• Events & Webinars
  • Resources
    • Blog
    • Case Studies
    • News
    • Newsletter
    • Infographics
    • Papers
    • Posters
    • Video
  • Careers
    • Careers at HBS
    • Open Positions
    • Student Opportunities
  • About HBS
    • About Us
    • Leadership
    • Locations
    • Partners
    • Green Initiatives
  • Events & Webinars
  • Resources
    • Blog
    • Case Studies
    • News
    • Newsletter
    • Infographics
    • Papers
    • Posters
    • Video
  • Careers
    • Careers at HBS
    • Open Positions
    • Student Opportunities
  • About HBS
    • About Us
    • Leadership
    • Locations
    • Partners
    • Green Initiatives
HBS logo
HBS Logo
  • Infrastructure
    • CLOUD

      • Cloud Solutions
      • Public Cloud
      • Hybrid Cloud
      • Infrastructure as a Service
      • Cloud Security Solutions
      • Backup, Replication and Disaster Recovery
      • HBS Cloud Hosting Services

      DATA CENTER

      • Data Center Solutions
      • Traditional Data Center
      • Hyperconverged
      • Colocation
      • Directory Services
      • Cloud Email and Calendar Solutions

      NETWORK AND ACCESS

      • Network Infrastructure
      • Enterprise Mobility
      • Wireless Solutions
      • SD-WAN
      • Structured Cabling
      • Staff Augmentation
  • Managed Services
    • MANAGED ONE

      • Managed One Overview
      • Managed Backup and Disaster Recovery
      • Managed Firewall
      • Managed SaaS Security

       

      • Managed HaaS and SaaS
      • Managed IT Help Desk
      • Managed Network and Server Monitoring
      • Managed Email and Collaboration Security

      HBS + PARTNER SOLUTIONS

      • HBS Secure with Verkada
      • HBS Collaborate with Webex
      • Managed XDR
      HBS Managed One Megamenu Graphic
  • Modern Workplace
    • MICROSOFT

      • Microsoft Licensing Management
      • Microsoft Modern Workplace
      • Microsoft Fabric

       

      • Dynamics 365 Business Central
      • Dynamics 365
      • Dynamics GP

      COLLABORATION

      • Audio Visual
      • Unified Communication Solutions
      • HBS Collaborate with Webex
  • Professional Services
    • ADVISORY

      • Virtual CISO
      • Virtual CIO
      • Project Management
      • IT Business Consulting

      ENGINEERING SERVICES

      • Staff Augmentation

      AI & ANALYTICS

      • Artificial Intelligence
      • AI Advance
      • AI Predict
      • AI Assist
      • Data Management and Analytics
      • Microsoft Fabric

      APPLICATION INNOVATION

      • Website Development
      • Application Development

      DOCUMENT MANAGEMENT

      • Document Management Services
      • Document and Check Scanners
  • Security
    • CYBERSECURITY

      • Managed XDR
      • Penetration Testing
      • Vulnerability Scanning
      • Email Security Services
      • Digital Forensics and Incident Response
      • Backup, Replication and Disaster Recovery
      • Firewalls
      • Cloud Security Solutions

       

      • Virtual CISO
      • Virtual Security Team
      • Virtual Security Engineer
      • Cybersecurity Risk Assessment
      • Governance and Compliance
      • SOC 2
      • CMMC
      • Managed Security Awareness Training

      PHYSICAL SECURITY

      • Security Solutions
      • HBS Secure with Verkada
      Cybersecurity Risk Assessment Megamenu Graphic
  • Search
Contact Us
Blog

How to Get Lower Cyber Insurance Premiums

  • Written by: Trevor Meers
  • Updated: August 8, 2024
The text "Cyber Insurance Steps to Lower Premiums" on a white and grey textured background.

When this article was originally written in 2022, the cyber insurance industry was experiencing a massive premium hike. The good news is that cyber insurance premiums have dropped—by an average of 16%—since the industry peak during the summer of that year.

However, cyberattacks are on the rise. Ransomware attacks alone increased 85% in FY2023, and with the ubiquity of artificial intelligence, the threat landscape has continued to grow.

So, why have premiums decreased and leveled off?

Despite the surge in ransomware and AI-led attacks, new SEC disclosure rules, a much more competitive insurance market—thanks to fresh capital—and improved business cybersecurity measures have made insurance costs more sustainable.

Making your business more attractive to an increasingly competitive insurance market can secure better coverage and provide you with the best insurance premiums.

In this blog, we’ll outline key strategies to do just that—and with the added benefit of making your organization more secure along the way.

How to Reduce Your Cyber Insurance Premiums in 2024

The following policies and tools will not only enhance your security but also demonstrate to underwriters that you’re a lower risk.

Implement a Cybersecurity Framework

Adopting a cybersecurity framework shows insurers your commitment to security. The NIST Cybersecurity Framework is the most widely recognized for reducing cyber risks and is a great place to start.

Underwriters love to see steps taken to implement and improve cybersecurity protections, and that’s exactly what a framework is—a set of structured guidelines, best practices, and standards designed to help you manage and improve your cybersecurity efforts.

CyberInsurance

Engage External Expertise

Cybersecurity is a specialized task requiring advanced knowledge and skills, often beyond the resources of most organizations. Partnering with external experts like HBS bridges this gap. At HBS, we offer tailored cybersecurity solutions that enhance your security posture, making your organization more appealing to insurers.

A team of skilled professionals provides guidance and expertise to bolster your cyber defense strategy. By leveraging this specialized knowledge, you can meet and exceed insurers' requirements, improving your overall security and positioning your organization for better insurance coverage and more favorable premiums.

24x7x365 Monitoring

Ransomware struggles to get past these systems that can catch threats early and shut them down. An IBM study found that organizations using security AI and automation spend 80% less handling a breach. A solution like Managed XDR from HBS can detect anomalous activity, correlate actions into a threat picture and proactively shut down attacks. And that often happens in moments. 

Multifactor Authentication

MFA is typically the leading indicator to prevent ransomware losses, and it’s one of the top things carriers are looking for.  Without a sound MFA policy, you may be denied coverage.

And a general answer of “yes, we have MFA” won’t satisfy most carriers. They want details on how your MFA policy protects admin-level users, secures all remote access, and secures corporate email on non-corporate devices and web apps. 

Female at a white board breaking down cybersecurity framework, highlighting NIST 800-53.

Effective and Documented Incident Response Plan

Develop and maintain an effective incident response plan. Documented procedures for responding to security incidents can significantly reduce the impact of a breach and show insurers that you are prepared.

While not a cyberattack, the recent CrowdStrike incident highlighted the difference between companies that had good incident response plans, and those that clearly did not.

Security Awareness Training Program

Implement regular security awareness training for employees. Educating your team about potential threats and safe practices is crucial for minimizing human error, a common cause of breaches.

Solid Backup Procedures

Having solid backup and recovery procedures is essential for minimizing the impact of cyberattacks and ensuring business continuity. Insurers look favorably on organizations with robust data protection strategies because they demonstrate preparedness and resilience.

  • Offline and Segregated Backups: Ensure your backups are stored offline or in a segregated environment to protect them from being compromised during an attack. This means even if your primary systems are breached, your backup data remains safe.
  • Frequent Testing: Regularly test your backup and recovery procedures to ensure they function correctly. Monthly or quarterly tests can help identify and address any issues before they become critical during an actual incident.
  • Access Control: Restrict access to your backups using multifactor authentication to prevent unauthorized access. This adds an additional layer of security to your critical data.

Preparing for Underwriting

To prepare for underwriting, we suggest starting early and seeking help from third-party experts and an experienced insurance broker. Expect a long list of detailed questions probing into your information security policies and tools.

Questions to anticipate include:

  • What percentage of your IT budget is allocated to information security?
  • Do you have a Chief Information Security Officer or equivalent?
  • Which cybersecurity frameworks do you follow?
  • Do you engage a third party to assess your cybersecurity program and controls?
  • How do you track your software inventory by operating system and application version?
  • Do you implement standard audit logging policies for hardware devices and software?
  • What are your password policies?
  • How do you encrypt data?

HBS consultants help organizations create customized security plans that not only help with cyber insurance costs but also secure the organization’s future.

For more insights and tailored cybersecurity solutions, contact us. We’re here to help you navigate cyber insurance and protect your organization against evolving threats.

Related Content

Cyber Insurance is Evolving – Are you Ready?

Learn how cyber insurance functions, what good coverage looks like, and how it’s related to your cybersecurity investment.

Learn More »
Blue textured background with the text "Managed IT Services Your Definitive Guide."

Your Definitive Guide to Managed IT Services

Learn what Managed IT Services are and how they can help you save time and resources while improving your team’s productivity, efficiency, and security.

Explore More »
Risk Matrix Likelihood Impact

Risk Assessment: Likelihood and Impact

Assess risk effectively with the risk assessment likelihood and impact matrix. This decision-making matrix assesses risk based on the likelihood and impact of threats in your organization.

Read More »
  • Cybersecurity, Insurance
Blog

Connect:

[email protected]  |  800.236.7914

HBS logo

HQ | 1700 Stephen Street
Little Chute, WI 54140
Locations

HBS Remote Support | Service & Technical Support | E-Bill Portal
Terms & Conditions | Cookie Policy | Privacy Policy | Onboarding Form | End User Agreements | E-Bill FAQ | Site Map
©2026 Heartland Business Systems. All rights reserved.

Halo from HBS
This chat may be recorded as described in our Privacy Policy.