Cyber Insurance Won’t Save You – This Checklist Will

Canadian businesses are buying cyber insurance like it’s a fire extinguisher: hang it on the wall, hope you never use it, and assume it works when the smoke hits. That belief is dangerous. Cyber insurance is not a safety net. It’s a control audit with a payout clause.

Hamilton, Ontario learned this the hard way. After a February 2024 ransomware incident, the City reported spending $18.3M on response and recovery – and later said its insurer denied reimbursement because required controls, like multi-factor authentication, weren’t fully in place. If a municipality can get clipped on eligibility, your SMB can too.

The myth to kill today: “If we’re insured, we’re covered.” Reality: you’re covered only if you can prove you operated the controls your policy required before the incident. Underwriters don’t pay for intentions. They pay for evidence. No logs, no proof, no payout.

Why this is happening now

Canada’s threat environment isn’t calming down. The National Cyber Threat Assessment 2025-2026 and the Cyber Centre’s Ransomware Threat Outlook 2025-2027 both highlight how persistent and disruptive ransomware remains for Canadian organizations. Insurers are reacting by turning renewal into a technical exam: MFA everywhere, hardened remote access, monitored endpoints, tested recovery, and an incident response plan.

That’s not insurers being “mean.” It’s insurers learning what attackers already know: most organizations fail in the boring middle – identity, visibility, and recovery discipline.

The insurance-grade security strategy (that also makes you harder to hack)

Below is the playbook we use at 010grp when we help Canadian clients become both insurable and resilient. Do all five, and you’re not just checking boxes – you’re shrinking your blast radius.

1) Convert your policy into a control map

Pull your application and policy wording and translate it into a simple table: requirement, system scope, owner, evidence. “MFA enabled” is meaningless. “MFA enforced for all admin and all remote access, including VPN, email, and privileged cloud roles” is testable.

Deliverable: an insurance controls register your team can defend in a call with an adjuster. And yes, auditors will ask for it too.

2) Fix identity first: make phishing boring

Most ransomware stories start with identity compromise, not Hollywood hacking. Enforce MFA properly (no exceptions for execs), disable legacy authentication, and tighten conditional access. Then stop feeding attackers passwords.

If you’re still living on passwords, read Stop Using Passwords: Your 30-Day Passkey Plan. If you’re on Microsoft 365, also lock down consent with That “Accept” Button Is a Breach.

3) Put EDR everywhere – and prove it

Underwriters increasingly ask for endpoint detection and response (EDR) and 24/7 monitoring. The trap is “we installed it” without full coverage, tamper protection, alert routing, and response playbooks.

Your evidence should include coverage reports and alerting configuration. If your environment has gaps (BYOD, kiosks, old servers), attackers will aim for those first – and insurers will notice.

4) Backups don’t count unless you can restore fast

“Backed up” is not the same as “recoverable.” Insurers care about immutable or offline copies, separation of duties, and tested restores. Your ransomware plan should answer one brutal question: how fast can you restore your most critical system to an acceptable point in time?

We’ve written about why your backups alone won’t save you from ransomware. Use that mindset: design for recovery, not hope.

5) Practice the first 72 hours, then document it

Claims go sideways when the response is chaotic. You need an incident response runbook that names decision-makers, vendors, communication steps, and legal and regulatory triggers. Then rehearse it.

If you’ve never run a tabletop, start with Breached? Do This in 72 Hours or Pay Twice and build a checklist your team can execute at 2 a.m.

What 010grp does differently

Insurance-grade security is measurable security. Our cyber protection services are built around continuous monitoring, risk assessment, and rapid recovery – not just tools. We help you implement controls, collect evidence, and keep it current, with Canadian data residency options and disciplined recovery.

The bottom line

Buy cyber insurance, yes. But treat it like a contract you must continuously earn. The organizations that get paid are the ones that can show, quickly and clearly, that their controls were real before the breach. Build that proof now, and you’ll be both tougher to hack and harder to deny.

Ready to pressure-test your insurability? Start with a risk assessment and control review through 010grp – and stop letting a checkbox decide your next fiscal year.