Cyber Insurance Application Checklist: What Agencies Need to Prepare
Complete checklist for digital agencies applying for cyber insurance. What insurers ask, security requirements, and how to get the best rates.

When our team first sat down to fill out a cyber insurance application, we expected something like a car insurance form—a few questions about our business, maybe a checkbox or two about security, and a quote at the end. What we actually encountered was closer to a security audit disguised as a questionnaire.
The application asked us to name the specific Endpoint Detection and Response (EDR) product deployed on our workstations, what percentage of our endpoints it covered, whether our backups were immutable, and how many employees had failed our last phishing simulation. We stared at each other across the conference table, realizing we didn't have half these answers ready.
That experience taught us something important: the cyber insurance application isn't just paperwork—it's the single biggest factor determining whether you get coverage, what you pay for it, and whether your policy actually responds when you need it. Every answer you give shapes your premium, your coverage terms, and your insurer's willingness to pay a future claim.
This guide walks through everything we learned preparing for our application—and everything we wish we'd known before we started. Whether you're applying for the first time or renewing an existing policy, this checklist will help you prepare the documentation, security evidence, and honest answers that lead to better coverage at lower cost.
If you're still evaluating whether your agency needs coverage in the first place, our complete guide to cyber insurance for digital agencies covers the fundamentals before you dive into the application process.
What Insurers Actually Ask (And Why the Questions Have Changed)
Cyber insurance applications have transformed dramatically over the past three years. The questionnaires our team encountered in 2025 bore almost no resemblance to the simple forms agencies filled out in 2021 or 2022.
The shift reflects hard lessons insurers learned from paying massive ransomware claims. Instead of asking whether your agency has "antivirus software," modern applications ask for the specific product name, what percentage of your endpoints it protects, how frequently it updates, and whether someone actively monitors its alerts. Instead of asking if you "have backups," carriers now want to know the specific backup technology you use, how many copies you maintain, whether those backups are tested regularly, where backup data is stored, who has administrative access, and whether backups can be accessed by administrators with compromised credentials.
Here's a breakdown of the major question categories we encountered across multiple carrier applications:
Access Control and Credential Management
Every application we completed started with questions about how our team accesses systems. Carriers want to know whether Multi-Factor Authentication (MFA) is implemented, where it's required (email, Virtual Private Network or VPN, privileged accounts, cloud platforms), what authentication methods you use, how many exceptions exist, and how those exceptions are managed.
Endpoint Protection
Applications distinguish between traditional antivirus software and EDR solutions. Carriers want to know the specific product, deployment percentage, and whether someone actively monitors alerts—not just whether the software is installed.
Backup Architecture
Backup questions have become extraordinarily specific. Carriers ask whether you follow the 3-2-1 rule or the stricter 3-2-1-1 model, whether at least one backup copy is immutable, how frequently you test restoration, and whether testing results are documented.
Security Awareness Training
Rather than asking whether your agency "conducts security training," carriers ask how frequently training occurs, what topics are covered, whether it's mandatory for all employees, what your phishing simulation click rates look like, and what happens when employees fail simulations.
Incident Response Planning
Applications ask whether you have a documented incident response plan, who's responsible for executing it, how frequently it's tested, and whether you've conducted tabletop exercises. For agencies with distributed teams across multiple time zones, carriers specifically ask about cross-border incident coordination.
Vulnerability Management
Carriers ask about scan frequency, whether scans are internal or external, how you prioritize remediation, and whether third-party rating services like BitSight, SecurityScorecard, or UpGuard have assessed your external security posture.
The depth of these questions caught our team off guard. But understanding what insurers ask—and why—is the first step toward preparing answers that earn you better rates. The sections that follow break down each major requirement area so you can prepare your documentation before you ever open the application.
Security Controls Insurers Require: The 2025 Baseline
The baseline security controls required for cyber insurance have hardened significantly. What carriers once considered "optional" or "best practice" controls are now mandatory prerequisites for coverage. When our team compared applications from multiple carriers, we found remarkable consistency in what they consider non-negotiable.
Here are the controls that virtually every carrier now requires:
- Multi-Factor Authentication on all email, VPN, and privileged access
- Endpoint Detection and Response on all servers and workstations
- Regular patch management with documented evidence of current patches
- Network segmentation isolating critical systems from general network traffic
- Data encryption for sensitive data both at rest and in transit
- Regular backups following the 3-2-1-1 standard with documented testing
- Employee security awareness training conducted at minimum annually with documented completion
- Incident response planning with tabletop exercise testing
Beyond these baseline requirements, carriers increasingly value advanced controls that can earn you premium discounts:
- Zero trust architecture requiring employees to authenticate for every system or application access
- Security Information and Event Management (SIEM) systems providing centralized logging and alerting
- Advanced email security including Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication, Reporting, and Conformance (DMARC) protocols
- Identity and Access Management (IAM) systems providing centralized control of user identities
For digital agencies specifically, carriers now expect controls addressing our unique operating environment. This includes multi-tenant security isolation if you use shared cloud infrastructure, third-party vendor risk management with documented security assessments, secure credential management using secrets management tools, and security monitoring specific to advertising platform integrations.
One critical point our team learned: carriers now require proof that security controls are actively deployed and functioning, not merely that they exist in theory. An agency that installed MFA six months ago but never enforced it across the organization faces the same underwriting risk as an agency with no MFA at all. Carriers increasingly ask for system exports showing MFA enforcement status, EDR console screenshots showing all endpoints reporting in, and configuration exports demonstrating active policies.
This shift means you can't just check boxes on the application—you need evidence ready to back up every answer. For a deeper look at what your policy actually covers once you're approved, see our guide to what cyber insurance covers.
The MFA Question: Why It's the Number One Factor
If there's one thing our team would tell every agency preparing for a cyber insurance application, it's this: get MFA deployed everywhere before you do anything else.
The absence of MFA on email, VPN, and privileged accounts is the leading reason cyber insurance applications are declined outright. This isn't a soft preference—it's a hard gate. Many carriers will not bind coverage until MFA is deployed across all critical access points.
And even if a carrier does offer coverage without full MFA deployment, the cost penalty is severe. Organizations that haven't implemented MFA on email, VPN, and privileged accounts face premium increases of 10-20 percent or higher. On a policy that might otherwise cost $2,000-$3,000 per year for a small agency, that's an extra $200-$600 annually—every year—for a control that costs relatively little to implement.
Here's what carriers specifically ask about MFA:
- Where is MFA required? Email, VPN, privileged accounts, cloud platforms, client-facing portals
- What authentication methods are used? Hardware tokens, authenticator apps, SMS (carriers view SMS-based MFA as weaker)
- How many exceptions exist? Any accounts exempt from MFA requirements
- How are exceptions managed? Whether exempted accounts have compensating controls
- What percentage of users have MFA enabled? Carriers want 100% enforcement, not 80%
When our team first checked our MFA deployment, we discovered that while most of our staff had MFA enabled on email, several service accounts and a handful of team members who'd joined during a busy period had slipped through without activation. Those gaps would have been flagged immediately during underwriting.
The fix was straightforward: we spent a single afternoon enforcing MFA across every account, documenting the enforcement in our identity management console, and taking screenshots showing 100% compliance. That afternoon of work likely saved us thousands of dollars in premium costs over the life of our policy.
Looking for a carrier that makes MFA verification easy? Coalition uses their Active Insurance platform to automatically verify MFA deployment and other security controls, which streamlined our application process significantly. Their platform detected our MFA status before we even submitted the application.
The bottom line: MFA deployment is the single highest-return investment you can make before applying for cyber insurance. It's the difference between approval and denial, and between affordable and expensive coverage.
Endpoint Protection and EDR Requirements
The second major area where our application answers directly affected our premium was endpoint protection. Carriers draw a sharp distinction between traditional antivirus software and Endpoint Detection and Response (EDR) solutions—and the premium difference is substantial.
Traditional antivirus relies primarily on signature-based detection, identifying known malware by matching files against a database of known threats. EDR goes further by providing behavioral anomaly detection, which means it can identify ransomware activity in its early stages—before encryption spreads to backups or causes widespread damage.
From an insurer's perspective, this distinction matters enormously. Organizations using traditional antivirus without EDR face significantly higher premiums, potentially 15-25 percent more than organizations with comprehensive EDR deployment. On a $5,000 annual policy, that's an extra $750-$1,250 per year.
Here's what carriers ask about endpoint protection:
- What specific product is deployed? They want the product name, not just "we have antivirus"
- Is it antivirus or EDR? The distinction directly affects your premium tier
- What percentage of endpoints are protected? Anything less than 100% raises flags
- Are alerts actively monitored? Having EDR installed but unmonitored provides limited value
- How frequently does the product update? Carriers want automatic, real-time updates
For our agency, switching from a basic antivirus solution to a managed EDR platform was one of the best investments we made before applying. The annual cost of the EDR subscription was less than the premium savings it generated—meaning the security upgrade effectively paid for itself through lower insurance costs.
Popular EDR solutions that carriers recognize and value include CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint, and Carbon Black. If you're a smaller agency, managed EDR services that bundle the software with 24/7 monitoring can be particularly cost-effective.
The key takeaway: don't just install endpoint protection—install the right kind. EDR is now the expected standard, and the premium penalty for using traditional antivirus alone makes upgrading a financially sound decision even before considering the actual security benefits.
Backup and Recovery Requirements
Backup questions on cyber insurance applications have become extraordinarily specific, and for good reason. Ransomware variants increasingly target backup systems specifically, making the architecture of your backup strategy a critical underwriting factor.
When our team reviewed the backup section of our application, we realized that simply saying "we back up our data" was nowhere near sufficient. Carriers now expect agencies to follow the 3-2-1-1 backup standard:
- 3 copies of your data
- 2 different media types (for example, local disk and cloud storage)
- 1 copy stored offsite (physically separate from your primary location)
- 1 copy that is immutable (cannot be modified or deleted even by administrators with full system access)
That last requirement—immutability—is the one that catches most agencies off guard. An immutable backup means that even if an attacker gains full administrative access to your systems, they cannot encrypt, modify, or delete that backup copy. This is critical because modern ransomware specifically targets backup systems, and attackers who compromise admin credentials can delete standard backups before deploying encryption.
Beyond the backup architecture itself, carriers ask detailed questions about testing:
- How frequently do you test backup restoration? Carriers expect monthly testing for critical systems and quarterly testing for all others at minimum
- Are test results documented? You need written records showing successful restoration dates and outcomes
- When was the last successful restore? If you can't provide a date within the past 90 days, expect follow-up questions
- Who has administrative access to backups? Carriers want to see restricted access with separate credentials from primary systems
For digital agencies specifically, carriers also probe regarding backup coverage of client-managed assets. If your agency stores client advertising account credentials or manages client data through your systems, carriers want confirmation that those credentials and associated data are properly backed up with appropriate access restrictions.
Our team's honest assessment when we first reviewed these questions: we had backups, but we hadn't tested restoration in months, our backups weren't immutable, and we couldn't produce documentation of any restore tests. We spent two weeks upgrading our backup architecture and running documented restore tests before submitting our application. That preparation directly contributed to a more favorable premium.
Inadequate backup testing is a significant underwriting red flag because it suggests the agency hasn't actually verified that backups can be restored, creating false confidence in recovery capability. When agencies indicate they maintain backups but cannot provide documentation of restore testing in the past 12 months, underwriters flag this as a potential control gap and may require immediate remedy before binding coverage.
Employee Training Requirements
Security awareness training questions have intensified substantially on modern cyber insurance applications. Our team discovered that carriers don't just want to know whether training happens—they want measurable proof that it works.
Here's what carriers now ask about employee training:
- How frequently does training occur? Annual is the minimum; quarterly is preferred
- What specific topics are covered? Phishing recognition, password hygiene, social engineering, data handling
- Is training mandatory for all employees? Voluntary training programs carry less underwriting weight
- What metrics demonstrate effectiveness? Carriers want phishing simulation results
- What are your phishing simulation click rates? Carriers increasingly expect click rates below 10 percent
- What remediation occurs when employees fail? Repeat training, additional simulations, manager notification
- What percentage of employees have completed training? Carriers increasingly require documented evidence that at least 90 percent of employees have completed security awareness training
That 90 percent completion threshold is important. Low security awareness training completion rates create a red flag during underwriting. When applications indicate that less than 80 percent of employees have completed annual training, underwriters typically require commitment to achieve higher completion rates before binding coverage. Agencies with less than 70 percent training completion rates may face coverage denial or substantial premium increases.
For our agency, implementing a structured training program with quarterly phishing simulations was relatively straightforward. Platforms like KnowBe4, Proofpoint Security Awareness, and Cofense offer affordable training programs designed for small to mid-size organizations. The key was documenting everything: completion certificates, test scores, simulation results, and remediation actions for employees who failed simulations.
One thing that surprised us: carriers don't just want to see that you train employees—they want to see that training improves over time. Showing that your phishing click rate dropped from 25 percent to 8 percent over six months demonstrates a security culture that underwriters value highly.
The investment in training pays dividends beyond insurance. Business Email Compromise (BEC) attacks targeting digital agency employees represent an elevated risk compared to many other industries, with funds transfer fraud claims representing approximately 29-39 percent of cyber insurance claims. Well-trained employees are your first line of defense against these attacks.
Email Security Requirements
Email security has become a dedicated section on most cyber insurance applications, reflecting the reality that email remains the primary attack vector for digital agencies. Our team found that carriers evaluate email security across multiple layers.
Authentication Protocols
Carriers now ask whether your agency has implemented the three core email authentication protocols:
- Sender Policy Framework (SPF): Specifies which mail servers are authorized to send email on behalf of your domain
- DomainKeys Identified Mail (DKIM): Adds a digital signature to outgoing emails, allowing recipients to verify the email hasn't been tampered with
- Domain-based Message Authentication, Reporting, and Conformance (DMARC): Builds on SPF and DKIM to provide instructions for handling emails that fail authentication checks
These three protocols working together significantly reduce the risk of email spoofing and phishing attacks. Carriers view their implementation as a baseline expectation, and their absence raises immediate underwriting concerns.
Advanced Email Security
Beyond authentication protocols, carriers value additional email security measures:
- Attachment sandboxing: Automatically detonating email attachments in an isolated environment to detect malicious behavior before delivery
- Behavioral analysis: Monitoring email patterns to detect anomalies that might indicate account compromise
- Link rewriting and scanning: Checking URLs in emails at the time of click, not just at delivery
- External email tagging: Flagging emails from outside the organization to help employees identify potential phishing attempts
For our agency, implementing SPF, DKIM, and DMARC was a technical but manageable project that our IT team completed in a single sprint. The advanced features came bundled with our Microsoft 365 E5 licensing, which we were already paying for but hadn't fully configured.
Email security matters particularly for digital agencies because our work involves constant email communication with clients, often including financial transactions, campaign approvals, and credential sharing. A compromised email account in an agency environment can lead to fraudulent invoices sent to clients, unauthorized campaign modifications, and credential theft—all scenarios that generate expensive insurance claims.
How Your Answers Affect Your Premium
Every answer on your cyber insurance application feeds into the carrier's risk model, directly influencing your premium calculation. Understanding this relationship helped our team prioritize which security investments to make before applying.
Here's a summary of how specific answers affect pricing based on what we learned across multiple carrier applications:
| Security Control | Impact If Missing or Weak |
|---|---|
| MFA not deployed on email/VPN/privileged accounts | 10-20% premium increase or outright denial |
| Traditional antivirus instead of EDR | 15-25% premium increase |
| No documented backup testing | Coverage may be conditional on remediation |
| Training completion below 80% | Premium increase or required remediation commitment |
| No incident response plan | Premium increase; some carriers require before binding |
| End-of-life operating systems (e.g., Windows 10 post-October 2024) | Coverage decline or immediate upgrade requirement |
| Poor external security rating (BitSight/SecurityScorecard) | Significant underwriting complications |
| No email authentication (SPF/DKIM/DMARC) | Premium increase reflecting elevated BEC risk |
The cumulative effect is significant. An agency that applies with strong security controls across all categories might pay $2,000-$3,000 annually for a $1 million policy. The same agency with gaps in MFA, EDR, and backup testing could face quotes of $4,000-$6,000 or higher—if they receive a quote at all.
This is why preparation matters so much. The weeks you invest in strengthening your security posture before applying can translate directly into thousands of dollars in annual premium savings. For detailed pricing breakdowns by agency size and risk profile, our cyber insurance cost guide provides comprehensive benchmarks.
Want to see how your security posture affects your estimated premium? Our recommendation engine walks you through a quick assessment and provides personalized carrier recommendations based on your agency's specific profile.
Documentation to Prepare Before Applying
The most successful cyber insurance applications result from thorough preparation. Our team learned this the hard way—scrambling to gather documentation mid-application slowed us down and created unnecessary stress. Here's the complete documentation checklist we now recommend:
Security Control Evidence
- MFA management console screenshots showing which systems require MFA and what percentage of users have it enabled
- EDR console status reports showing which endpoints are protected and when protection was last updated
- Patch management reports showing current patch status across critical systems
- Backup system documentation showing architecture, frequency, retention, and most recent successful restore dates
- Vulnerability scan reports from recent scans (within the past 30 days for the strongest application)
- Network diagrams showing data flows and network segmentation
Security Policies and Procedures
- Information security policy
- Acceptable use policy
- Data classification policy
- Incident response plan
- Backup and disaster recovery plan
- Vendor risk management procedures
- Employee security awareness training curriculum
An important insight from our experience: this documentation does not need to be elaborate or lengthy. Carriers care more about existence and clarity than formatting. A one-page incident response plan that clearly specifies notification procedures and response team contacts often carries more underwriting weight than a 50-page document that lacks clear decision-making authority.
Data Handling Documentation
For digital agencies managing client data, documentation regarding data handling practices proves particularly valuable:
- Data classification policy describing how your agency categorizes data (client personal information, client payment information, agency proprietary information)
- Retention policies specifying how long different data types are retained
- Deletion procedures ensuring secure data destruction
- Audit trail documentation showing who accessed what data and when
Third-Party Assessments and Certifications
If your agency maintains any of the following, compile the documentation:
- SOC 2 Type II certification: Carries significant weight because it represents independent third-party verification of security controls tested over a 6-12 month period, not merely self-reported at a point in time
- ISO 27001 certification: International standard for information security management
- Recent penetration test results: Independent assessment of your security posture
- Security audit reports: Any third-party evaluation of your controls
Business Information
- Current employee headcount
- Recent revenue figures
- Employee breakdown by role (technical staff, sales, account management, creative)
- List of critical SaaS platforms and vendors
- Client data volume estimates (err toward overestimating)
Gathering this documentation before you start the application transforms a stressful, multi-week process into a straightforward exercise. Our team now maintains a "cyber insurance folder" that we update quarterly, so renewal applications take hours instead of days.
Common Application Mistakes That Cost You Money
Digital agencies frequently make systematic errors on cyber insurance applications that increase premiums substantially or trigger denial entirely. Our team has seen these mistakes firsthand—and made a few of them ourselves early on.
Mistake 1: Misrepresenting Security Control Deployment
The most common and most dangerous error involves overstating the scope of security control deployment. An agency that implements MFA for only 50 percent of staff but indicates "yes" when asked if MFA is implemented creates a misrepresentation that can justify coverage denial if a claim later reveals gaps.
Carriers now verify MFA deployment through independent external scanning and comparison with application responses, catching discrepancies that trigger rescission review. Rather than claiming full deployment when implementation is incomplete, indicate partial deployment and explain your remediation timeline. Demonstrating a proactive security improvement trajectory is far better than getting caught in an overstatement.
Mistake 2: Underestimating Data Volumes
Digital agencies often retain more data than they realize—sample data from client campaigns, test accounts containing simulated customer information, archived communications. When asked how many individuals' personal information is stored in your systems, many agencies initially underestimate.
Carriers discover these discrepancies through questionnaire follow-ups or independent assessment, and the gap between reported and actual data volumes prompts scrutiny of every other application answer. Always err toward overestimating rather than underestimating data volumes, and be prepared to explain why particular data is retained.
Mistake 3: Omitting Incident History
If an application asks whether your agency has experienced any cyber incidents in the past five years, disclose everything—even incidents that seem minor or resolved quickly. If your agency experienced a ransomware attack three years ago and paid the ransom without involving law enforcement, omitting that incident from your application creates grounds for coverage rescission on any future claim, even an unrelated one.
Carriers can and do rescind coverage when they discover applicants failed to disclose known incidents. Honest disclosure of past incidents, combined with documentation of improvements made afterward, is always the better strategy.
Mistake 4: Inaccurate Vendor Security Claims
When applications ask whether critical vendors maintain cyber insurance and what their security certifications are, agencies frequently provide information they haven't actually verified. Carriers now audit vendor information by requesting independent vendor attestation or security questionnaires.
Only represent information you have actually verified through direct communication with vendors or review of vendor documentation. If you haven't verified a vendor's security posture, say so—and use the application process as motivation to start vendor security assessments.
These mistakes don't just affect your initial application. Misrepresentations discovered during a claim can void your coverage entirely, leaving your agency exposed at the worst possible moment. For a detailed look at how the claims process works and what can go wrong, see our guide to filing a cyber insurance claim.
Underwriting Red Flags for Digital Agencies
Beyond common mistakes, certain characteristics of digital agencies create specific underwriting red flags that carriers watch for. Understanding these flags helps you address them proactively in your application.
High Employee Turnover Without Automated Deprovisioning
Digital agencies typically experience higher than average employee turnover, particularly among junior creative and account coordination roles. When employees leave, whether their access credentials are properly deprovisioned becomes a critical underwriting question.
Agencies with annual turnover exceeding 25 percent but without automated access deprovisioning processes create elevated risk that former employees retain access to systems. Underwriters flag this scenario frequently. If your agency has high turnover, document your offboarding process and demonstrate automated deprovisioning through your identity management system.
End-of-Life Operating Systems
As of October 2024, Windows 10 reached end-of-life, meaning Microsoft discontinued security update support. When agencies indicate they still use Windows 10, carriers immediately flag this as a policy violation and either decline coverage or require an immediate upgrade commitment.
Many agencies running older laptops for creative work still use Windows 10 without realizing that continued use after end-of-life violates most cyber insurance policies. Audit your device inventory and upgrade or replace any systems running unsupported operating systems before applying.
Cloud-Native Workflows Without Identity Management
Many digital agencies operate almost exclusively through Software as a Service (SaaS) platforms—email via Microsoft 365, project management via Asana or Monday.com, design tools via Adobe Creative Cloud, and advertising platforms via Google Ads and Meta Business Suite. Agencies that use cloud-native workflows but lack centralized identity management appear to underwriters as high-risk.
Without proper identity governance, access accumulates across platforms as employees change roles or leave the organization. Implement centralized identity management (even a basic solution like Google Workspace or Microsoft Entra ID) and demonstrate that you have visibility into who has access to what across your SaaS stack.
Inadequate Vendor Risk Management
Digital agencies increasingly rely on freelance vendors, subcontractors, and specialized service providers. These third-party relationships create cyber risk that extends beyond your direct control. Carriers frequently exclude or limit coverage for losses arising from third-party breaches unless the policy includes specific vendor compromise coverage.
Document your vendor risk management process, including security questionnaires you send to vendors, contractual requirements for vendors to maintain cyber insurance, and notification requirements if vendors experience incidents. Even a basic vendor assessment process demonstrates risk awareness that underwriters value.
Addressing these red flags before applying doesn't just improve your chances of approval—it strengthens your actual security posture. For a broader assessment of whether your agency's risk profile warrants coverage, our need assessment guide walks through the evaluation process.
Application Process by Provider: How They Differ
Not all cyber insurance applications are created equal. Our team applied with multiple carriers and found significant differences in process, depth, and speed. Here's what we learned about how major providers approach the application differently.
Coalition
Coalition takes a technology-first approach to underwriting. Their Active Insurance platform automatically scans your external security posture before you even complete the application, using their Coalition Control platform to assess your domain's email authentication, exposed services, and known vulnerabilities. This means they often know your security posture before you tell them about it.
Application experience: Streamlined digital application with automated security assessment. Many questions are pre-populated based on their external scan results. The process felt faster than traditional applications because their technology did much of the assessment work automatically.
Best for: Agencies that have strong security controls and want a carrier that recognizes and rewards good security hygiene through technology rather than just questionnaires.
Hiscox
Hiscox offers one of the more straightforward application processes for smaller agencies. Their questionnaire is comprehensive but not overwhelming, and they've designed the process for business owners who may not have dedicated IT security staff.
Application experience: Online application that can be completed in one sitting if documentation is prepared. Clear questions with helpful explanations. Quotes are often available quickly for straightforward applications.
Best for: Smaller agencies (under 50 employees) looking for a streamlined process with competitive pricing. See our Coalition vs Hiscox comparison for a detailed breakdown of how these two carriers stack up.
Embroker
Embroker positions itself as a tech-industry specialist, which means their application questions are tailored for companies like digital agencies. They understand SaaS dependencies, cloud-native workflows, and the specific risks of managing client digital assets.
Application experience: Digital-first application with industry-specific questions. Their platform provides real-time feedback on how your answers affect coverage options. The process felt like it was designed by people who understand how tech companies actually operate.
Best for: Mid-size agencies that want a carrier with deep understanding of technology company risk profiles.
Not sure which carrier is right for your agency? Our provider comparison evaluates six major carriers across pricing, coverage, claims experience, and application process to help you choose.
Regardless of which carrier you choose, the preparation checklist in this guide applies universally. Strong documentation and honest answers improve your outcome with every provider.
Understanding Policy Terms That Affect Your Application
Before you submit your application, it's worth understanding several policy terms that directly connect to your application answers. These terms determine whether your coverage actually responds when you need it.
The Security Failure Exclusion
Many policies include a "security failure" exclusion that voids coverage for losses caused by failure to maintain required security controls. If your policy requires MFA on email and your agency experiences a BEC attack through a compromised email account where MFA wasn't deployed, the carrier may decline coverage on grounds that the loss resulted from a security failure.
This means your application answers aren't just about getting approved—they're setting the security standards your agency must maintain throughout the policy period. Only commit to controls you can actually maintain consistently.
Retroactive Dates
Policies include a "retroactive date" restricting which incidents can be claimed. If you're switching carriers, ensure there's no gap between your old policy's retroactive date and your new policy's retroactive date. An incident occurring during a gap period may not be covered by either policy.
Known Loss Exclusion
This exclusion prevents coverage for losses arising from incidents you were aware of when the policy started but didn't disclose. This is why honest incident disclosure on your application is so critical—undisclosed incidents can void coverage for completely unrelated future claims.
Business Interruption Waiting Periods
Many business interruption endorsements include 6-12 hour waiting periods before coverage begins. Understanding whether your waiting period is a "time-based retention" (first 6-12 hours not covered) or a "qualifying period with retroactive retention" (once satisfied, coverage applies from the beginning) affects your claim value substantially.
These policy terms reinforce why application accuracy matters. Every answer you provide becomes part of the contractual foundation of your coverage.
Your Pre-Application Checklist: The Complete Actionable Summary
Here's the consolidated checklist our team now uses before every cyber insurance application and renewal. Work through this list systematically, and you'll be prepared to complete any carrier's application confidently.
4-6 Weeks Before Applying
- Deploy MFA on all email, VPN, privileged accounts, and cloud platforms—verify 100% enforcement
- Upgrade to EDR if still using traditional antivirus—ensure all endpoints are reporting
- Implement 3-2-1-1 backup standard with at least one immutable backup copy
- Run backup restoration tests and document results with dates and outcomes
- Update all operating systems—replace or upgrade any end-of-life systems (Windows 10 post-October 2024)
- Implement SPF, DKIM, and DMARC email authentication protocols
- Complete employee security training and achieve 90%+ completion rate
- Run phishing simulations and document results (target below 10% click rate)
2-3 Weeks Before Applying
- Gather security control screenshots: MFA console, EDR dashboard, patch status, backup configuration
- Compile security policies: Information security, acceptable use, data classification, incident response
- Document vendor security assessments for critical third-party providers
- Prepare data inventory: Types of data stored, volume estimates (overestimate), retention policies
- Collect certifications: SOC 2, ISO 27001, penetration test results, audit reports
- Review incident history: Compile honest disclosure of all incidents in past five years
- Run vulnerability scan and document results (within 30 days of application)
1 Week Before Applying
- Verify employee count and revenue figures are current
- Confirm all security controls are actively enforced (not just installed)
- Check external security ratings on BitSight, SecurityScorecard, or UpGuard
- Review offboarding procedures and verify no former employees retain access
- Prepare network diagram showing segmentation and data flows
- Brief your team: Ensure whoever completes the application has access to all documentation
During the Application
- Answer honestly—partial deployment is better than false claims of full deployment
- Overestimate data volumes rather than underestimate
- Disclose all incidents regardless of severity or resolution
- Only claim verified vendor security information
- Attach supporting documentation where the application allows uploads
- Note remediation timelines for any controls not yet fully deployed
This checklist represents everything our team has learned through multiple application cycles. Following it systematically transforms the application from a stressful scramble into a confident, well-documented process that earns you better coverage at lower cost.
Summary
Preparing for a cyber insurance application is fundamentally about two things: strengthening your actual security posture and documenting that posture thoroughly enough to prove it to underwriters.
We started this guide by explaining how modern cyber insurance applications have evolved from simple questionnaires into detailed security assessments. Carriers now ask granular questions about specific products, deployment percentages, and documented evidence—not just whether controls exist in theory.
From there, we walked through the baseline security controls every carrier requires in 2025, with MFA standing as the single most important factor. The absence of MFA on email, VPN, and privileged accounts remains the leading reason applications are declined, and organizations without it face 10-20 percent premium increases even when coverage is offered.
We covered the specific requirements for endpoint protection (EDR over traditional antivirus, with a 15-25 percent premium difference), backup architecture (the 3-2-1-1 standard with immutable copies and documented restoration testing), employee training (90 percent completion rates and phishing click rates below 10 percent), and email security (SPF, DKIM, and DMARC as baseline expectations).
We then explained how every application answer feeds directly into your premium calculation, why documentation preparation before applying saves time and money, and the common mistakes that cost agencies thousands in unnecessary premiums or result in outright denial.
We identified the underwriting red flags specific to digital agencies—high turnover without automated deprovisioning, end-of-life operating systems, cloud-native workflows without identity management, and inadequate vendor risk management—and explained how to address each one proactively.
Finally, we compared how major providers approach the application process differently and provided a complete, actionable pre-application checklist organized by timeline.
The investment you make in preparation pays dividends in three ways: lower premiums, broader coverage, and confidence that your policy will actually respond when you need it. Take the time to prepare properly, answer honestly, and document everything. Your future self—facing a claim and needing your insurer to pay—will thank you.
Ready to find the right carrier for your agency? Start with our recommendation engine to get personalized carrier suggestions based on your agency's size, security posture, and coverage needs. Or explore our complete provider comparison to evaluate your options side by side.
Sources
- IBM Cost of a Data Breach Report, 2024
- Verizon Data Breach Investigations Report (DBIR), 2024
- Coalition Cyber Claims Report, 2024
- Hiscox Cyber Readiness Report, 2024
- National Institute of Standards and Technology (NIST) Cybersecurity Framework
- Cybersecurity and Infrastructure Security Agency (CISA) MFA Guidelines
- SANS Institute Security Awareness Training Resources
- BitSight, SecurityScorecard, and UpGuard External Rating Methodologies
- SOC 2 Type II Reporting Standards (AICPA)
- Microsoft End-of-Life Product Lifecycle Documentation
The AgencyCyberInsurance Team
We’re a team of digital agency operators who’ve been through the process of researching, comparing, and purchasing cyber liability insurance for our own agencies. We share what we’ve learned to help fellow agency owners make informed decisions about protecting their businesses.
Stay Protected, Stay Informed
Get our latest cyber insurance guides, policy comparisons, and risk management tips delivered to your inbox.
No spam. Unsubscribe anytime. We respect your privacy.
Related Articles

Cyber Security Audit Checklist for Digital Agencies (Pre-Insurance)
Complete security audit checklist for digital agencies preparing for cyber insurance. Covers MFA, EDR, backups, compliance frameworks, and premium reduction strategies.

How to File a Cyber Insurance Claim: Step-by-Step Guide for Agencies
Step-by-step guide to filing a cyber insurance claim for digital agencies. Documentation, timelines, common mistakes, and working with breach counsel.

How to Reduce Your Cyber Insurance Premiums: 12 Proven Strategies
12 proven strategies to reduce cyber insurance premiums for digital agencies. Security controls, bundling, deductible optimization, and negotiation tactics.