How to Reduce Cyber Insurance Premiums
Five specific controls that underwriters evaluate, how to implement each one, and how to collect the evidence that proves it. Organisations following this approach typically achieve 15-25% premium reductions at renewal.
Why Cyber Insurance Premiums Keep Rising
Understanding the problem is the first step to solving it
Cyber insurance premiums have increased significantly over the past four years. Ransomware claims, business email compromise losses, and supply chain attacks have driven loss ratios up across the industry. Insurers have responded by increasing premiums, tightening underwriting criteria, and in some cases refusing to renew policies for organisations that cannot demonstrate adequate security controls.
The good news: underwriters are transparent about what they want to see. The controls that drive premium reductions are well-documented and consistent across carriers. Organisations that can demonstrate these controls with verifiable evidence are rewarded with lower premiums, better coverage terms, and fewer exclusions.
The challenge for most organisations is not knowing which controls matter. It is collecting and presenting the evidence in a format that underwriters accept. That is where an automated compliance platform becomes essential.
Before and After: Premium Impact
Real-world scenarios showing the financial impact of security controls
Before: Limited Controls
50-person professional services firm
- MFA on email only, not on VPN or admin consoles
- No documented patch management policy
- Annual penetration test, no continuous scanning
- Incident response plan exists but untested
Annual Premium
£18,500
After: Comprehensive Controls
Same firm, six months later
- 100% MFA coverage including privileged accounts
- Documented patching SLAs with 12 months of evidence
- Continuous vulnerability scanning with trending data
- Tested incident response plan with tabletop exercise logs
Annual Premium
£14,400
22% reduction
These figures are illustrative based on typical premium reductions reported by organisations implementing comprehensive security controls. Actual results vary by insurer, industry, and claims history.
Five Steps to Lower Premiums
The controls underwriters evaluate and how Fig helps you prove them
Implement Multi-Factor Authentication Everywhere
MFA is the single most impactful control underwriters evaluate. Apply it to all remote access, email, administrative consoles, cloud platforms, and VPN connections. Underwriters specifically look for MFA coverage across privileged accounts, not just general user accounts. Organisations that can demonstrate 100% MFA coverage on critical systems frequently see premium reductions of 5-10% on this control alone.
How Fig Collects Evidence
Fig automatically collects MFA deployment evidence from Azure AD, Microsoft 365, Google Workspace, and other identity providers. Auditors and underwriters receive a real-time report showing exactly which accounts have MFA enabled and which do not.
Establish a Documented Patch Management Programme
Unpatched systems are involved in a significant proportion of successful breaches. Insurers want to see that you have a defined patching cadence: critical vulnerabilities remediated within 14 days, high-severity within 30 days, and routine patches applied within 90 days. Beyond the policy, they want evidence that you actually follow it.
How Fig Collects Evidence
Fig tracks patch status across your infrastructure, generates compliance reports against your defined SLAs, and flags overdue patches automatically. This evidence is exactly what underwriters request during the application process.
Encrypt Data at Rest and in Transit
Encryption is a baseline expectation for any organisation applying for cyber insurance. This means full-disk encryption on all endpoints, TLS 1.2 or higher for data in transit, and encryption of sensitive data stores including databases and backups. Insurers view encryption as a fundamental control that significantly limits the blast radius of a breach.
How Fig Collects Evidence
Fig verifies encryption status across endpoints and cloud services, documenting compliance with your encryption policy. Reports show encryption coverage percentages and highlight any gaps.
Build and Test an Incident Response Plan
Having an incident response plan is not enough. Underwriters want to see that the plan has been tested, that roles and responsibilities are clearly defined, and that the plan includes specific procedures for ransomware, data breaches, and business email compromise. Organisations that conduct tabletop exercises at least annually and can provide evidence of these exercises demonstrate operational maturity that insurers reward.
How Fig Collects Evidence
Fig includes pre-built incident response playbooks, tracks tabletop exercise completion, and maintains a full audit trail of every incident and response action. This documentation serves as direct evidence for insurance applications.
Deploy Continuous Vulnerability Scanning and Remediation
Point-in-time penetration tests are valuable, but insurers increasingly expect continuous vulnerability management. This means regular automated scanning of internal and external assets, prioritised remediation based on exploitability and business impact, and documented evidence of vulnerability closure rates over time. Organisations that can show a declining trend in open vulnerabilities demonstrate proactive risk management.
How Fig Collects Evidence
Fig runs continuous vulnerability scans, prioritises findings by severity and exploitability, assigns remediation tasks, and tracks closure rates. Trend reports show underwriters that your risk posture is improving, not static.
Frequently Asked Questions
Common questions about cyber insurance and premium reduction
Build Your Insurance Evidence Pack
Fig collects the evidence underwriters need, automatically. Start before your next renewal and demonstrate the controls that drive premium reductions.