Cyber insurance for small business is no longer a niche product. It sits on the renewal checklist next to workers' comp and the BOP, and for most SMBs it is now a contractual requirement somewhere — a bank line of credit, an enterprise customer's vendor onboarding form, or a state regulator's safeguards rule.
The market a first-time buyer is walking into is not the market that existed five years ago. Premiums are up roughly 30 to 40 percent over the last three years across most SMB segments. Carrier scrutiny on controls is at an all-time high. The questionnaire is a controls audit dressed up as paperwork. The marketing brochure rarely matches the policy form.
This article covers what a cyber policy actually covers, what the 2026 questionnaire asks, the four controls that move the premium the most, what the policy will not pay, and the operational sequence to pass underwriting without overspending on tools that do not change a single answer. Obsidian Ridge does not sell insurance. We help SMBs pass the questionnaire honestly and operate the controls behind the answers.
What cyber insurance actually covers
A standalone cyber liability policy is two contracts stitched together. First-party coverage pays your losses. Third-party coverage pays losses your customers suffer because of you.
First-party coverage — your losses
Where most SMBs cash claims. Typical covered costs:
- forensic investigation to determine scope, root cause, and notification obligations
- legal counsel, including a breach coach who manages the incident from the legal side
- breach notification costs, usually billed per record affected
- credit monitoring and identity theft services for affected individuals
- business interruption and lost income from a covered cyber event
- cyber extortion and ransom payment, where legal under OFAC sanctions rules
- data restoration and system rebuild costs
Third-party coverage — losses you cause others
The third-party section is where the lawsuits and the regulators show up. Typical covered costs:
- regulatory defense and fines, including HHS Office for Civil Rights, FTC, and state attorneys general
- PCI compliance penalties and forensic assessments from the card brands
- lawsuits from customers, clients, or business partners whose data was exposed
- network security liability claims — where your compromised systems caused harm to a third party
Both sections together are the base policy. Almost every meaningful loss type beyond ransomware sits in a rider.
The common add-on riders
Base cyber policies sit underneath a stack of endorsements. The riders that matter most for a first-time SMB buyer:
- Social engineering and wire fraud (crime rider). Covers the BEC pattern where staff are tricked into wiring money to an attacker. Almost always needed.
- Reputation harm. Pays for crisis communications and PR after a publicly disclosed event.
- Bricking. Covers hardware physically destroyed by malware — rare, but real for OT-adjacent SMBs.
- Funds-transfer fraud. Covers direct computer-funds-transfer fraud where the attacker moves money without the insured's authorization. Distinct from social engineering.
- Computer fraud. Covers theft of money or securities via direct computer manipulation.
- System failure. Covers business interruption from an outage that is not the result of an attack — cloud provider failure, hardware failure, accidental admin action.
The two non-negotiables for most SMBs are the crime rider with explicit social-engineering language and a system-failure endorsement if business interruption coverage matters. The base policy without the crime rider will not respond to a vendor-impersonation BEC, which is the single most common SMB cyber loss in the FBI IC3 2024 Annual Report.
What cyber insurance typically does not cover
Knowing the exclusions is more important than knowing the coverages, because exclusions decide what you do not collect when something goes wrong.
- Pre-existing breaches you did not disclose at binding. Material misrepresentation voids the policy. Anything you knew or should have known before binding must be disclosed.
- Acts of war and nation-state attacks. After the 2023 Lloyd's of London war exclusion guidance, most policies now exclude nation-state cyber operations. The wording varies by carrier.
- Property damage from cyber-physical incident. A fire caused by malware affecting an HVAC system is property, not cyber. That sits on the property policy.
- Improper data collection. GDPR-style fines for unlawful processing — separate from a breach — are often excluded.
- Patent or IP theft losses. Trade secret theft and intellectual property losses generally fall outside cyber.
- Failure to maintain stated controls. If you told the underwriter MFA was on every account and it was not, the carrier can deny the claim that surfaced the gap.
Read the exclusion section before you read the coverage section. The shape of the exclusions tells you what the policy is actually for.
Typical coverage limits for SMB in 2026
Limits have stabilized after the hard market of 2022 and 2023. Current ranges by headcount, for businesses with decent controls in place:
- 1 to 10 employees: $250,000 to $1 million aggregate
- 11 to 50 employees: $1 million to $3 million aggregate
- 51 to 250 employees: $3 million to $10 million aggregate
Most carriers will price a $1 million policy in the $1,500 to $3,500 per year range if the named controls are operational and the prior 24 months are clean.
The aggregate limit is half the conversation. Sublimits are the other half. The ransomware sublimit is often 50 percent of the aggregate, the regulatory defense sublimit may be lower than the headline number, and the crime rider sublimit is usually $25,000 to $100,000 — orders of magnitude below the aggregate. A $1 million policy with a $500,000 ransomware sublimit and a $25,000 crime sublimit is a different product than the same policy at full limits.
The 12-question questionnaire every 2026 carrier asks
If you have never filled out a cyber application, the structure is the same across nearly every carrier. The order varies. The questions do not. These twelve drive the offer:
- Total revenue, employee count, and sensitive-data record count. Drives the base premium. Be honest about the record count — undercounting is the most common reason a claim ends up underinsured.
- Industry classification. Healthcare, financial services, legal, and government contractors are regulated verticals with a higher base loading.
- Prior cyber incidents in the last 24 to 36 months. Includes events you handled without a claim. Disclose everything.
- MFA on email — Microsoft 365, Google Workspace, or equivalent. Required for every user, including service accounts and shared mailboxes.
- MFA on remote access. Every VPN, every RDP path, every RMM tool used by your IT vendor, every jump host.
- MFA on privileged and admin accounts. Domain admin, M365 global admin, line-of-business system admins.
- EDR or MDR on all endpoints. Workstations, servers, including domain controllers and hypervisors. 24/7 SOC monitoring strongly preferred.
- Identity threat detection on cloud productivity. Token theft, malicious inbox rules, rogue OAuth grants on M365 or Workspace.
- Immutable offsite backup with tested restore in the last 90 days. Backups that exist on paper but were never restored fail this control in practice.
- Written information security plan. Reviewed within the last 12 months, with a named owner.
- Documented incident response plan with annual tabletop. Carrier hotline named, roles defined, exercise log retained.
- Security awareness training with phishing simulations. Recurring cadence, tracked completion rate, click rate trended.
A few carriers ask additional questions on DMARC, conditional access, patching cadence, and vendor management. Those move the premium at the margins. The twelve above decide whether you get an offer at all.
The four controls that move the premium the most
If you read nothing else in this article, read this section. Underwriters score everything, but four controls do most of the work on price.
- MFA everywhere it matters. Email, remote access, privileged accounts. Missing this moves the premium 20 to 30 percent, and at most carriers it is grounds for non-quote rather than a surcharge.
- 24/7 EDR or MDR. Real human SOC, documented escalation, named on-call responder. Missing this moves the premium 15 to 25 percent.
- Immutable backups with a tested restore log. Cloud object lock or air-gap, restore log within 90 days. Missing this moves the premium 10 to 20 percent.
- Identity threat detection on the cloud productivity tenant. Token theft, mailbox rules, OAuth grants. Rising fast on 2026 questionnaires. Missing this moves the premium 10 to 15 percent.
If you have all four, you are in the standard rating bucket and the application becomes a paperwork exercise. If you have none, you are either declined outright or quoted with a 50 to 100 percent surcharge over standard and a ransomware co-insurance condition that effectively halves the payout when you need it.
The co-insurance trap
The most expensive surprise in 2026 SMB policies is not the premium — it is the ransomware co-insurance clause. Many carriers now apply 50 percent co-insurance to a ransomware loss if the insured cannot demonstrate, at the time of loss, that the named controls were operating. Named controls are usually MFA on all surfaces, EDR or MDR with monitoring, immutable tested backups, and a written IR plan.
A $500,000 ransomware loss on a $1 million policy with 50 percent co-insurance pays $250,000. The other $250,000 is the insured's problem. If the carrier also finds material misrepresentation on the application, the entire claim can be denied.
The clause lives in the ransomware endorsement, not the declarations page. Read it before binding. Map each named control to evidence you can produce on the day of loss — restore logs, EDR console exports, conditional access policy exports — not the day of the application.
Exclusions worth knowing in plain language
Beyond the standard exclusion list, a handful matter most for first-time SMB buyers:
- War and cyber-war. The Lloyd's exclusion is now standard. Some carriers still pay if attribution is unclear; others have moved to harder language.
- Supply-chain compromise of vendors. Coverage varies. A breach that traveled through your IT provider, RMM tool, or payroll vendor may or may not be covered depending on the systemic-event wording. Ask the broker in plain language.
- Failure to maintain stated controls. If you said MFA was enabled tenant-wide and a forensic investigation shows it was not, the carrier has a defense. This is why honest answers matter more than favorable ones.
- Pre-existing or undisclosed events. Lying on the application voids the policy. Every cyber claim eventually invites the carrier to read the application again.
The "don't lie" rule
Material misrepresentation on the questionnaire is grounds for the carrier to rescind the policy after a loss. The rescission is retroactive — premiums are returned and claims are denied.
If MFA is on most accounts but not on the CEO's mailbox because it broke her travel routine, the honest answer is "MFA is required on all email accounts except one executive exception." That answer raises the premium. It does not void the policy. The other answer — "yes" — saves the premium and loses the claim when the executive mailbox is the one that gets popped.
Honest answers, even when they raise the premium, are the only viable strategy. The premium delta from an honest "no" is almost always smaller than the deductible on the denied claim.
What does not move the premium
First-time buyers commonly spend in the wrong places. The following sound like security but do not change a single answer on a 2026 questionnaire:
- a more expensive next-generation firewall, by itself
- two or three antivirus brands stacked on the same endpoint
- "we have a great IT guy"
- a 2019 written information security plan nobody has read since
- a compliance certification with no operational controls behind it
- a generic "we passed an audit" letter without evidence
Carriers score operating controls and evidence. Not invoices, not certificates, not vendor logos.
The operational sequence to pass underwriting
If you are reading this with a renewal application open, or a first-application quote request from your broker, work in this order. Each step unlocks the next.
Step 1 — MFA on every surface (1 to 2 weeks)
Enable MFA on Microsoft 365 or Google Workspace tenant-wide via Conditional Access or context-aware access. Add MFA on every remote-access path the IT vendor uses — VPN, RDP, RMM, jump hosts. Add MFA on every privileged account, including break-glass accounts with a documented checkout procedure. This is the cheapest move and it materially lowers premium.
Step 2 — Deploy 24/7 EDR or MDR (1 to 2 weeks)
A managed detection and response service with a real 24/7 SOC checks the EDR box, the 24/7 monitoring box, and the documented escalation box at the same time. Adding identity threat detection on top covers the cloud productivity controls underwriters are starting to score separately. See Managed Detection and Response and Managed ITDR.
Step 3 — Immutable backup with monthly restore test
Pick a backup product that supports immutability natively — cloud object lock or air-gap. Schedule a monthly restore of a representative dataset. Keep the log. Carriers ask for the log at claim time. A backup that exists on paper but was never restored fails this control.
Step 4 — Write a WISP and a one-page IR plan
A 12-page written information security plan covering administrative, technical, and physical safeguards, with a named owner and a 12-month review date. A one-page incident response plan that names who calls the carrier hotline, who declares an incident, who talks to staff, and who decides about closing operations. Keep both short enough that someone will actually read them during a crisis.
Step 5 — Launch SAT with phishing simulations
A managed security awareness training program with quarterly phishing simulations and tracked completion rates. Carriers want completion data and click rates — not a training video shelved in a learning management system nobody opens. See Managed Security Awareness Training.
Five operational moves, six to ten weeks of execution time, and roughly 80 percent of the premium-moving controls on a 2026 questionnaire are now answered yes — with evidence.
The first-time buyer process
The mechanics of buying a cyber policy for the first time:
- Find a broker who specializes in cyber. This is not your general business insurance broker. Cyber underwriting is its own discipline, and a generalist broker will hand you the first carrier's form and a quote that does not reflect your controls. Ask the broker how many cyber policies they placed last year and which carrier panel they work with.
- Complete the questionnaire honestly. Where a control is partially in place, say so. Where you do not know, find out before answering rather than guessing.
- Get three quotes. The spread between carriers on the same risk is often 30 to 50 percent on premium and meaningfully different on sublimits. One quote is not enough information.
- Read the policy and every rider before signing. Focus on co-insurance, sublimits, the war exclusion, the supply-chain wording, and the carrier's definition of "incident." The marketing summary is not the policy.
- Bind with a clear understanding of who you call when something happens. The carrier's incident response hotline goes in your IR plan, on a laminated card in the office, and into the phones of everyone who could declare an incident. Late notification is one of the most common reasons coverage is denied on otherwise-covered events.
Pricing signals — what is "fair" in 2026
Rough current pricing for businesses with the four named controls operational and a clean 24-month history:
- 1 to 10 employees, $1 million coverage: $1,200 to $2,500 per year
- 11 to 50 employees, $1 million coverage: $2,500 to $5,500 per year
- 51 to 250 employees, $3 million coverage: $5,500 to $15,000 per year
- Regulated verticals — healthcare, financial services, legal: add 30 to 100 percent
A quote outside these ranges is a signal to ask why. Outliers below the range usually have low sublimits, high deductibles, or a co-insurance condition buried in the ransomware endorsement. Outliers above usually reflect missing controls or undisclosed prior incidents driving up the base.
Renewal reality
Most SMBs see premium creep at renewal even when nothing changes. The way to flatten the curve is to demonstrate control improvements year over year — added ITDR, completed tabletop, tightened conditional access, raised SAT completion rate. The way to drop the premium is to switch carriers every two to three years. Get fresh quotes from two or three markets, present the current control evidence, and let competition do the work.
Carriers also share loss intelligence. A claim paid in a prior policy period invites a specific question at the next renewal: what changed since the incident? Answers like "we are more careful now" do not pass. Answers like "we moved to a 24/7 MDR provider in March, added MFA on the line-of-business admin accounts in April, and completed a tabletop in May" do.
The other 2026 reality: non-renewal is more common than it used to be when controls have slipped or after a claim. The firm has 30 to 60 days to find replacement coverage, and the next application asks about the prior non-renewal. The fix is operational, not paperwork.
Where Obsidian Ridge fits
We are not an insurance broker. We do not sell policies. We help SMBs operate the controls underwriters score, produce the evidence package the application asks for, and pass renewal without overspending on tools that do not move a single answer.
Our Foundation tier ($15/agent/month) plus Protected tier ($32/user/month) covers MFA enforcement, 24/7 MDR, ITDR on the productivity tenant, and the managed SAT program — the four heaviest premium-moving controls in 2026, operated and monitored, with the evidence package as a byproduct. See pricing.
For first-time buyers or renewing buyers staring at a questionnaire, the Cyber Insurance Readiness sprint is a two-week, fixed-fee engagement ($4,500) that maps your current state against the carrier questionnaire, identifies the gaps that will most likely block underwriting, and produces a clean evidence package to submit with the application. For a deeper walk through the underwriting controls, see the companion piece on the 22-control questionnaire.
To walk through your specific situation with a CISSP-led team before applying, book a briefing. The assessment tool gives you a faster posture snapshot against the controls underwriters care about, if you want a read before committing to anything.
Cyber insurance is not a substitute for controls. It is a backstop for the residual risk that remains after the controls are doing their job. First-time buyers who treat the policy as the plan tend to learn the expensive way that the controls warranty in the fine print is doing more work than the declarations page. The fix is operational, and it is cheaper than the renewal surcharge on a claim year.
Start with MFA, MDR, a tested backup, and an honest answer to twelve questions. The rest of the application gets easier from there.