Law firms have become a routine target for ransomware and business email compromise crews. The reasons are not subtle: firms hold concentrated client confidences, trust account funds, and active wire instructions, in environments small enough for defenses to be inconsistent. Downtime hurts immediately because court deadlines do not move and closings do not wait.
Cyber insurance sits next to legal professional liability on the renewal checklist now. What has changed in 2026 is not whether a firm needs it, but what carriers will underwrite and at what price.
This article is for managing partners, firm administrators, and IT-responsible attorneys filling out a renewal application this year. Obsidian Ridge does not sell insurance. We help firms pass the underwriting questionnaire honestly and operate the controls behind the answers.
Why a standalone cyber policy is not optional
Many partners assume their existing policies cover cyber events. They do not.
Legal professional liability (LPL, or legal malpractice) responds to errors and omissions in the practice of law — a missed deadline, a conflict of interest, alleged failure to meet a professional standard of care. General business liability covers slip-and-fall and property damage. Neither responds to a forensic investigation, a ransomware lockout, a state AG inquiry, or a wire redirected by a compromised vendor email.
A cyber liability policy is a separate contract. In 2026, the coverage parts on a typical law firm policy include:
- forensics and incident response retainer
- legal counsel, including a breach coach
- breach notification cost, including credit monitoring where required
- regulatory defense — state AG actions and, where applicable, federal regulators
- business interruption from a covered cyber event
- cyber extortion and ransom payment, where legal under OFAC
- restoration of data and systems
- a crime or social-engineering rider for wire fraud and BEC
Some carriers bundle these. Some sell them as endorsements. Read the policy declarations and the schedule of endorsements, not the marketing brochure.
Typical coverage limits for law firm SMBs in 2026
Limits in this segment have stabilized after the 2022-2023 hard market:
- solo to 5-attorney: $250,000 to $1,000,000 aggregate
- 6-to-25 attorney: $1,000,000 to $3,000,000 aggregate
- 26-to-75 attorney mid-size: $3,000,000 to $10,000,000 aggregate, often with a separate excess tower
The aggregate is half the conversation. Sublimits decide what the firm actually collects:
- the ransomware and cyber extortion sublimit, often 50 percent of the aggregate
- the regulatory defense sublimit, which may be lower than the headline number
- the social-engineering and crime sublimit, frequently $50,000 to $250,000
- business interruption waiting periods, typically 8 to 12 hours
A $3,000,000 policy with a $1,500,000 ransom sublimit and a $100,000 crime sublimit is a different product than the same policy with full limits. For a firm that handles closings or PI settlements, the crime sublimit may be the single most important number on the declarations page.
The 2026 underwriting questionnaire
The controls below appear on virtually every law firm carrier's 2026 application. They move premium 20 to 40 percent and decide whether the carrier offers terms at all.
Identity and access controls
- MFA on all email accounts in Microsoft 365 or Google Workspace, including shared mailboxes and service accounts
- MFA on every remote-access surface — RDP, VPN, RMM
- MFA on privileged admin accounts in the document management system (NetDocuments, iManage, SharePoint-based DMS), practice management, and time-and-billing platforms
- Documented offboarding within 24 hours of separation
Endpoint and detection controls
- 24/7 EDR or MDR on every workstation and server
- Identity threat detection on the cloud productivity suite — token theft, impossible travel, anomalous mailbox rules, OAuth consent abuse
- A documented patching cadence
Backup and recovery controls
- Immutable, offsite backups separated from production credentials
- A documented restore test within the last 90 days, including the DMS and accounting system
- Defined RTO and RPO for the DMS, accounting, and litigation-support platforms
Process and people controls
- A written information security policy, reviewed annually — required by statute in IL, MA, NY, and a growing list of other jurisdictions, and by virtually every carrier regardless of state
- A documented incident response plan, with a tabletop exercise in the last 12 months
- Security awareness training with phishing simulations, with payment-redirect themes for firms that handle funds
- DMARC at quarantine or reject, link protection, and attachment sandboxing on the email tenant
- For closings, settlements, or escrow: a documented dual-approval wire process and callback verification on any change to payment instructions
- For litigation firms: documented secure court filing procedures and e-discovery vendor management
This is not a wish list. It is the actual scoring rubric most carriers apply.
The co-insurance trap on ransomware
A control that catches partners off guard at claim time: many 2026 policies apply co-insurance to ransomware claims if the named controls were not in place at the time of loss.
A typical clause: if the insured cannot demonstrate that MFA, EDR or MDR, immutable backups, and a tested incident response plan were operating at the time of loss, the insured shall bear 50 percent of the ransomware loss — ransom, restoration, and business interruption.
Translated: a $1,000,000 ransom sublimit becomes a $500,000 payout, with the firm on the hook for the other half. Read the ransomware endorsement, not just the declarations page. If the policy includes a controls warranty, every answer on the application is now a coverage condition.
The crime and social-engineering rider — read it carefully
The single most common cyber loss in legal is not ransomware. It is wire fraud through business email compromise. An attacker compromises an email account — the firm's, a vendor's, or opposing counsel's — and inserts altered payment instructions into a routine transaction.
Exposures by practice area:
- Real estate and closings. Wire fraud against escrow or closing funds is the most common loss in the vertical. Attackers monitor a closing thread for weeks, then send new wire instructions hours before close.
- Personal injury. Settlement-fund redirection scams targeting the firm's trust account or the client's payout instructions are well documented and increasing.
- Trust accounting and IOLTA. A compromise here is both a cyber loss and a bar disciplinary trigger. The carrier may pay the loss, but the bar inquiry runs on its own track.
- Estate planning. Client wire fraud against trust distributions is a growing pattern.
The base cyber policy generally does not cover the loss. The crime or social-engineering rider does. Two things to verify:
- the sublimit, usually $25,000 to $250,000
- whether the rider covers social engineering fraud — where the firm was tricked into authorizing the transfer — and not only direct computer-funds-transfer fraud
A rider that covers only direct funds-transfer fraud is nearly useless for the law firm BEC pattern. Insist on social-engineering language.
War, systemic, and supply-chain exclusions
After the 2023 Lloyd's of London war exclusion guidance, most cyber policies exclude nation-state attacks. Wording varies; some carriers still pay if attribution is unclear, others have moved to harder exclusions.
For law firms, watch the supply-chain language. If a breach travels through the DMS vendor, the e-discovery platform, the court e-filing system, or the firm's RMM tool, some policies treat that as a systemic event and exclude it. Ask the broker in plain language whether the policy responds if a DMS or e-discovery breach affects this firm, and whether there is a separate sublimit for systemic events. Get it in writing.
Bar-disciplinary defense — a coverage worth asking about
Some carriers now offer an endorsement covering defense costs for state bar disciplinary proceedings arising from a cyber event. The duty to safeguard stays with the lawyer; no policy transfers it. But the cost of defending a disciplinary inquiry is real, and a defense-cost endorsement is worth the conversation at renewal. If your jurisdiction has issued ethics opinions on cyber incidents, read them before the renewal call.
How to pass underwriting without overspending
The single biggest mistake firms make is layering tools the carrier does not actually score. The sequence that works, in order of premium impact:
Step 1 — MFA everywhere it counts
Enable MFA on Microsoft 365 or Google Workspace, on DMS admin accounts, on practice management and time-and-billing platforms, and on every remote-access path. This is the cheapest move and it materially lowers premium.
Step 2 — Deploy 24/7 MDR with identity coverage
A managed detection and response service with a real 24/7 SOC checks the EDR and 24/7 monitoring boxes at the same time. Identity threat detection on top covers the cloud productivity suite controls and MFA-bypass detection. Our Managed Detection and Response and Managed ITDR services are designed against this control set.
Step 3 — Immutable backup with a monthly restore test
The immutable backup checkbox is meaningless without the restore test log. Pick a backup product that supports immutability natively, include the DMS and accounting databases in the test scope, schedule a monthly restore, and keep the log. Carriers ask for it at claim time.
Step 4 — Written security plan, one-page IR plan, tabletop
A written information security plan satisfies the statutory requirement in IL, MA, NY, and other jurisdictions and the carrier policy item. Pair it with a one-page incident response plan naming who calls the carrier hotline, who declares an incident, who talks to partners, who handles client communication, and who decides about closing the office. A 60-minute tabletop with the managing partner, firm administrator, and IT vendor satisfies the tabletop requirement.
Step 5 — Dual-approval wire and callback verification (closings, PI, estate)
If the firm handles closings, settlements, or escrow, write down the dual-approval wire policy and the callback verification rule for any change to payment instructions. Train every staff member who touches wires. This single procedural control prevents the most common law firm cyber loss and is heavily scored on the application.
Step 6 — Workforce training with payment-redirect phishing
A recurring phishing simulation — invoice changes, vendor banking updates, opposing-counsel impersonation, settlement redirection — covers the training requirement and addresses the actual loss patterns. Our Managed Security Awareness Training service handles the cadence.
That covers roughly 80 percent of the premium-moving controls on a 2026 questionnaire.
What does not lower the premium
Firms often spend in the wrong places. Things that look like security but do not move underwriting in 2026:
- a more expensive next-generation firewall, by itself
- stacking two or three antivirus products on the same machine
- a one-time penetration test or audit report with no operational controls behind it
- a policy binder with no evidence the policies are followed
- "we have a great IT guy" without 24/7 monitoring behind that statement
Carriers score operating controls and evidence, not invoices.
Renewal reality in 2026
Underwriters now share loss intelligence on the law firm vertical. Several carriers have raised premiums or non-renewed firms that suffered a covered loss and failed to implement the controls they attested to. The 2024-2025 hard market normalized a 30 to 50 percent surcharge for firms with prior claims and no demonstrable program improvements.
If a claim was paid in a prior period, expect the next application to ask what changed since the incident. Answers like "we are more careful now" do not pass. Answers like "we moved to a 24/7 MDR provider, added MFA on the DMS admin accounts, rewrote the dual-approval wire policy, and ran a tabletop in March" do.
The other 2026 reality: misrepresentation on the application is a coverage defense. If the questionnaire said MFA was enabled on all email accounts and forensics shows it was not, the carrier may rescind. Answer honestly. If a control is partially in place, say so.
The ABA-ethics intersection
A partner cannot ethically use cyber insurance to "transfer" the duty to safeguard client confidences. Model Rule 1.1's duty of competence and Model Rule 1.6's duty of confidentiality both require reasonable efforts to prevent unauthorized disclosure, and several state bars have commented that buying a cyber policy does not, on its own, satisfy that obligation. Insurance covers financial consequences, not the ethical obligation, and it does not cover a bar finding that the firm's controls were unreasonable.
Where Obsidian Ridge fits
We are not an insurance broker. We do not sell policies and we do not collect commissions. We help firms operate the controls underwriters score and produce the evidence package the application asks for.
The control set that moves the most premium in 2026 — 24/7 MDR, identity threat detection, MFA enforcement, and workforce training — lines up with our Foundation and Protected tiers. Foundation covers the endpoint and MDR layer. Protected adds ITDR and security awareness training, addressing the four heaviest premium-moving controls on most questionnaires. The law firm industry page lays out the full mapping.
For firms renewing in the next 90 days, the two-week Cyber Insurance Readiness sprint maps each questionnaire control to evidence the carrier will accept, identifies the gaps most likely to block underwriting, and produces a clean evidence package. If you are not sure where you stand, the Assessment Tool is a faster way to scope the gap.
Cyber insurance is not a substitute for controls. It is a backstop for residual risk. Firms that treat the policy as the plan tend to learn the expensive way that the controls warranty is doing more work than the declarations page.
If the questionnaire is making you nervous, that is the right instinct. The fix is operational, not paperwork. Start with MFA, MDR, a tested backup, and a written dual-approval wire policy.
Ready to map your firm's controls to the carrier questionnaire? Start the Cyber Insurance Readiness sprint.