April 30, 2026

Your business runs on data. Customer records, payment information, employee files, contracts, communications, and all of it lives somewhere digital.

While most business owners wouldn't think twice about carrying property insurance to protect a physical office, a growing number are still operating without meaningful protection against the cyber threats that are far more likely to disrupt their business today.

That's where cyber liability insurance comes in. But here's something that might surprise you: getting covered isn't just a matter of filling out an application and paying a premium.

Insurers are paying close attention to how your business actually manages cybersecurity. And if the right controls aren't in place, you may not qualify, or worse, a claim could be denied when you need it most.

At One Step Secure IT, we work closely with businesses across Arizona to help them strengthen their cybersecurity posture and navigate cyber liability insurance with confidence.

We've gathered input from two industry professionals: Joseph Cook, Cyber Liability Group Practice Leader at The Arizona Group, and Joshua Kreisberg, IT Sales Manager at One Step Secure IT. They provided insights to walk you through what every business leader needs to understand about cyber liability insurance today.

 

What Is Cyber Liability Insurance and Why Does Your Business Need It?

Cyber liability insurance is a type of business insurance policy designed to help cover financial losses resulting from a cyber attack, data breach, or other digital incident. Depending on the policy, it may help pay for items such as defense costs, business interruption, brand/reputation management, and more.

Depending on the policy, coverage may include costs related to:

  • Data breach response: notifying affected customers and providing credit monitoring services

  • Legal fees and regulatory fines: especially relevant for businesses in industries like healthcare (HIPAA) or payments (PCI DSS)

  • Business interruption: lost income while your systems are down

  • Ransomware payments and recovery: costs to restore encrypted systems and data

  • Cyber crime: losses from fraudulent wire transfers, social engineering scams, and vendor fraud

Cyber attacks don't only target large enterprises. In fact, small and mid-sized businesses are frequently targeted precisely because they tend to have fewer defenses in place.

 

Who Needs Cyber Liability Insurance?

The short answer: any business that stores, transmits, or processes digital data. That includes nearly every business operating today.

Some industries carry a higher inherent risk. Healthcare organizations handling patient records, financial services firms managing sensitive transactions, and professional services companies holding confidential client information are all prime targets. But retailers, nonprofits, manufacturers, real estate companies, and law firms are all vulnerable.

If your business uses email, accepts credit cards, stores customer data, relies on a vendor's software platform, or has employees who work remotely, you have cyber exposure. Cyber liability insurance exists to protect you when preventive measures aren't enough.

 

What Do Insurers Actually Require?

This is where many businesses get caught off guard. Over the last several years, cyber insurers have significantly raised their expectations for applicants.

It's no longer enough to say you "have antivirus software." Insurers want to see documented, functioning security controls, and they're asking increasingly specific questions on applications to find out.

We asked Joseph Cook of The Arizona Group to walk us through what insurers are focused on and how coverage decisions are actually made.

What top cybersecurity controls are insurers now strictly enforcing, and what happens when those controls are missing?

The controls that tend to receive the most scrutiny on applications today include:

Multi-Factor Authentication (MFA): requiring a second form of identity verification beyond a password, particularly for email, remote access, and administrative accounts.

Backup frequency, viability, and immutability: not just whether backups exist, but how often they run, whether they actually work when tested, and whether they're protected from being deleted or encrypted by an attacker.

Dual verification for financial transactions: a secondary approval process for wire transfers or vendor payment changes, specifically to combat business email compromise.

Privileged user controls: limiting who has administrative access to systems and monitoring those accounts closely.

Data encryption: protecting sensitive data both when it's stored and when it's transmitted.

Email security: filtering, anti-phishing tools, and employee awareness training.

Regulatory compliance: meeting the specific requirements of applicable frameworks like HIPAA or PCI DSS.

It's worth understanding, though, that the connection between missing controls and denied claims isn't always straightforward.

 

"How this ties to denial of claims is not as linear or consistent as one might believe. The warranting and necessity of these items vary by client size and industry type, along with how the proprietary Representation/Warranty language of the policy may apply to the given claim scenario. At the risk of being reductive, our experience tells us that knowing, willful, and material misrepresentations are those that most often find coverage lacking, and this is supported by legal precedent."

—Joseph Cook, Cyber Liability Group Practice Leader, The Arizona Group

 

The greatest risk to your coverage isn't simply a gap in your security. It's stating that a control is in place when it isn't. Accuracy and honesty on your application matter enormously.

 

What Documentation Can a Managed Service Provider (MSP) Help You Produce?

One of the most practical ways an MSP supports businesses through the insurance process is by helping them demonstrate their security posture in a way that's meaningful to underwriters, without burying them in technical reports.

 

"MSPs help by implementing controls such as multi-factor authentication (MFA), endpoint detection and response (EDR), backups, email security, and others, and keeping them operational and consistently secure over time. MSPs also help businesses with documentation and evidence. Whether a client is signing up for cyber liability insurance for the first time or renewing, there is an application with requirements, and we help bridge that gap between the insurer and the business."

—Joshua Kreisberg, IT Sales Manager, One Step Secure IT

 

In practice, that means an MSP can provide:

  • Evidence that MFA is enabled and enforced across key systems

  • Backup logs showing frequency, test results, and off-site or immutable storage configurations

  • Endpoint protection reports demonstrating active monitoring and patching

  • Documentation of security policies and employee training programs

  • Compliance documentation relevant to your industry

This kind of organized, accessible evidence gives underwriters confidence that your business isn't just checking boxes. It's actively managing risk.

 

The Cybersecurity Foundations That Make Coverage Possible

Before any documentation can be produced, the controls themselves have to be implemented and work properly. We asked Joshua Kreisberg what he considers the non-negotiables when preparing a client for a cyber insurance application.

 

"MFA wherever it's available and backups. Endpoint and email security like EDR/AV, patching systems, email filtering, and phishing training. These are the foundations."

—Joshua Kreisberg

Here's what each of these looks like in a business context:

Multi-Factor Authentication (MFA)
This is the most commonly required control on cyber insurance applications today. If your employees log in to email, remote systems, or business applications using only a username and password, your risk exposure and your insurability both suffer. MFA adds a second step, typically a push notification or code, that dramatically reduces the likelihood of an account being compromised even if a password is stolen.

Backups
Not just any backups, good backups. That means they run frequently (ideally daily or more), they're tested regularly to confirm the data can actually be recovered, and they're stored in a way that an attacker can't simply delete or encrypt them alongside your live systems. Immutable backups, which cannot be altered or deleted for a specified period, are becoming an increasingly standard requirement.

Endpoint and Email Security
EDR (Endpoint Detection and Response) tools do more than traditional antivirus. They monitor behavior on devices and can detect threats that signature-based tools would miss. Combined with email filtering, anti-phishing tools, and regular phishing simulation training for employees, these form a strong defensive perimeter around your most common attack surfaces.

 

Why Ongoing Maintenance Is Just as Important as the Initial Setup

Here's a point that doesn't get enough attention: setting up cybersecurity tools is only the beginning. The consistency and ongoing maintenance of those controls is what actually keeps your business protected and insurable.

 

"It's important to not treat this as a one-time setup. Environments are ever-changing, and consistency matters because most incidents happen when a control that was in place is no longer up-to-date or functioning.

—Joshua Kreisberg

 

An MSP's ongoing role involves continuous monitoring of your environment, triaging alerts, managing software patches, and tracking vulnerabilities before attackers can exploit them.

When your cyber insurance renews each year, your insurer will ask whether your security posture has changed. A well-maintained environment with documented history will provide a much stronger answer than scrambling to remember what's been done since the last renewal.

 

Supply Chain Risk: A Growing Coverage Challenge

One area of cyber liability that business owners often overlook is supply chain risk, which is the exposure that comes not from a direct attack on your business. Supply chain risk occurs when there is an attack on a vendor, software provider, or partner that your business depends on.

When a third-party supplier is hit by a ransomware attack, and your operations are disrupted as a result, that's a coverage challenge that falls under what insurers call Contingent Business Income.

Joseph Cook explained how this typically plays out:

"From a coverage perspective, supply chain attacks most often present as a Contingent Business Income challenge, both in terms and limit."

This is an area where policy language varies significantly between insurers, and where working with a knowledgeable insurance partner, not just any broker, is critical to understanding what you're actually covered for.

It's also worth noting that this challenge has drawn attention beyond the insurance industry.

Secure AZ, a relatively new Arizona-based nonprofit, was founded in part to address supply chain cybersecurity risk at a broader community level. Its philosophy is that strengthening the entire business ecosystem, not just individual companies, is the most effective long-term approach.

 

What Happens After a Breach: Mistakes That Can Reduce or Void Coverage

Even businesses with solid security and legitimate coverage can run into problems after an incident, often because of what happens in the hours and days immediately following a breach.

 

"At the client level, lack of timely reporting tends to cause the most issues in remediation and coverage. Outside of the client level, we have observed many claims instances where the lack of timeliness or thoroughness by their financial institution (if cyber crime is involved) can cause issues with coverage."

—Joseph Cook

A few common post-breach mistakes to be aware of:

Waiting too long to report the incident to your insurer: most policies have specific reporting windows, and missing them can jeopardize your claim.

Engaging external vendors or remediation firms before notifying your insurer: many policies require insurer-approved vendors be used.

Failing to preserve forensic evidence:  attempting to clean up systems before the scope of the breach is documented can make claims harder to support.

Not involving legal counsel early: privilege protections can matter in the event of regulatory scrutiny or litigation following a breach.

Having a documented incident response plan and knowing who to call and in what order is a critical piece of your overall cyber risk management strategy.

 

How One Step Secure IT Bridges the Gap

Navigating cybersecurity and cyber insurance doesn't have to feel overwhelming. At One Step Secure IT, we work with businesses of all sizes across the U.S. to implement and maintain the controls that insurers expect, document your security posture accurately, and help you walk into an insurance application or renewal with confidence.

We're not your insurance broker. But we are the team that makes sure the technical side of the equation is solid, documented, and defensible. And when your broker or underwriter asks questions about your environment, we help you answer them accurately.

Whether you're applying for cyber liability insurance for the first time, renewing an existing policy, or simply trying to understand where your current security posture stands, we're here to help.


Ready to take the next step?

Schedule a conversation with our team or give Joshua a call at 623-226-8828. Find out how your business’s cybersecurity stacks up against industry standards and how we can help you stay protected and insurable.

For more information about Cyber Liability Insurance for your business, reach out to Joseph Cook at The Arizona Group at 480-633-6672.