Sign in
HomeCybersecurityService CatalogCyber Insurance Ready
Solution Bundle · Micro-SMB · 1 to 50 employees

Everything your insurer requires. 30 days to compliant.

MFA, endpoint protection, tested backups, security awareness training, and a documented incident response plan — the five controls most insurers now mandate. Most Micro-SMB organizations are missing two or more when they apply.

One scoping call. One proposal. One team delivering all five controls in a single fixed-scope engagement.

Back to Service Catalog

Before your renewal

Is MFA enforced on every account, or just email?

Has a restore from your backups been tested and documented in the last 90 days?

Do you have a written incident response plan and has your team run through it?

Can you provide documented evidence of security awareness training for your insurer?

If your premium increases at renewal, do you know which missing controls are driving the cost?

What is in the Bundle

Five services. Every control your insurer requires.

Each service in this bundle maps directly to a control category on standard cyber insurance applications. Nothing extra. Nothing missing.

01

Managed Identity and Access

View full details →

Why insurers require it

MFA is the single most required control by cyber insurers. Without documented MFA on all accounts, most insurers will deny coverage or charge significantly higher premiums.

What it delivers

  • Phishing-resistant MFA across all access points

  • SSO for your core business applications

  • User provisioning and deprovisioning within the hour

02

Managed Endpoint Security

View full details →

Why insurers require it

EDR on every device is the second mandatory control. Insurers require documented endpoint protection with active monitoring, not just installed antivirus.

What it delivers

  • AV/EDR deployed and actively monitored across all devices

  • Automated patching so vulnerabilities are closed before they are exploited

  • Device encryption enforced and compliance evidence maintained

03

Security Awareness Training

View full details →

Why insurers require it

Documented phishing simulation and security awareness training is now a standard insurance requirement. Annual generic training no longer satisfies most carriers.

What it delivers

  • Ongoing phishing simulations based on current threat techniques

  • Targeted training for users who fail simulations

  • Compliance documentation produced automatically for insurance review

04

Managed Backup and Data Protection

View full details →

Why insurers require it

Insurers require documented backup procedures with tested restore capability and off-site or immutable copies. Untested backups do not satisfy the requirement.

What it delivers

  • 3-2-1 backup strategy enforced across all critical systems

  • Quarterly restore testing with documented results

  • Ransomware-resilient immutable backup copies maintained

05

Incident Response Planning

Why insurers require it

A documented and tested incident response plan is required by most insurers and is the control most organizations lack. Without it, insurers may deny claims even when other controls are in place.

What it delivers

  • IR plan documented and tailored to your environment

  • Response runbooks for ransomware, credential compromise, and data breach scenarios

  • Annual tabletop exercise with your team to test and validate procedures

Who This Is For

Any small business that needs cyber insurance or wants to keep it.

This bundle is relevant regardless of industry. Cyber insurance requirements apply across all sectors.

First-time insurance applicants

Applying for cyber insurance for the first time and need to demonstrate controls before the application is submitted.

Renewal with tightened requirements

Current policy is up for renewal and the insurer is now requiring MFA, EDR, tested backups, or documented training that was not required before.

Post-incident remediation

Had a breach or near-miss and the insurer requires documented controls before reinstating or renewing coverage.

Infrastructure refresh trigger

Upgrading network or endpoint infrastructure and want to use the transition to close security gaps at the same time.

Customer security questionnaires

Enterprise customers are now requiring documented security controls as part of vendor onboarding or contract renewal.

No dedicated IT security staff

Owner or office manager is responsible for security with no time or expertise to manage individual controls separately.

Common Questions

Before you ask — we have answered it.

Get insured. Stay insured.

One scoping call confirms what you have and what you need. We deploy and document all five controls in 30 days so you can apply or renew with confidence.

Fixed scope. One team. One proposal within 48 hours of your discovery call.

Back to Service Catalog