Infographic showing that 40% of cyber insurance claims were denied last year, highlighting what Australian businesses must do, with icons of a rejected insurance document, a shield, and a padlock.

40% of Cyber Insurance Claims Were Denied Last Year. Here’s What Australian Businesses Must Do Before Their Next Renewal

✍️ About This Guide

Written by the cybersecurity advisory team at CodeHyper, a Sydney-based managed IT and cybersecurity provider. Our team has helped Australian SMBs prepare for cyber insurance applications and renewals across professional services, healthcare, construction, and retail sectors. Statistics cited in this guide are drawn from the ASD Annual Cyber Threat Report 2024–25, S&P Global Ratings cyber insurance forecast data, Coalition 2024 cyber insurance claim data, and Marsh McLennan’s 2025 Cyber Insurance Market Report. This guide is educational in nature — always work with your insurance broker for binding coverage decisions.

 

In 2024, a municipality in North America filed an $18.3 million cyber insurance claim after a devastating ransomware attack paralysed 80% of its network. The insurer denied the entire claim. The reason had nothing to do with policy fine print, exclusion clauses, or legal technicalities. The reason was multi-factor authentication was not fully implemented across all systems at the time of the attack — exactly as declared on the application.

That story is not unique. Across Australia and globally, approximately 40% of cyber insurance claims are now denied — and the overwhelming majority of those denials trace back to the same preventable causes: security controls that were overstated on the application, controls that were implemented but never maintained, or coverage gaps that the business didn’t know existed until the moment they needed to make a claim.

The Australian cyber insurance market reached AUD $467 million in 2025 and is growing rapidly — but so is the gap between what businesses think their policy covers and what insurers will actually pay. S&P Global forecasts premium increases of 15–20% in 2026 after two years of softening rates, driven by rising ransomware losses and the growing cost of individual incidents. For Australian small businesses, the average cost of a cybercrime incident now exceeds $56,600 — a figure that makes insurance essential but also makes claim denial catastrophic.

This guide covers every cyber insurance requirement Australian businesses need to meet in 2026: the specific controls underwriters assess, the documentation that proves compliance, the exact reasons claims get denied, and the practical steps to make your renewal go smoothly. For the security controls underpinning all of this, explore our managed cybersecurity services or our guide to the ASD Essential Eight — which maps almost directly to what Australian insurers require.

 

How Cyber Insurance Underwriting Changed And Why It’s Harder Than Ever to Qualify

Until around 2020, cyber insurance was relatively straightforward to obtain. Premiums were low, underwriting questions were broad and largely self-attested, and claims were paid with limited scrutiny. Then the ransomware epidemic hit. Global cyber losses escalated sharply, insurers posted record claim ratios, and the entire market restructured — practically overnight.

The result is a fundamentally different insurance environment in 2026. Insurers are now operating less like financial risk transfer providers and more like security auditors. They are asking granular, specific, technical questions. They are using third-party scanning tools to validate what applicants claim. They are including warranty clauses that void coverage if declared controls are not maintained. And they are denying claims on technical grounds at a rate that would have been unthinkable five years ago.

⚠️ The Numbers Every Australian Business Owner Needs to Know

• 40%+ of cyber insurance claims denied in 2024 (multiple industry sources)   • 82% of denied claims involved organisations without MFA fully implemented (Coalition 2024)   • 37% of denied Australian claims specifically cited MFA misrepresentation as the primary basis   • 15–20% premium increases forecast for 2026 (S&P Global Ratings)   • Average cybercrime cost for Australian small businesses: $56,600 per incident (ACSC 2024–25)   • Only 10–20% of Australian SMBs (under $100M revenue) currently carry cyber insurance (Swiss Re)

 

The critical shift that every Australian business owner needs to understand: your cyber insurance policy is only as valuable as the controls you declared and maintained. A policy that is voided at claim time because of a misrepresentation — even an inadvertent one — is worse than no policy at all, because you paid premiums for years and received nothing when you needed it most.

 

The 9 Cyber Insurance Requirements Australian Underwriters Now Assess in 2026

While specific requirements vary between carriers, Australian underwriters have converged on a consistent core set of controls assessed during underwriting and verified through the application process. These are not recommendations — these are the controls that determine whether you get a quote, what premium you pay, and whether a claim gets honoured

1. Multi-Factor Authentication (MFA) — The #1 Requirement

MFA is the single most scrutinised control in cyber insurance underwriting. 99% of cyber insurance applications now include specific MFA questions (Marsh McLennan 2025), and 82% of denied claims involve organisations without MFA fully implemented.

Critically, insurers do not want to know whether you have purchased an MFA solution. They want documented evidence that MFA is enforced — actively required, not optional — across every access point:

  • Microsoft 365 and email: Every user account, without exception. Legacy authentication protocols (Basic Auth) must be blocked
  • Remote access and VPN: All users connecting from outside the office, including home workers and contractors
  • Privileged and administrative accounts: Every account with elevated permissions — Domain Admins, Global Admins, Azure subscription owners
  • Cloud platforms and SaaS applications: Microsoft Azure, AWS, Xero, Salesforce, and any platform holding business-critical or customer data
  • Backup and recovery systems: Backup consoles and management interfaces must have MFA — ransomware groups specifically target unprotected backup systems first

The warranty implication is severe: if your application states MFA is enforced everywhere and an investigation reveals it was not enabled on the server where a breach originated — as in the $18.3 million municipality case — your claim can be denied on grounds of material misrepresentation. Microsoft Entra ID with Conditional Access policies is the most common technical implementation for Australian businesses.

2. Endpoint Detection and Response (EDR) on All Devices

Traditional antivirus software is no longer acceptable to cyber insurance underwriters. EDR — Endpoint Detection and Response — is now a baseline requirement, not a premium security option. The distinction matters: antivirus detects known malware signatures. EDR continuously monitors endpoint behaviour, detects anomalous activity that signatures can’t catch, isolates infected devices automatically, and provides forensic logs for post-incident investigation.

Insurers require EDR because 90% of ransomware attacks originate at endpoints — workstations, laptops, and servers. A claim arising from an attack on an endpoint that lacked EDR coverage is routinely denied. Key EDR requirements:

  • Coverage: All servers, all workstations, all laptops, and all remote/home devices that connect to business systems or hold business data
  • Active management: EDR alerts must be monitored and acted upon — a tool installed but unmonitored provides no claim protection
  • Reporting: Be prepared to provide endpoint coverage reports showing 100% deployment and recent alert activity

For Australian SMBs, Microsoft Defender for Business (included in Microsoft 365 Business Premium) provides enterprise-grade EDR at an SMB price point. Our guide on EDR vs antivirus explains the technical differences in detail.

3. Immutable, Tested Backups

Backups are the difference between a ransomware incident that costs days of recovery time and one that costs months — or ends the business entirely. Australian underwriters now assess backup arrangements with three specific criteria: isolation, immutability, and verified restoration testing

  • Isolation: Backups must be stored in a location that attackers cannot reach from the production environment. Backups connected to the same network — or accessible using the same credentials — are routinely destroyed in ransomware attacks
  • Immutability: Backups must be write-protected — impossible to encrypt or delete — for a defined retention period. Azure Immutable Blob Storage, Datto with ransomware protection, or air-gapped tape all satisfy this requirement
  • Tested restoration: A backup you have never tested is operationally equivalent to no backup. Insurers increasingly require documented restoration test results — quarterly is the recommended frequency. Stating on your application that backups are tested when they have never been verified is misrepresentation
  • Microsoft 365 coverage: Microsoft does NOT provide a full backup of your Microsoft 365 data under its shared responsibility model. Exchange Online, SharePoint, OneDrive, and Teams data requires a third-party Microsoft 365 backup solution — and insurers are increasingly checking for this

4. Documented Patch Management Programme

Unpatched vulnerabilities are the second most common technical factor in denied claims. Insurers require a documented, enforced patch management programme — not just a verbal assurance that patching happens. Specific requirements:

  • Critical patches: Applied within 14–30 days of release (insurers commonly specify 30 days; Essential Eight ML2 requires 48 hours for actively exploited vulnerabilities)
  • Internet-facing systems: Held to stricter timelines — public-facing servers and applications are the most targeted assets
  • End-of-life operating systems: Systems running unsupported software (such as Windows 10 past October 2025) are a significant red flag for underwriters and can result in coverage exclusions for incidents involving those systems
  • Evidence: Patch management reports showing deployment rates, outstanding vulnerabilities, and resolution timelines. Third-party external scans showing no critical unpatched vulnerabilities accessible from the internet

5. Written Incident Response Plan

An Incident Response Plan (IRP) is a documented set of procedures your organisation follows when a cyber incident occurs. Insurers require it for two reasons: it reduces breach costs by enabling faster, more coordinated responses, and it ensures you meet the notification timelines your policy requires — typically 24–72 hours from discovery.

Your IRP must address:

  • Detection and identification: How you detect an incident and determine its scope
  • Containment: Immediate steps to isolate affected systems and prevent spread
  • Notification: Who to notify — your insurer’s claims hotline (have the number somewhere accessible without your computer), the OAIC if personal data is involved under the Notifiable Data Breaches scheme, and affected individuals
  • Recovery: Procedures for restoring systems from backups and returning to normal operations
  • Post-incident review: How you document lessons learned and improve controls

The notification gap is a critical claim risk: many businesses handle the technical response to a breach but delay contacting their insurer because it’s not in their incident procedures. Missing the notification window — often 24–72 hours — gives insurers grounds to reduce or deny coverage. Our guide to mastering incident response provides a practical IRP template for Australian SMBs.

6. Email Security Controls (SPF, DKIM, DMARC)

Business Email Compromise (BEC) — where attackers impersonate executives or suppliers to redirect payments — remains one of the most common and costly cyber insurance claims in Australia. Insurers are now checking for email authentication controls that prevent domain spoofing:

  • SPF (Sender Policy Framework): Specifies which mail servers are authorised to send email from your domain
  • DKIM (DomainKeys Identified Mail): Adds a cryptographic signature to outgoing email that verifies it hasn’t been tampered with in transit
  • DMARC (Domain-based Message Authentication): Instructs receiving mail servers on how to handle emails that fail SPF or DKIM checks — and generates reports on attempted spoofing

A DMARC policy of p=reject — the highest protection level — tells receiving mail servers to block all emails that fail authentication. This is the configuration insurers increasingly prefer. Our dedicated guide on email spoofing prevention walks through the full implementation process.

7. Security Awareness Training and Phishing Simulation

Since phishing remains the primary initial access vector in the majority of Australian cyber incidents, insurers require documented evidence that staff receive regular security awareness training and are tested through phishing simulations. Basic requirements:

  • Frequency: Annual training is the minimum; quarterly is strongly preferred by underwriters
  • Phishing simulations: Simulated phishing campaigns that test whether staff click malicious links and report suspicious emails — completion rates and click rates are the metrics underwriters want to see
  • Documentation: Training completion records and phishing simulation results — presented as evidence of an active, ongoing security culture, not a one-time exercise

Our article on why security awareness training matters and the future of AI-powered phishing simulations provide practical guidance on building a training programme that satisfies underwriter expectations.

8. Privileged Access Management

Attackers who gain access to an administrative account have the ability to deploy ransomware across an entire environment, exfiltrate data at scale, and disable security controls. Insurers increasingly assess whether privileged access is properly controlled:

  • Principle of least privilege: Users have only the access their role requires — no more. Standard users are not local administrators
  • Separate admin accounts: IT administrators use dedicated privileged accounts for administrative tasks, separate from their day-to-day user accounts
  • Just-in-time access: Privileged access is granted on demand for specific tasks and automatically revoked after a defined period — not permanently assigned
  • Access reviews: Regular audits of who has elevated access and whether that access is still required — documented and evidenced for insurers

9. Network Segmentation and DNS Filtering

Network segmentation — dividing your IT environment into separate zones so that a compromise in one segment cannot spread freely to all others — is increasingly assessed at higher coverage tiers. DNS filtering, which blocks connections to known malicious domains before they reach your network, is now considered a baseline control by many underwriters. Key requirements:

  • Segment high-value systems: Finance, HR, and executive systems should be isolated from general user workstations
  • Isolate backup systems: Backup infrastructure must be on a separate network segment inaccessible from user workstations
  • DNS filtering: Deploy a DNS filtering solution (such as Cisco Umbrella, DNSFilter, or Microsoft’s built-in Defender capabilities) that blocks access to malicious domains before connections are established

 

The 5 Things That Void Your Cyber Insurance Policy at Claim Time

Understanding what gets claims denied is as important as knowing what gets them approved. These five factors are responsible for the vast majority of Australian cyber insurance claim denials.

1. Material Misrepresentation — The Policy Killer

Material misrepresentation — providing false or inaccurate information on your insurance application — is the most common grounds for claim denial and policy rescission in Australia. Courts have consistently supported insurers voiding policies where the misrepresentation was material to the underwriting decision — meaning the insurer would not have offered the same terms had the truth been known.

In the landmark Travelers v International Control Services case, the insurer successfully rescinded an entire cyber policy after the business misrepresented its MFA coverage on the application. The court found the misrepresentation was material — the policy would not have been issued on those terms. The business received nothing despite paying premiums for years and suffering a significant breach.

The practical rule: never overstate your controls on an insurance application. If MFA is active on email but not on privileged accounts, say so. If backups exist but have never been tested, say so. An honest application with documented gaps is manageable. A dishonest application that is later proven false voids everything.

2. Controls That Were Active at Application but Not Maintained

Cyber insurance policies contain warranty clauses and ‘failure to maintain’ exclusions that void coverage for incidents arising from the insured’s failure to maintain the security standards declared on the application. This means your application is not a one-time snapshot — it is an ongoing commitment.

A common scenario: a business correctly declares MFA at application time, then a new SaaS tool is deployed six months later without MFA being configured for it. A breach through that tool can be denied because the stated control was not maintained across all systems.

3. Missing the Notification Window

Most cyber insurance policies require notification to the insurer within 24 to 72 hours of discovering a breach. In the chaos of a ransomware attack — when the IT team is focused on containment and recovery — calling the insurance company is rarely the first priority. Missing the notification window gives insurers grounds to reduce or deny coverage on the basis that their ability to investigate and mitigate was prejudiced by the delay.

The fix is simple: add the insurer’s claims notification number to your printed incident response plan, your physical emergency contact list, and your phone contacts. Make insurer notification a mandatory step in your incident response procedure — not an afterthought.

4. Using Unapproved Vendors During Incident Response

Most cyber insurance policies specify that insurer-approved vendors must be used for forensic investigation and incident response work covered under the policy. Engaging your own IT support or a third-party forensics firm without insurer approval — even with the best intentions — can result in those costs being excluded from the claim. Always contact your insurer before engaging external vendors during an incident.

5. Exclusions You Didn’t Know Existed

Common policy exclusions that Australian businesses regularly discover only at claim time include: nation-state attack exclusions (now being litigated globally following the NotPetya precedent); social engineering sub-limits (BEC claims often have significantly lower coverage caps than other cyber incidents); system failure exclusions (infrastructure failures causing downtime may not be covered under cyber policies); and pre-existing vulnerability exclusions (incidents arising from vulnerabilities that existed before the policy was purchased). Review your policy wording with your broker annually, not just at renewal.

 

�� Real-World Case Study: How a Brisbane Accounting Firm Saved Its Cyber Insurance Claim — and Reduced Its Premium by 28%

Case Study Snapshot

Industry: Accounting & Financial Advisory  |  Location: Brisbane, QLD  |  Staff: 45  |  Trigger: Ransomware attack on file server  |  Claim Outcome: Claim paid in full ($127,000)  |  Premium Change at Renewal: -28% reduction  |  Key Factor: Full documentation of declared controls maintained and verified

 

The Situation

A 45-person Brisbane accounting and financial advisory firm experienced a ransomware incident in mid-2025. An attacker had gained access through a compromised contractor account — the contractor had been granted access to the firm’s document management system six months earlier and had since left the engagement, but their account had not been deprovisioned.

The encrypted data included client financial records, tax file information, and correspondence spanning several years. The ransom demand was $180,000 AUD. The firm had cyber insurance with a limit of $500,000 and immediately contacted their insurer’s claims hotline — within four hours of discovering the incident, well within their 24-hour notification requirement.

Why the Claim Was Paid

The insurer assigned a forensic investigator within 24 hours. What followed was a detailed verification of every control declared on the firm’s insurance application — exactly the kind of audit that voids policies when controls aren’t maintained. Here is why this firm’s claim was paid in full while others in similar situations are denied:

  • MFA was enforced everywhere: Microsoft Entra ID Conditional Access policies required MFA for every authentication event — including the contractor account that was compromised. The attacker could not authenticate to active sessions. The incident originated from a dormant, unchecked account rather than a live authentication bypass
  • The breach was contained by EDR: Microsoft Defender for Business detected the ransomware execution within minutes, automatically isolated the affected file server, and prevented lateral movement to workstations and the backup environment
  • Backups were intact and tested: The firm had implemented Datto SaaS Protection for Microsoft 365 and a separate Datto SIRIS device for on-premises backup — both with immutable storage and network isolation. Quarterly restoration tests were documented. Recovery was completed within 18 hours from backup
  • Patch management was documented: Intune patch compliance reports showed 97% patch compliance across all endpoints, with the 3% outstanding being non-critical patches within the 30-day window. No unpatched critical vulnerabilities were found on internet-facing systems
  • Incident response plan was followed: Staff executed the firm’s documented IRP — containing the affected server, notifying the insurer, engaging the insurer’s approved forensic vendor, and initiating parallel recovery from backup. Every step was timestamped and logged

The Gap That Was Found — and What It Cost

The forensic investigation did identify the root cause: the contractor account that had not been deprovisioned. This gap — a failure in the offboarding process — meant the attacker had persistent access for months before using it. The insurer noted this as a non-conformance with the firm’s declared access management controls.

Under a strict reading of the policy’s warranty clause, this could have been used to reduce the claim. However, because all other declared controls were verifiably maintained — and because the firm had a documented account review process that had simply failed to capture this one external account — the insurer assessed it as a process gap rather than a material misrepresentation. The claim was paid in full: $127,000 covering forensic investigation, recovery costs, client notification costs, and business interruption.

The Premium Reduction at Renewal

At the firm’s next renewal, the broker presented the forensic investigation report — which documented every control, its status at the time of the incident, and the firm’s response — to underwriters. The result: a 28% premium reduction, despite having made a claim. The underwriters assessed the firm as a significantly lower risk than the market average, because the incident had demonstrated both the effectiveness of their controls and the maturity of their response.

The one required change: the firm implemented Microsoft Entra ID lifecycle management policies to automatically disable external accounts after 30 days of inactivity — closing the specific gap the incident had exposed.

“We had an incident that could easily have been a disaster — financially and reputationally. The fact that we got paid, and then had our premium cut, came down entirely to documentation. We could prove everything we said we had. That’s the only reason it went the way it did.”  — Director, Brisbane Accounting Firm

 

The Documentation That Proves Your Controls to Underwriters

In 2026, self-attestation is no longer sufficient for many underwriters. Major Australian carriers now use third-party telemetry, external scanning tools, and mid-term audits to verify that declared controls are in place and operating. Here is the documentation every business should maintain — and be prepared to provide:

Required Control

Documentation Evidence Insurers Want

MFA Enforcement

Conditional Access policy screenshots, sign-in logs showing MFA challenges, legacy auth block reports, MFA coverage percentage by user type

EDR Deployment

Endpoint coverage report showing installed agents and coverage %, recent alert activity log, confirmed 100% deployment including remote devices

Backups

Backup job completion logs (daily), quarterly restoration test reports with RTO/RPO results, storage isolation confirmation, Microsoft 365 backup coverage confirmation

Patch Management

Intune or RMM patch compliance reports, outstanding vulnerability summary, patch deployment timeline evidence, no critical unpatched internet-facing vulnerabilities

Incident Response Plan

Current version of documented IRP with date stamp, evidence IRP has been reviewed/tested in past 12 months, staff training acknowledgements

Email Security

DMARC, DKIM, SPF record configurations (MXToolbox report), DMARC policy level (p=reject preferred), DMARC aggregate report samples

Security Awareness Training

Training platform completion records, phishing simulation results (click rates, reporting rates), training schedule showing ongoing cadence

Privileged Access

Access review reports, list of privileged accounts and justification, PIM configuration screenshots, admin account separation evidence

Vulnerability Management

External scan results (no critical findings), internal vulnerability assessment summary, vulnerability remediation tracking

 

How the ASD Essential Eight and ISO 27001 Map to Cyber Insurance Requirements

Australian businesses pursuing the ASD Essential Eight or ISO 27001 certification are — whether they realise it or not — doing most of the work required to satisfy cyber insurance underwriting. The frameworks map almost directly to what insurers assess:

Insurer Requirement

ASD Essential Eight Control

ISO 27001 Annex A Control

Multi-Factor Authentication

E8 Control 7: Multi-Factor Authentication

A.8.5 Secure Authentication

Patch Applications

E8 Control 2: Patch Applications

A.8.8 Management of Technical Vulnerabilities

Patch Operating Systems

E8 Control 6: Patch Operating Systems

A.8.8 Management of Technical Vulnerabilities

Backups (Isolated, Tested)

E8 Control 8: Regular Backups

A.8.13 Information Backup

Restrict Administrative Privileges

E8 Control 5: Restrict Administrative Privileges

A.8.2 Privileged Access Rights

Application Control / EDR

E8 Control 1: Application Control

A.8.7 Protection Against Malware

Incident Response Plan

Not prescriptively covered

A.5.24–5.28 Information Security Incident Management

Security Awareness Training

Not prescriptively covered

A.6.3 Information Security Awareness, Education and Training

Email Security (SPF/DKIM/DMARC)

Not prescriptively covered

A.8.23 Web Filtering / A.5.14 Information Transfer

An organisation at Essential Eight Maturity Level 2 has already implemented the six controls that map directly to underwriting requirements — and with proper documentation, can present this evidence in the format insurers expect. ISO 27001 certification goes further: it covers the governance gaps (incident response, training, email security) that Essential Eight doesn’t address prescriptively, and provides a third-party-audited certificate that many insurers accept in lieu of detailed security questionnaires. Our Essential Eight checklist is the fastest starting point for building insurance-ready security controls.

 

What Determines Your Cyber Insurance Premium in Australia

Understanding what drives your premium helps you prioritise security investments for maximum financial return — both in terms of premium savings and genuine risk reduction.

Factor

Impact on Premium

MFA enforcement across all systems

20–40% premium reduction vs no MFA (industry benchmark)

EDR on all endpoints

10–20% reduction; absence may disqualify coverage entirely

Tested, isolated backups

15–25% reduction; absence cited as refusal criterion by Aon

ASD Essential Eight ML2 evidence

15–30% reduction (Australian market specific)

ISO 27001 certification

Often enables waiving of detailed security questionnaire; 10–25% reduction

Annual revenue / policy limits

Proportional — higher limits attract higher premiums

Industry sector

Healthcare, financial services, legal attract higher premiums due to claim history

Prior claims history

Single claim increases premium 15–40%; multiple claims may restrict market access

Employee count

More staff = larger attack surface = higher premium at comparable security maturity

Previous security incidents

Undisclosed prior incidents are the second most common grounds for policy rescission

 

Australia’s Cyber Security Act 2024: What It Means for Insurance

Australia’s Cyber Security Act 2024 introduced mandatory ransomware payment reporting from 30 May 2025. Organisations with annual turnover exceeding $3 million must report any ransomware payment to the Department of Home Affairs within 72 hours — including the amount paid, attacker communications, and whether a third-party negotiator was involved. Failure to report carries penalties of up to $19,000.

This has two direct implications for cyber insurance. First, ransomware payments are now visible to government — a development that may influence regulatory action and insurer willingness to cover future payments. Second, the 72-hour reporting obligation means your incident response plan must explicitly address the reporting requirement — your insurer and their panel lawyers need to be involved in payment decisions before the clock runs out.

Additionally, APRA’s CPS 230 (Operational Resilience, effective July 2025) applies to all APRA-regulated entities — banks, insurers, and super funds — and cascades security obligations to their suppliers. For businesses in the financial services supply chain, the regulatory expectation around cyber insurance and security controls has raised significantly. Our guide to cyber risk management covers these regulatory obligations in detail.

 

Don’t Find Out Your Policy Is Worthless When You Actually Need It

The 40% claim denial rate is not a random statistic — it reflects a specific and preventable problem. Businesses that declare security controls on their insurance applications and then fail to maintain, document, or verify those controls are creating a policy that looks like a safety net but will fail at the moment of greatest need.

The solution is not complicated. It is implementing the right controls, maintaining them rigorously, and documenting everything in a format that an underwriter can verify. Businesses that do this consistently — as the Brisbane accounting firm in this guide demonstrates — get claims paid in full and see their premiums fall even after incidents.

At CodeHyper, we help Australian businesses implement and document the security controls that cyber insurance underwriters require — aligned to the ASD Essential Eight and built to produce the evidence trail that protects your policy at claim time. Our managed cybersecurity services cover MFA enforcement, EDR deployment, backup management, patch management, and the ongoing documentation that keeps your coverage valid.

Whether you’re preparing for a first cyber insurance application, facing a difficult renewal, or want to close the gaps before they become a claim problem — contact us today for a no-obligation cyber insurance readiness assessment.

 

Frequently Asked Questions: Cyber Insurance Requirements

What are the minimum requirements for cyber insurance in Australia in 2026?

While requirements vary by carrier and coverage level, the baseline controls assessed by Australian cyber insurance underwriters in 2026 are: MFA enforced on all email, remote access, cloud, privileged, and backup systems; EDR on all endpoints (servers, workstations, laptops, remote devices); immutable and isolated backups with documented restoration testing; a documented patch management programme; a written incident response plan; email authentication (SPF, DKIM, DMARC); regular security awareness training and phishing simulation; and privileged access management. Missing any of the first three — MFA, EDR, or tested backups — is likely to result in coverage denial or significant premium loading.

Why are so many cyber insurance claims being denied in Australia?

The leading cause of denied claims is failure to maintain the security controls declared on the insurance application — particularly MFA. Coalition’s 2024 data shows 82% of denied claims involved organisations without MFA fully implemented. The second most common cause is material misrepresentation: businesses that overstated their controls on the application, either intentionally or through incomplete understanding of what ‘fully implemented’ means to insurers. Other common denial grounds include missing notification windows, using unapproved vendors during incident response, and policy exclusions for specific attack types.

Can my cyber insurance policy be voided if I said I had MFA but didn’t fully implement it?

Yes. This has been tested and upheld in Australian and international courts. In the Travelers v International Control Services case, the insurer successfully rescinded an entire cyber policy after the business misrepresented its MFA coverage. The court found the misrepresentation was material — the policy would not have been issued on those terms had the truth been known. The business received nothing. The practical lesson: never overstate your controls on an insurance application. An honest application with documented gaps is manageable; a misrepresentation can void your entire policy at claim time.

Does the ASD Essential Eight help with cyber insurance?

Yes, significantly. Six of the eight Essential Eight controls map directly to the core controls Australian cyber insurance underwriters assess: MFA, application patching, OS patching, backup configuration, restricting administrative privileges, and application control. An organisation at Essential Eight Maturity Level 2 that documents its controls properly is well-positioned for cyber insurance underwriting. Organisations at ML2 typically report premium reductions of 15–30% compared to organisations with no documented security programme. See our Essential Eight checklist for a practical implementation guide.

Is antivirus enough for cyber insurance, or do I need EDR?

Antivirus alone is no longer sufficient for cyber insurance. Underwriters now require Endpoint Detection and Response (EDR) — a fundamentally different technology that provides continuous behavioural monitoring, automated threat response, and forensic logging capabilities that signature-based antivirus cannot match. Since 90% of ransomware attacks originate at endpoints, EDR coverage is a mandatory requirement for most Australian cyber insurance policies in 2026. Our EDR vs antivirus guide explains the technical differences and what insurers specifically require.

Does Microsoft 365 include cyber insurance-compliant backup?

No. Microsoft operates under a shared responsibility model — they maintain platform availability and infrastructure resilience, but they do not provide comprehensive backup of your data (email, SharePoint, OneDrive, Teams). Microsoft explicitly recommends third-party backup solutions for data protection. Cyber insurance underwriters are increasingly checking for independent Microsoft 365 backup coverage. A third-party Microsoft 365 backup solution — such as Datto SaaS Protection — is required to satisfy insurer requirements for email and cloud data backup.

What is the notification window for cyber insurance claims in Australia?

Most Australian cyber insurance policies require notification to the insurer within 24 to 72 hours of discovering a breach — not 24–72 hours after confirming it, but after initial discovery. In the chaos of a ransomware incident, this window can easily be missed if notification isn’t a mandatory step in your incident response procedure. Missing the notification window gives insurers grounds to reduce or deny coverage. Store your insurer’s claims notification number somewhere accessible without your computer — printed in your incident response plan and in your phone contacts.

How does ISO 27001 affect cyber insurance?

ISO 27001 certification provides independently audited, third-party-verified evidence of an information security management system — the highest quality of security assurance evidence available. Many Australian cyber insurance underwriters accept ISO 27001 certification in lieu of detailed security questionnaires. Certified organisations typically report premium reductions of 10–25% and significantly smoother underwriting processes. Additionally, ISO 27001’s governance requirements — incident response, security awareness, supplier management — cover the controls that the ASD Essential Eight doesn’t prescriptively address but insurers require.

What does Australia’s Cyber Security Act 2024 mean for cyber insurance?

The Cyber Security Act 2024 introduced mandatory ransomware payment reporting for Australian businesses with annual turnover over $3 million, effective 30 May 2025. Any ransomware payment must be reported to the Department of Home Affairs within 72 hours. This has two insurance implications: ransomware payments are now visible to government (potentially affecting insurer willingness to cover future payments), and your incident response plan must explicitly include the reporting obligation to ensure compliance within the 72-hour window — which requires your insurer to be engaged early in any ransomware incident.

How can CodeHyper help my business meet cyber insurance requirements?

CodeHyper implements and manages the security controls that Australian cyber insurance underwriters require — MFA enforcement via Microsoft Entra ID, EDR deployment through Microsoft Defender for Business, immutable backup configuration, patch management automation, and the ongoing documentation that proves compliance at renewal. We conduct cyber insurance readiness assessments that identify specific gaps against underwriter requirements and produce the documentation evidence that supports your application. Contact us today for a free cyber insurance readiness review tailored to your environment and insurer requirements.

Related Posts

10% Off Microsoft 365

Get a 10% discount on Microsoft 365 services for the first 3 months.*