Cyber insurance premiums are rising, but going without coverage is a bigger risk. Here's what you need to qualify and what IT controls actually matter.
Capped at deductible + premium
Insurer covers breach costs above deductible
Unlimited
You pay everything out of pocket
$1,500 - $10,000/year
Depends on revenue, industry, and IT controls
$0 until an incident
Then $120,000+ on average (IBM, 2024)
MFA, EDR, backups, training required
Insurer mandates specific controls
Whatever you decide
No external mandate (but also no external pressure to improve)
Insurer provides IR team, legal, PR
Coordinated response included in policy
You hire everyone yourself
Under pressure, at premium rates
Meets most contract requirements
Many clients and vendors now require proof of coverage
May lose contracts or partnerships
Increasingly required for vendor approval
Demonstrates due diligence
Helpful during PIPEDA or industry audits
No insurance evidence to present
Still responsible for meeting privacy obligations
File claim, pay deductible, get covered
Subject to policy exclusions and waiting periods
N/A
No claims process — but also no safety net
Insurer forces you to improve
MFA, EDR, backups become non-negotiable
Improvements are optional
Easy to deprioritize when budgets are tight
| Factor | Cyber Insurance | Self-Insuring |
|---|---|---|
| Financial Exposure | Capped at deductible + premium Insurer covers breach costs above deductible | Unlimited You pay everything out of pocket |
| Typical Annual Cost | $1,500 - $10,000/year Depends on revenue, industry, and IT controls | $0 until an incident Then $120,000+ on average (IBM, 2024) |
| IT Requirements | MFA, EDR, backups, training required Insurer mandates specific controls | Whatever you decide No external mandate (but also no external pressure to improve) |
| Breach Response | Insurer provides IR team, legal, PR Coordinated response included in policy | You hire everyone yourself Under pressure, at premium rates |
| Client Contracts | Meets most contract requirements Many clients and vendors now require proof of coverage | May lose contracts or partnerships Increasingly required for vendor approval |
| Regulatory Compliance | Demonstrates due diligence Helpful during PIPEDA or industry audits | No insurance evidence to present Still responsible for meeting privacy obligations |
| Claims Process | File claim, pay deductible, get covered Subject to policy exclusions and waiting periods | N/A No claims process — but also no safety net |
| Security Posture | Insurer forces you to improve MFA, EDR, backups become non-negotiable | Improvements are optional Easy to deprioritize when budgets are tight |
This comparison is for business owners and IT decision-makers evaluating whether cyber insurance is worth the cost. If you've been putting off the decision, had your premiums go up, or been told by a client or vendor that you need coverage, this guide lays out what's involved, including the IT controls you'll need regardless of whether you buy a policy.
The average cost of a data breach for organizations with fewer than 500 employees was $3.31 million globally in 2024 (IBM Cost of a Data Breach Report, 2024). For Canadian SMBs specifically, the range is more modest but still painful: $120,000 to $400,000+ when you include forensic investigation, legal counsel, customer notification, business interruption, and reputation damage.
These aren't abstract numbers. A ransomware attack that encrypts your file server means your team can't work. A compromised email account that sends fraudulent invoices to your clients means legal liability. A breach of personal information triggers PIPEDA notification requirements and potential regulatory action.
Insurance doesn't prevent these incidents. It covers the financial fallout when they happen.
Cyber insurance policies generally cover two categories:
First-party coverage (your direct costs):
Third-party coverage (claims against you):
Most policies also give you access to an incident response team: forensic investigators, breach attorneys, and PR advisors who have handled hundreds of incidents. When you're in the middle of a breach, having experienced people on call is worth more than the money.
Read your policy carefully. Common exclusions include:
The exclusions matter. An insurer can deny a claim if they find you weren't maintaining the security controls you attested to on your application.
Self-insuring means accepting the financial risk of a cyber incident yourself instead of transferring it to an insurer. For some businesses, this makes sense:
But be honest about your risk. "We're too small to be a target" is not a security strategy. Automated attacks don't check your employee count. Ransomware doesn't care about your revenue.
Here's the part that surprises most businesses: the IT controls insurers require are the same controls you should have regardless of whether you buy a policy.
Multi-factor authentication (MFA) Required on email, VPN/remote access, and admin accounts. This is non-negotiable for most insurers in 2024-2026. MFA blocks over 99% of credential-based attacks (Microsoft Digital Defense Report, 2024).
Endpoint detection and response (EDR) Traditional antivirus isn't enough. Insurers want EDR tools that can detect and respond to threats in real time. Products like Huntress, CrowdStrike, or SentinelOne are common examples.
Regular offsite backups with tested recovery Backups must be stored offsite (or in the cloud), isolated from your main network, and regularly tested. "We have backups" doesn't satisfy insurers. "We tested a full restore last quarter and it completed in 4 hours" does.
Security awareness training Employee phishing simulations and regular training sessions. Most breaches start with a person clicking something they shouldn't have. Insurers know this.
Patch management A documented process for applying security updates within a reasonable timeframe: typically 30 days for standard patches, 72 hours for critical vulnerabilities.
Incident response plan A written plan that defines who does what during a security incident. Doesn't need to be a 50-page document. A clear rundown of roles, communication procedures, and escalation paths is sufficient.
Even if you decide not to buy a policy, implementing these controls dramatically reduces your risk:
The controls are valuable independently of insurance. Insurance is the financial backstop for when good controls aren't enough.
Applying for cyber insurance is more involved than it used to be. After the ransomware surge of 2020-2022, insurers tightened their requirements considerably.
Questionnaire: You'll fill out a detailed form about your IT environment: number of employees, revenue, industry, what security controls you have, whether you've had prior incidents. Be honest. Misrepresentations can void your policy.
Technical verification: Some insurers verify your answers. They may scan your external attack surface, check if MFA is enabled on your email domain, or ask for evidence of specific controls.
Underwriting: The insurer evaluates your risk profile and sets your premium. Better controls = lower premiums. A business with MFA, EDR, tested backups, and employee training will pay meaningfully less than one with just antivirus.
Policy issuance: Once approved, you receive your policy with specific terms, coverage limits, deductibles, and exclusions.
Before applying:
If you're missing several of these, get them in place before applying. Applying with weak controls either gets you denied or results in higher premiums and more exclusions.
Several factors affect your premium:
For Calgary businesses specifically, premiums have been rising alongside the national trend, but businesses with strong IT controls are still getting reasonable rates.
For most Calgary businesses with 10+ employees that handle any client data, cyber insurance is worth the cost. The annual premium is a fraction of what a breach would cost, and the IT controls required to qualify make your business more secure regardless.
The businesses we'd hesitate to recommend insurance to are very small operations (under 10 people) that handle minimal sensitive data and have low revenue. For those businesses, the premium might not be justified, but the security controls still are.
If you're unsure where your IT stands relative to what insurers require, take our free IT security assessment. It evaluates your environment against the same frameworks insurers use (NIST, CIS Controls) and shows you exactly where the gaps are.
We don't sell cyber insurance. We implement the IT controls that help you qualify for it and keep your premiums down. For details on our security capabilities, see our cybersecurity services or contact us for a free consultation.
These are the IT controls most cyber insurers look for on their application. We implement all of them as part of our managed IT and cybersecurity services.
Required on email, VPN, and admin accounts
What we do: We deploy MFA across Microsoft 365, VPN, and all admin accounts for your team
EDR on all endpoints, not just antivirus
What we do: We deploy and manage Huntress MDR across all your devices with 24/7 monitoring
Backups isolated from your main network, recovery tested regularly
What we do: Automated offsite backups with scheduled recovery testing so you know it works
Employee phishing simulations and regular training
What we do: Phishing simulations and quarterly security training sessions for your staff
Security updates applied within 30 days (72 hours for critical)
What we do: Automated patching with priority handling for critical vulnerabilities
Documented roles, procedures, and escalation paths
What we do: We help you create and maintain an incident response plan tailored to your business
Requirements vary by insurer and policy. This list reflects the most commonly requested controls across major Canadian cyber insurance providers as of 2025-2026. We do not sell insurance or guarantee qualification.
Written by Tyler Soron, President & Founder of Lumen IT ·
Take our free IT assessment to see where your security controls stand against what insurers require. No sales pressure, just a clear picture of where you are.
Or take our free IT security self-assessment to see where your business stands.
How we protect Calgary businesses
See where your security stands
Test your defenses before attackers do
Compare monitoring approaches
Should you hire or outsource?
Baseline controls every business needs
Answer 5quick questions and we'll tell you which option fits.
1. What kind of data does your business handle?
2. How many employees does your business have?
3. Do your clients or contracts require cyber insurance?
4. What security controls do you have in place today?
5. If you were breached tomorrow, could your business absorb $150,000+ in costs?