Cybersecurity: 24/7/365

A ransomware attack hits your practice on a Tuesday morning. Your EHR is locked. Patient records are inaccessible. The attackers want $500,000. Your staff can't check in patients, process claims, or access lab results. Every hour costs you revenue, and HIPAA requires you to notify every affected patient.
Without cyber insurance, you pay for all of it — the forensic investigation, the legal counsel, the breach notifications, the credit monitoring, the lost revenue, and possibly the ransom. With the right policy, your insurer covers most of those costs and connects you with a response team within hours.
This guide walks you through what cyber insurance covers, what it costs, what insurers require from your practice, and how to avoid the mistakes that leave 74% of small businesses underinsured.
Cyber insurance splits into two categories: first-party coverage (your direct costs) and third-party coverage (your liability to others).
Incident response and forensics. When a breach happens, your insurer deploys a response team — IT forensics consultants who determine what happened, how the attackers got in, and what data was affected. This alone can cost $50,000 to $200,000 without insurance.
Breach notification. HIPAA requires you to notify every affected individual within 60 days of discovering a breach. That means letters, call centers, and credit monitoring services. For a practice with 10,000 patient records, notification costs alone can exceed $100,000.
Ransomware negotiation and payment. Most policies cover professional ransom negotiation and, where legal, the ransom payment itself. Healthcare ransomware losses averaged $2 million per incident in 2025 — nearly triple the $705,000 average from 2024.
Business interruption. Lost revenue during downtime is covered, typically after a waiting period (often 8-12 hours). Claims that include business interruption cost 650% more than those without — which tells you how expensive downtime really is. If your EHR goes down for two weeks, the lost revenue can exceed the cost of the attack itself.
Data restoration. Recovering or rebuilding corrupted patient data, reconfiguring systems, and verifying data integrity after an incident.
Legal defense. Lawsuits from patients whose data was exposed. Class actions following healthcare breaches are increasingly common.
Regulatory defense and fines. Legal costs for defending against OCR investigations and, where legally insurable, HIPAA fines. HIPAA penalties range from $25,000 to $3 million per violation category — regulatory defense coverage is not optional for medical practices.
Settlements. Payments to affected patients from lawsuits or regulatory actions.
Understanding exclusions is just as important as understanding coverage. These are the gaps that catch practices off guard:
Unpatched systems. If the attack succeeded because you ignored a known vulnerability, your insurer can deny the entire claim. Insurers check. Some carriers scan your network externally before and after incidents.
Misrepresented security controls. If your application says MFA is deployed everywhere but it isn't, the insurer can deny your claim for material misrepresentation. About 40% of cyber insurance claims were denied in 2024 — misrepresentation and inadequate security were the top reasons.
Social engineering (often excluded by default). Business email compromise (BEC) and wire fraud are among the most common attacks on medical practices. Many policies exclude social engineering unless you add it as an endorsement. Ask for it specifically — a $250,000 sublimit is a reasonable starting point.
State-sponsored attacks. Losses from cyberattacks attributed to nation-states may be excluded under "acts of war" clauses. Lloyd's of London mandated these exclusions across its market, and the definition of what counts as state-sponsored is still evolving.
Prior known incidents. Any breach or vulnerability you knew about before the policy started is excluded.
Bodily injury. If a cyberattack causes a medical device failure that harms a patient, your cyber policy probably won't cover the bodily injury claim. That falls to your malpractice insurance.
For a small medical practice with 1-20 providers, expect to pay $2,000 to $3,500 per year for a standalone cyber insurance policy with $1 million per-claim limits. Healthcare practices pay more than other small businesses because of the sensitivity of patient data and HIPAA requirements.
Premium factors that affect your rate:
After steep increases from 2021 to 2023 (some practices saw premiums double at renewal), the market softened in 2024-2025. Premiums dropped about 11% on average in 2025. But early 2026 indicators show rates stabilizing, with a projected 15-20% increase as reinsurance costs rise and ransomware severity climbs.
The recommended coverage level for a medical practice handling PHI is $2 million to $5 million. A typical cyber claim against a small business averages $264,000, but healthcare breaches run much higher — the average healthcare data breach cost $7.42 million in 2025. Even a small practice can face six-figure costs from forensics, notification, legal defense, and lost revenue. If your malpractice insurance includes a cyber "endorsement" or rider, check the limits carefully — those riders typically cap at $25,000 to $100,000, which covers almost nothing in a real incident.
The days of answering seven questions and getting a quote are over. Cyber insurance applications now read like security audits — 10 or more pages of detailed questions about your infrastructure, policies, and practices. Here is what every major carrier expects:
Every carrier requires MFA on remote access, email, and admin accounts. SMS-based MFA is no longer sufficient — insurers want app-based authenticators or hardware tokens. Coalition reports that 82% of denied claims involved organizations without proper MFA. If you haven't deployed MFA yet, start there — it affects both your insurability and your defense against the most common attack vectors.
Traditional antivirus no longer qualifies. Insurers require EDR or managed detection and response (MDR) tools like CrowdStrike, SentinelOne, or Microsoft Defender for Endpoint. These tools monitor for suspicious behavior in real time, not just known malware signatures.
Carriers want to see a 3-2-1 backup strategy: three copies of your data, on two different media types, with one stored offsite (or in the cloud). Backups must be encrypted and tested regularly. "We back up to an external drive" is not sufficient — that drive is often connected to the same network the ransomware encrypts. Proper backup and disaster recovery planning is both an insurance requirement and a business survival strategy.
Insurers ask how quickly you apply security patches, especially critical ones. If a breach traces back to a known, unpatched vulnerability, your claim is at risk. Managed IT providers handle this automatically — break-fix shops typically do not.
Documented security awareness training with phishing simulations is now a standard requirement. "We told everyone to be careful" does not count. Carriers want proof: training platform records, completion certificates, phishing test results.
A written, tested incident response plan that covers who does what during a breach, how you notify patients and regulators, and how you restore operations. Some carriers require proof that you've conducted tabletop exercises.
Applications ask directly: "Is the applicant in compliance with HIPAA?" Practices without a current HIPAA risk assessment may be denied coverage entirely. HIPAA compliance doesn't just keep you out of trouble with OCR — it directly affects your ability to get insured and your premium rate.
Here is what to expect when you apply:
Be honest on the application. If you claim controls are in place when they are not, you risk having every future claim denied. It is better to acknowledge a gap and show a remediation timeline than to misrepresent your security posture.
Every security control that insurers require is something your IT provider should already be delivering. Here is how we make sure your practice is insurable — and stays that way:
Managed IT & Monitoring: We deploy and manage MFA, EDR, encrypted backups, and automated patch management across your practice. When your insurer asks whether critical patches are applied within 15 days, the answer is yes — with logs to prove it. Managed IT makes insurance compliance automatic, not a scramble before renewal.
Cybersecurity & vCISO Services: Our vCISO service provides the security leadership insurers expect — risk assessments, penetration testing, vulnerability scanning, and incident response planning. We produce the documentation carriers ask for during underwriting and renewal.
HIPAA Compliance: We maintain your HIPAA risk assessment, security policies, and staff training records. When the application asks "Are you HIPAA compliant?" you can answer yes with confidence.
AI & Automation: Automated security monitoring, threat detection, and compliance reporting reduce the manual work of maintaining the controls insurers require. AI-powered alerting catches suspicious activity before it becomes a claim.
See our pricing plans — every tier includes the security controls that cyber insurers require.
If you don't have cyber insurance, get it now — before the 2026 premium increases hit. If you already have it, review your policy before your next renewal. Here is a quick checklist:
Cyber insurance is not a substitute for security. It's a safety net that works best when you have strong controls underneath it. The practices that pay the lowest premiums and get their claims paid are the ones that take security seriously every day — not just at renewal time.
Schedule a free consultation to review your security controls and make sure your practice is insurable — at the best possible rate.