Cyber Insurance Renewal: The Six Questions Carriers Now Demand a Yes On
What every commercial cyber insurance application asks in 2026, why the bar keeps rising, and what to fix before your next renewal letter shows up.
What every commercial cyber insurance application asks in 2026, why the bar keeps rising, and what to fix before your next renewal letter shows up.
Cyber insurance applications are not the same form they were three years ago. The 2024-2026 carrier questionnaires read more like a security audit than an insurance application — and answering wrong gets you a non-renewal letter instead of a higher premium.
If your renewal is coming up in the next six months, here are the six checkbox questions that have hardened across every major carrier. They map almost one-to-one with the controls we deploy on Titanium and Carbon plans, which is not a coincidence.
The question reads roughly: “Is multi-factor authentication enforced on (a) all administrator accounts, (b) all remote access (VPN, RDP, cloud admin consoles), and (c) all webmail?”
The expected answer is yes to all three. SMS-based MFA is being rejected by some carriers in favor of authenticator apps or hardware tokens — read the fine print on yours.
The fix: enforce MFA at the identity provider level (Microsoft 365 Conditional Access, Google Workspace 2SV enforcement, or your tenant’s equivalent). Single users do not opt in or out.
“Do you deploy EDR on all servers, workstations, and laptops?”
Antivirus is no longer the answer. Carriers have caught up to the fact that signature-based AV misses behavioral attacks, which are most attacks. EDR plus a managed response capability (MDR) is the new floor.
The fix: roll out a real EDR product across every endpoint — including the partner laptops nobody admits exist.
“Are backups stored offline, air-gapped, or in immutable storage?”
The reason: ransomware in the modern playbook hunts for backup repositories first. If your backup lives on the same network with the same domain credentials, it gets encrypted alongside production.
The fix: object storage with object lock, or a backup vendor that supports immutable retention out of the box. Tested restores at least quarterly.
“Do you filter email at the gateway and run security awareness training at least annually?”
Phishing remains the dominant initial-access vector. Carriers want evidence that you reduce both the attack surface and the human factor.
The fix: a real email security gateway (or the EOP/Defender tier you’re paying for in M365 actually configured), plus quarterly phishing simulations, plus training that gets recorded.
“What is your patching cadence for critical operating system and third-party application vulnerabilities?”
The expected answer is something like “critical patches deployed within 7-14 days, evidence available.” If you cannot say that with a straight face, your unattended Windows update settings will not save you.
The fix: a real patch management tool with reporting. Critical patches in two weeks, others monthly. Documented exceptions for the systems that genuinely cannot be patched on schedule (with compensating controls).
“Do you have a written incident response plan that has been tested in the past 12 months?”
This used to be a softball. It is no longer. Tabletop exercises with documented results have become a standard ask, especially on policies above $1M.
The fix: an IR plan in writing. A tabletop exercise every six months walking through one scenario (ransomware, business email compromise, lost laptop). Notes from the exercise on file.
In the 2026 market, the cost ladder for the wrong answers looks like:
That last one is the most expensive scenario nobody plans for. Misrepresenting controls on a renewal application is fraud, and carriers have lawyers who specialize in finding it after a breach.
If your renewal is more than 90 days out, you have time to actually fix things. The order of operations we use:
If your renewal is closer than 90 days out, the fix is the same — you just have less room to improve before the carrier sees the answers.
Titanium clients get items 1-5 of this list as part of the plan. Carbon clients get all six plus the documented IR plan and the tabletop facilitation. Steel clients can add the security stack as an upgrade for the months leading up to a renewal.
If you want a real read on where you stand against your next renewal application, the free Cyber Score takes two minutes and emails you a written report. No follow-up calls unless you ask.
Free IT Blueprint Assessment. We walk your office, look at every system, and leave you with a written punch list.
Book Walkthrough