A sky-high premium could not at all times mirror your organization’s safety posture
08 Aug 2025
•
,
3 min. learn

When a cyber threat insurance coverage quote lands in your desk and the premium is sky excessive, it’s pure to imagine that the insurer is judging your setting to be excessive threat. So, when the following quote lands and is extra acceptable, does it imply they seen your threat in another way?
In keeping with one of many many cyber insurance coverage displays at Black Hat USA 2025, the explanation is probably not so apparent: it could be that the insurer is limiting its threat publicity to a services or products you utilize, quite than discovering a threat inside your setting.
To be extra particular, an insurer could want to restrict its publicity to a sure vendor in your provide chain. For instance, think about they resolve that acceptable threat is for under 60% of their policyholders to make use of product X. If your small business have been to push them over this restrict, they might simply value themselves out of your small business with a excessive quote, quite than declining you.
The danger, subsequently, is just not together with your setting – it’s with the provider. Actually, there could not even be a particular threat with them. It might simply be {that a} threat restrict set by the insurer has been reached.
As shoppers, we will see this in observe. After I use a automobile insurance coverage comparability website, the premium quantities differ by as a lot as 200%. But my threat is identical to all insurers, and it’s seemingly that some insurers are capping their threat publicity to sure automobile producers by pricing themselves out of the market.
Because the cyber insurance coverage and cybersecurity industries change into additional entwined, the data-based insights from insurers’ claims can – and will – enhance cybersecurity posture for everybody concerned, not simply the insured. As a cybersecurity skilled, I assume that multi-factor-authentication is default ‘ON’ for any firm offering their staff distant entry by way of an SSL VPN.
My assumption, although, is way from right. A statistic shared throughout a presentation revealed that within the first six months of 2025, 45% of latest cyber claims have been a results of an SSL VPN missing MFA. That is stunning for 2 causes: firstly, why do insurers present insurance policies to corporations that haven’t any MFA given the chance of a declare, and secondly, why would any firm not safe their SSL VPN with MFA?
What claims information reveals
In keeping with information introduced by Coalition, 55% of all ransomware assaults are initiated by a fringe safety gadget. And in claims the place the strategy used is understood, there’s a clear winner: credential theft.
Whereas ransomware dominates the dialogue, there was excellent news introduced. Coalition’s efforts to claw again funds from fraudulent transfers do have some success. In 2024, they managed to recuperate $31 million, utilizing numerous strategies that embrace alerting authorities contacts, acquiring injunctions to freeze funds and interesting specialised disaster response specialists. This claw-back averages at $278,000 per occasion, with 24% of all occasions gaining some claw-back and 12% of occasions getting the entire quantity again.
The cyber insurance coverage business continues its efforts to cut back its publicity to claims, and the displays from numerous insurers exhibit that they’re going to new lengths to attain this. Relying on their coverage, the insured can now profit from numerous providers offered by the insurer, together with personalized cyber menace intelligence primarily based on the insured’s particular setting. That is complemented by monitoring and alerting their shoppers when a brand new vulnerability is posted to the CVE database; particularly, the insurer will alert the insured the place they know the software program or {hardware} is in use and supply steering on the anticipated patching timeline.
This proactive method to cut back threat even extends on to the darkish net, the place insurers could buy compromised credentials or, in some cases, purchase zero-day vulnerabilities to guard their insured shoppers and, much more importantly, cut back the insurer’s monetary threat.
Because the insurance coverage and cybersecurity industries proceed to overlap, the query for me is: simply how far will the overlap go?
