A sky-high premium might not at all times mirror your organization’s safety posture
08 Aug 2025
•
,
3 min. learn

When a cyber threat insurance coverage quote lands in your desk and the premium is sky excessive, it’s pure to imagine that the insurer is judging your atmosphere to be excessive threat. So, when the following quote lands and is extra acceptable, does it imply they considered your threat in another way?
In response to one of many many cyber insurance coverage displays at Black Hat USA 2025, the explanation might not be so apparent: it might be that the insurer is limiting its threat publicity to a services or products you employ, slightly than discovering a threat inside your atmosphere.
To be extra particular, an insurer might want to restrict its publicity to a sure vendor in your provide chain. For instance, think about they resolve that acceptable threat is for less than 60% of their policyholders to make use of product X. If your small business had been to push them over this restrict, they might simply value themselves out of your small business with a excessive quote, slightly than declining you.
The danger, due to this fact, just isn’t together with your atmosphere – it’s with the provider. The truth is, there might not even be a selected threat with them. It might simply be {that a} threat restrict set by the insurer has been reached.
As shoppers, we will see this in follow. Once I use a automobile insurance coverage comparability web site, the premium quantities fluctuate by as a lot as 200%. But my threat is similar to all insurers, and it’s seemingly that some insurers are capping their threat publicity to sure automobile producers by pricing themselves out of the market.
Because the cyber insurance coverage and cybersecurity industries develop into additional entwined, the data-based insights from insurers’ claims can – and will – enhance cybersecurity posture for everybody concerned, not simply the insured. As a cybersecurity skilled, I assume that multi-factor-authentication is default ‘ON’ for any firm offering their staff distant entry through an SSL VPN.
My assumption, although, is way from right. A statistic shared throughout a presentation revealed that within the first six months of 2025, 45% of recent cyber claims had been a results of an SSL VPN missing MFA. That is surprising for 2 causes: firstly, why do insurers present insurance policies to firms that don’t have any MFA given the chance of a declare, and secondly, why would any firm not safe their SSL VPN with MFA?
What claims information reveals
In response to information offered by Coalition, 55% of all ransomware assaults are initiated by a fringe safety machine. And in claims the place the strategy used is understood, there’s a clear winner: credential theft.
Whereas ransomware dominates the dialogue, there was excellent news offered. Coalition’s efforts to claw again funds from fraudulent transfers do have some success. In 2024, they managed to get well $31 million, utilizing numerous strategies that embrace alerting authorities contacts, acquiring injunctions to freeze funds and interesting specialised disaster response specialists. This claw-back averages at $278,000 per occasion, with 24% of all occasions gaining some claw-back and 12% of occasions getting the entire quantity again.
The cyber insurance coverage trade continues its efforts to cut back its publicity to claims, and the displays from numerous insurers reveal that they’re going to new lengths to realize this. Relying on their coverage, the insured can now profit from numerous companies supplied by the insurer, together with custom-made cyber menace intelligence based mostly on the insured’s particular atmosphere. That is complemented by monitoring and alerting their purchasers when a brand new vulnerability is posted to the CVE database; particularly, the insurer will alert the insured the place they know the software program or {hardware} is in use and supply steerage on the anticipated patching timeline.
This proactive strategy to cut back threat even extends on to the darkish internet, the place insurers might buy compromised credentials or, in some situations, purchase zero-day vulnerabilities to guard their insured purchasers and, much more importantly, scale back the insurer’s monetary threat.
Because the insurance coverage and cybersecurity industries proceed to overlap, the query for me is: simply how far will the overlap go?











