Skip to content
Insurance + Compliance

How to Reduce Cyber Insurance Premiums

Five specific controls that underwriters evaluate, how to implement each one, and how to collect the evidence that proves it. Organisations following this approach typically achieve 15-25% premium reductions at renewal.

Why Cyber Insurance Premiums Keep Rising

Understanding the problem is the first step to solving it

Cyber insurance premiums have increased significantly over the past four years. Ransomware claims, business email compromise losses, and supply chain attacks have driven loss ratios up across the industry. Insurers have responded by increasing premiums, tightening underwriting criteria, and in some cases refusing to renew policies for organisations that cannot demonstrate adequate security controls.

The good news: underwriters are transparent about what they want to see. The controls that drive premium reductions are well-documented and consistent across carriers. Organisations that can demonstrate these controls with verifiable evidence are rewarded with lower premiums, better coverage terms, and fewer exclusions.

The challenge for most organisations is not knowing which controls matter. It is collecting and presenting the evidence in a format that underwriters accept. That is where an automated compliance platform becomes essential.

Before and After: Premium Impact

Real-world scenarios showing the financial impact of security controls

Before: Limited Controls

50-person professional services firm

  • MFA on email only, not on VPN or admin consoles
  • No documented patch management policy
  • Annual penetration test, no continuous scanning
  • Incident response plan exists but untested

Annual Premium

£18,500

After: Comprehensive Controls

Same firm, six months later

  • 100% MFA coverage including privileged accounts
  • Documented patching SLAs with 12 months of evidence
  • Continuous vulnerability scanning with trending data
  • Tested incident response plan with tabletop exercise logs

Annual Premium

£14,400

22% reduction

These figures are illustrative based on typical premium reductions reported by organisations implementing comprehensive security controls. Actual results vary by insurer, industry, and claims history.

Five Steps to Lower Premiums

The controls underwriters evaluate and how Fig helps you prove them

1

Implement Multi-Factor Authentication Everywhere

MFA is the single most impactful control underwriters evaluate. Apply it to all remote access, email, administrative consoles, cloud platforms, and VPN connections. Underwriters specifically look for MFA coverage across privileged accounts, not just general user accounts. Organisations that can demonstrate 100% MFA coverage on critical systems frequently see premium reductions of 5-10% on this control alone.

How Fig Collects Evidence

Fig automatically collects MFA deployment evidence from Azure AD, Microsoft 365, Google Workspace, and other identity providers. Auditors and underwriters receive a real-time report showing exactly which accounts have MFA enabled and which do not.

2

Establish a Documented Patch Management Programme

Unpatched systems are involved in a significant proportion of successful breaches. Insurers want to see that you have a defined patching cadence: critical vulnerabilities remediated within 14 days, high-severity within 30 days, and routine patches applied within 90 days. Beyond the policy, they want evidence that you actually follow it.

How Fig Collects Evidence

Fig tracks patch status across your infrastructure, generates compliance reports against your defined SLAs, and flags overdue patches automatically. This evidence is exactly what underwriters request during the application process.

3

Encrypt Data at Rest and in Transit

Encryption is a baseline expectation for any organisation applying for cyber insurance. This means full-disk encryption on all endpoints, TLS 1.2 or higher for data in transit, and encryption of sensitive data stores including databases and backups. Insurers view encryption as a fundamental control that significantly limits the blast radius of a breach.

How Fig Collects Evidence

Fig verifies encryption status across endpoints and cloud services, documenting compliance with your encryption policy. Reports show encryption coverage percentages and highlight any gaps.

4

Build and Test an Incident Response Plan

Having an incident response plan is not enough. Underwriters want to see that the plan has been tested, that roles and responsibilities are clearly defined, and that the plan includes specific procedures for ransomware, data breaches, and business email compromise. Organisations that conduct tabletop exercises at least annually and can provide evidence of these exercises demonstrate operational maturity that insurers reward.

How Fig Collects Evidence

Fig includes pre-built incident response playbooks, tracks tabletop exercise completion, and maintains a full audit trail of every incident and response action. This documentation serves as direct evidence for insurance applications.

5

Deploy Continuous Vulnerability Scanning and Remediation

Point-in-time penetration tests are valuable, but insurers increasingly expect continuous vulnerability management. This means regular automated scanning of internal and external assets, prioritised remediation based on exploitability and business impact, and documented evidence of vulnerability closure rates over time. Organisations that can show a declining trend in open vulnerabilities demonstrate proactive risk management.

How Fig Collects Evidence

Fig runs continuous vulnerability scans, prioritises findings by severity and exploitability, assigns remediation tasks, and tracks closure rates. Trend reports show underwriters that your risk posture is improving, not static.

Frequently Asked Questions

Common questions about cyber insurance and premium reduction

Build Your Insurance Evidence Pack

Fig collects the evidence underwriters need, automatically. Start before your next renewal and demonstrate the controls that drive premium reductions.