Law Firm Cyber Insurance in 2026: The Underwriting Checklist That Decides Whether a Claim Gets Paid
Alexander Sverdlov
Security Analyst

Key Takeaways
- A cyber insurance application is an underwriting questionnaire that doubles as a warranty. Inaccurate answers do not just embarrass you later; they give the carrier a clean reason to deny the claim or rescind the policy.
- Carriers now treat multi-factor authentication, endpoint detection and response, tested offline backups, and email filtering as table stakes. A firm that cannot attest to all four is increasingly uninsurable at a reasonable price.
- The coverage that matters most to law firms is often the most restricted: social engineering and funds transfer fraud are usually written as a sublimit far below the headline policy limit.
- Cyber insurance and ABA Model Rule 1.6 solve different problems. Insurance transfers financial loss; it does not transfer the ethical duty to make reasonable efforts to protect client information.
- The single highest-leverage move before a renewal is an independent security review that lets you answer every application question accurately and, where needed, lets you fix the gap before you sign.
- Premium is negotiable through evidence. Firms that document their controls and hand the underwriter a clean assessment routinely secure better terms, higher sublimits, and lower retentions than firms that submit a bare application.
A managing partner of a fourteen-attorney firm forwarded us her cyber insurance renewal packet in the spring. Her voice on the call had the particular tightness of someone reading a document she thought she understood and discovering she did not.
Three things had changed since the prior year. The premium had nearly doubled. The coverage for ransomware was now capped at half of the headline policy limit rather than the full amount. And there was a new sentence, set in the same plain type as everything around it, stating that coverage for any loss involving email compromise would not apply unless multi-factor authentication was enforced on all email accounts at the time of the loss. She had signed last year's application in about four minutes between two client calls. She had ticked the box that said the firm enforced multi-factor authentication everywhere. It did not. It enforced it for the two partners who had asked for it.
Her two questions were the right ones. Was the renewal quote a fair price for what it covered? And, more urgently, if something happened next week, was the firm actually covered today? The honest answer to the second question was that the policy she was holding had a defensible path to paying nothing at all, because the firm did not run the controls the firm had told the carrier it ran.
This article is the long version of the conversation that followed. It is written for the people who actually make this decision at a law firm, the managing partner and the firm administrator, not for an IT specialist. By the end you will be able to read a cyber policy, fill in an application without quietly creating grounds for denial, and walk into a renewal with the evidence that turns a hardening quote into a competitive one.
Step One
What a Law Firm Cyber Policy Actually Covers
Before you can judge a quote, you have to know what you are buying. A cyber insurance policy is not one thing. It is a bundle of distinct coverages, and a law firm cares about some of them far more than a manufacturer or a retailer would. The bundle splits cleanly into two halves: coverage for losses the firm suffers directly, called first-party coverage, and coverage for claims other people bring against the firm, called third-party coverage.
First-party coverage is the money that flows to the firm. It pays the incident response bill: the forensic investigators who work out what happened, the lawyers who advise on notification duties, the public relations help if the matter becomes public. It pays for restoring data and rebuilding systems. It covers business interruption, the revenue the firm loses while its systems are down, which for a firm that bills by the hour is a real and measurable number. It covers cyber extortion, the ransom and the negotiation around it. And it covers funds transfer fraud, the money that leaves the firm because someone was deceived into sending it.
Third-party coverage is the money that flows to other people because of something that happened at the firm. It covers privacy liability, claims by clients and others whose information was exposed. It covers network security liability, claims that the firm's compromised systems caused harm to someone else. It covers regulatory defense, the cost of responding to a state attorney general or a data protection regulator. For a law firm there is one more category that general policies often omit and that a firm should specifically ask for: coverage for the cost of defending a bar complaint or disciplinary proceeding that arises out of a security incident.
Two practical points follow from this map. First, the headline number on a quote, the policy limit, tells you almost nothing on its own. A one million dollar policy where ransomware is capped at five hundred thousand and funds transfer fraud is capped at one hundred thousand is a very different product from a one million dollar policy without those caps. You have to read the sublimits, and you have to read them against the losses your firm is actually exposed to.
Second, a law firm's risk profile is not generic. A firm that handles real estate closings, estate distributions, or litigation settlements moves other people's money, which raises the funds transfer fraud exposure sharply. A firm with a large personal injury or family law practice holds unusually sensitive personal records, which raises the privacy liability exposure. A firm doing transactional and intellectual property work holds material non-public business information, which raises both the value of the data to an attacker and the stakes of a confidentiality failure. Underwriters know all of this, and they price it. Knowing it yourself is how you make sure the policy you buy is shaped like the firm you actually run.
Step Two
The Application Is a Warranty, Not a Form
Lawyers, of all people, should read a cyber insurance application the way they would read a contract their client was about to sign. It is one. The questions about your security controls are not a survey for the carrier's records. They are representations the firm is making, and the policy is priced and issued in reliance on them. When a claim arrives, the carrier's first move is to pull the application and compare what the firm said it did against what an investigation shows it actually did. A material gap between the two is the cleanest defense an insurer has.
The market reached this point for a reason. The cyber insurance market hardened sharply between 2021 and 2023 as ransomware losses outran premium income. Carriers responded by tightening two things at once: the controls they require before they will write a policy at all, and the precision of the language that links those controls to whether a claim pays. The result is that the modern application is short, specific, and unforgiving. A handful of questions now function as gatekeepers. If you cannot answer them with an honest yes, you are either uninsurable at a sensible price or you are buying a policy with a hole in it exactly where you will one day need it.
The controls below are the ones that recur on nearly every application a law firm will see. Treat the list as the minimum you must be able to attest to truthfully. If any line is a no today, that line is your renewal project.
Notice what these eight controls have in common. None of them is exotic. Most of them are settings inside software the firm already pays for: the practice-management suite, the Microsoft 365 or Google Workspace subscription, the device management the firm's IT provider already administers. The reason firms still fail to attest to them is rarely cost. It is that nobody at the firm has been made responsible for confirming that the control is on, everywhere, with no quiet exceptions for the senior partner who finds the second login prompt annoying.
The partner exception is the most expensive habit in the firm
When a firm enforces multi-factor authentication for everyone except the three partners who pushed back, two things are now true. The partners are the highest-value targets in the building, holding the most sensitive matters and often the trust account authority, and they are the accounts least protected. And the application the firm signed says multi-factor authentication is enforced firm-wide. The firm has bought, at full price, a policy with a defect aimed precisely at the account most likely to be attacked. The fix is a management decision, not a technical one.
If you take one idea from this section, take this: never let anyone sign a cyber application from memory or from optimism. Each control question should be confirmed by someone looking at the actual configuration, the actual list of accounts, the actual backup job and its last successful restore. That confirmation is a morning of work. It is also the difference between a policy that pays and a policy that funds a coverage dispute.
Step Three
The Five Things That Get a Law Firm's Claim Denied
A cyber policy is most likely to disappoint a firm not because the firm bought too little coverage, but because the firm did something, or failed to do something, that gave the carrier a way out. These five patterns account for the great majority of disputes a small or mid-size firm will ever have with its cyber insurer. Each one is avoidable.
1. Misrepresentation on the application
This is the big one. If the firm attested to a control it did not actually run, and that control is connected to the loss, the carrier can deny the claim and may be able to rescind the policy entirely, treating it as if it never existed and returning the premium. The attestation does not have to be a deliberate lie. An honest but unchecked yes, signed by a partner who assumed the control was on, has the same effect. The defense against this is not optimism. It is verification before signature.
2. Failure to maintain the controls mid-term
A policy is a year long. The attestation was true the day it was signed, but a firm is a moving target. A new file server is stood up without endpoint protection. A new hire's account is created without multi-factor authentication. The backup job fails silently for two months and nobody is watching the alerts. Many policies require the firm to maintain the stated controls throughout the term. A loss that traces back to the gap is exposed to a denial even though the application was honest on day one. The control checklist is not a one-time exercise; it needs an owner all year.
3. Treating a sublimit as the full limit
This is not a denial so much as a shortfall, and it stings just as much. The firm suffers a two hundred thousand dollar wire fraud loss, files the claim, and learns that funds transfer fraud was sublimited at one hundred thousand. The policy paid. It simply paid half. The firm was never denied; it was under-covered, and it found out at the worst possible moment. Reading the sublimits at purchase, and negotiating the ones that matter, is the only cure.
4. Late notice and going off-script after an incident
Cyber policies are claims-made and carry strict notice provisions. A firm that spends two weeks quietly trying to fix the problem itself, then calls the broker, may have already prejudiced the claim. Worse, a firm that hires its own forensic vendor and its own outside counsel before notifying the carrier may find those costs are not reimbursable, because the policy requires the firm to use the carrier's pre-approved panel. The discipline is simple and counterintuitive: the first call after an incident is to the carrier hotline, before the cleanup, not after.
5. Assuming the incident is covered when an exclusion applies
Policies exclude things, and the exclusions evolve. A firm should know whether its policy excludes incidents attributed to nation-state actors or war, whether it excludes losses tied to widely known unpatched vulnerabilities, and whether prior-acts or known-circumstances language could be read to exclude a problem the firm half-knew about before the policy started. None of these makes a policy worthless. But a firm that has read them knows where its coverage actually ends, and does not build a recovery plan on a coverage that was never there.
The pattern across all five is the same. Cyber insurance rewards the firm that treats the policy as a live document: read at purchase, verified at signing, maintained through the year, and obeyed precisely in the first hours of an incident. It punishes the firm that files the application in a drawer and hopes. For a profession built on reading documents carefully, this should be the easiest discipline in the building to adopt.
Step Four
The Wire Fraud Sublimit That Catches Law Firms
Of all the coverages in the bundle, the one a law firm is most likely to actually need, and most likely to find under-covered, is funds transfer fraud. It deserves its own section because the exposure is specific to how law firms work, and because the gap is so easy to miss.
Law firms move other people's money as a routine part of practice. A real estate practice disburses closing proceeds. A litigation practice distributes settlement funds. An estates practice pays out distributions to beneficiaries. Every one of those transfers is a moment where a criminal who has been quietly reading the firm's email can step in. The classic version: an attacker compromises a paralegal's mailbox weeks before a closing, watches the matter develop, and then, on the morning of the disbursement, sends wiring instructions from the real mailbox or a near-identical lookalike, redirecting the funds to an account the criminal controls. The instructions look right because they come from the right place, reference the right matter, and arrive at the right time. The money is often unrecoverable within hours.
Here is the trap. This kind of loss is usually covered under the social engineering or funds transfer fraud grant, and that grant is very commonly written as a sublimit, a small fraction of the headline policy limit. A firm can hold a one or two million dollar cyber policy and discover that the part of it covering the loss the firm was most likely to suffer is capped at one hundred or two hundred and fifty thousand dollars. Some carriers also attach conditions: the loss is only covered if the firm followed a documented call-back verification procedure, and not covered if it did not.
There are three actions a firm should take here, and they are cheap relative to the exposure. First, find out the exact funds transfer fraud sublimit on the current policy, and ask the broker what it would cost to raise it to a number that reflects the size of the transfers the firm actually handles. For a firm doing real estate or large settlements, a sublimit that does not at least approach a typical single transfer is not real protection.
Second, adopt and document a wire verification procedure: no change to wiring instructions and no transfer above a defined threshold goes out without a voice call to a phone number the firm already had on file, never a number supplied in the email requesting the change. This procedure is what stops step three in the diagram above. It is also, increasingly, a condition the carrier requires before it will pay a social engineering claim, so writing it down and following it protects both the money and the coverage.
Third, make sure the policy's social engineering grant is broad enough to cover the realistic scenarios. Some grants only respond when the firm's own funds are taken and not when client or escrow funds are redirected, which for a law firm is exactly backwards from where the risk lies. This is a question to put to the broker in writing and to get an answer to in writing.
Step Five
The 60-Day Plan Before You Apply or Renew
A firm that starts thinking about its cyber renewal the week the quote arrives has already lost most of its leverage. The work that gets a better price and a cleaner policy has to happen before the application goes in. Sixty days is enough time to do it properly without disrupting the practice. Here is how that window should be spent.
| Window | What to do | Why it matters |
|---|---|---|
| Days 1 to 20 | Run an honest controls inventory against the eight application gatekeepers. Confirm each one by looking at the actual configuration, not from memory. | You cannot fix or truthfully attest to a gap you have not found. This is the foundation of everything that follows. |
| Days 20 to 40 | Close the gaps. Enforce MFA with no exceptions, deploy EDR everywhere, fix the backup and run a real restore test, turn on email impersonation protection. | Most gaps are configuration of software the firm already owns. Closing them turns a no on the application into a yes. |
| Days 30 to 45 | Write the two documents underwriters ask for: a short incident response plan and a wire verification procedure. Rehearse the IR plan once with the team. | A rehearsed plan is both an honest attestation and the thing that limits loss when it is actually needed. |
| Days 40 to 55 | Assemble the evidence pack: configuration screenshots, training records, the restore-test result, the two new procedures. Give it to the broker with the application. | An underwriter who sees evidence rather than bare yes-or-no answers quotes a better firm, and prices it accordingly. |
| Days 55 to 60 | Review the quote line by line: limit, sublimits, retention, exclusions, panel requirements. Negotiate the funds transfer fraud sublimit specifically. | The quote is a draft. The terms that protect a law firm are the ones a firm asks for before binding, not after. |
The sequence matters as much as the content. Inventory comes first because everything downstream depends on knowing the true picture. Remediation comes second because a fixed gap is worth more than a documented one. Documentation and evidence come third because they convert the work the firm has done into something an underwriter can actually price. And the negotiation comes last, from the strongest position the firm can occupy: a firm that can prove it runs the controls, rather than one that simply claims it does.
The hidden benefit of doing the work
Everything in the 60-day plan is also exactly what ABA Model Rule 1.6 expects of a firm making reasonable efforts to protect client information, and exactly what a client's own security review will ask for. The renewal becomes the forcing function for security the firm should have anyway. One block of work satisfies the insurer, the rule, and the firm's largest clients at the same time.
Step Six
How to Get Better Terms, Not Just a Lower Number
Most firms approach a cyber renewal trying to push the premium down. That is the wrong target. The right target is the best combination of price, limit, sublimits, and retention for the firm's actual risk. A cheaper premium with a funds transfer fraud sublimit that does not cover a single closing is not a saving. It is a smaller bet on the wrong horse.
Underwriters price a cyber policy on a handful of variables. The firm's revenue and headcount set the baseline exposure. The practice mix adjusts it: real estate, trusts, and large-settlement litigation raise the funds transfer exposure, while heavy personal-injury, family, or immigration caseloads raise the volume of sensitive records. Prior claims history matters. And then there is the one variable the firm can move quickly: the maturity of its controls. Of all the inputs, this is the one a firm can change between now and the renewal, and it is the one underwriters reward most directly.
Three moves consistently produce better outcomes. The first is the evidence pack described in the 60-day plan: when an underwriter sees configuration screenshots, training records, and a restore-test result, they are no longer pricing an unknown. They are pricing a firm that has demonstrably done the work, and that firm is a better risk in measurable ways. The second is raising the retention deliberately where the firm can absorb it. A higher retention, the cyber equivalent of a deductible, lowers the premium, and a firm with healthy cash flow can often trade retention it can comfortably self-fund for budget that buys a higher funds transfer fraud sublimit. The third is to use a broker who places cyber cover for law firms specifically, not a generalist. The specialist knows which carriers write the bar-complaint defense grant, which are flexible on the social engineering sublimit, and how to present a firm so the underwriter sees its strengths.
One caution. Cyber insurance and the firm's professional liability, or malpractice, policy are different products and overlap in awkward ways. A claim by a client harmed by a breach can implicate both. Before binding a cyber policy, the firm should ask both carriers, in writing, how the two policies coordinate, which one responds first, and whether anything important falls into the gap between them. That fifteen-minute question has saved firms from discovering an uncovered seam in the middle of an actual claim.
Step Seven
Insurance Transfers the Loss, Not the Duty
It is worth being precise about what a cyber policy does and does not do for a law firm, because the temptation is to treat the policy as the end of the security conversation. It is not. A cyber policy is a financial instrument. It transfers the monetary consequences of an incident from the firm's balance sheet to the carrier's, subject to all the limits, sublimits, and conditions discussed above. That is genuinely valuable. It is also the whole of what insurance does.
What it does not do is discharge the firm's ethical obligations. ABA Model Rule 1.6, as amended, requires a lawyer to make reasonable efforts to prevent the unauthorized disclosure of, or access to, client information. That is a duty of conduct. It is owed to the client and enforced by the bar, and no insurance policy can satisfy it on the firm's behalf. A firm that has bought a generous cyber policy but made no reasonable effort to secure client data has transferred its financial risk and left its ethical exposure entirely intact. If anything, the existence of the policy can make a bar inquiry sharper, because the firm cannot claim it was unaware that cyber risk was real and insurable.
The reassuring part is that the two obligations point in the same direction. The controls an insurer requires on its application are, almost line for line, the controls that constitute reasonable efforts under Rule 1.6: multi-factor authentication, encryption, tested backups, training, a written plan. A firm that does the work to be genuinely insurable is, in the same motion, doing the work to be genuinely defensible if a client or a bar reviewer ever asks. The policy and the rule are not competing claims on the firm's attention. They are two reasons to do the same set of things.
So the right mental model is a pair, not a substitute. Reasonable security efforts reduce the chance the incident happens at all, and reduce its severity if it does. Cyber insurance absorbs the financial blow of the incident the firm could not prevent. A firm needs both. A firm that has only the insurance has bought a fire extinguisher and disconnected the smoke alarm. A firm that has only the controls is well defended but will still feel the full financial weight of the rare event that gets through. The firms that come through a cyber incident with both their finances and their professional standing intact are the ones that treated security and insurance as one program with two halves.
How Atlant Security Helps
Walk Into the Renewal With Evidence, Not Hope
Our cyber insurance readiness review for law firms maps your environment against the exact eight controls underwriters now require. We tell you, before you sign anything, which application questions you can answer with an honest yes, which you cannot, and what it takes to close each gap. You get a documented evidence pack the broker can hand straight to the underwriter, and the controls work itself if you want us to do it.
- Honest controls inventory against every gatekeeper question on the application
- A written evidence pack: configuration proof, training records, restore-test result
- Incident response plan and wire verification procedure, drafted and rehearsed with your team
- Fixed-fee engagement, senior consultant on every call, never juniors
- Aligned with ABA Model Rule 1.6, so one block of work satisfies the insurer and the bar
Frequently Asked
Cyber Insurance Questions Law Firms Ask
Does my firm's malpractice policy already cover a cyber incident?
Usually not in any complete way. A professional liability policy is built to respond to claims arising from legal services, and while a breach that harms a client can touch that policy, it generally will not pay for first-party costs such as forensic investigation, data restoration, business interruption, or cyber extortion. Many malpractice policies also now carry explicit cyber exclusions or only a small sublimited cyber endorsement. Treat cyber insurance as a separate, dedicated product, and ask both carriers in writing how the two policies coordinate.
Can a carrier really deny a claim over an application answer?
Yes, and it is one of the most common reasons cyber claims are disputed. The application contains representations the carrier relies on to issue and price the policy. If the firm attested to a control it did not run, and that control is connected to the loss, the carrier can deny the claim and, depending on the policy language and jurisdiction, may be able to rescind the policy. The misstatement does not have to be deliberate. The protection is to verify every control answer against the actual configuration before anyone signs.
How much cyber coverage does a small law firm actually need?
There is no single number, because the right limit depends on the firm's revenue, the sensitivity of the records it holds, and above all the size of the money transfers it handles. The more useful question is not the headline limit but the sublimits. A firm that disburses real estate or settlement funds should size its funds transfer fraud sublimit against a realistic single transfer, not accept whatever small default the policy carries. Work the number through with a broker who places cyber cover for law firms specifically.
What is the single most important control for getting covered?
Multi-factor authentication, enforced everywhere with no exceptions. It is the control underwriters check first, it is the cheapest to deploy because it is already built into the email and practice-management tools the firm pays for, and it breaks the most common attack against a law firm, the email account takeover that leads to wire fraud. A firm that cannot attest to firm-wide multi-factor authentication, including every partner, will struggle to get a sensible quote at all.
If we have good cyber insurance, do we still need to invest in security?
Yes. Insurance transfers the financial loss; it does nothing for the firm's ethical duty under ABA Model Rule 1.6 to make reasonable efforts to protect client information, and it does nothing to prevent the disruption, the client notifications, and the reputational harm of an incident. Carriers also will not write a policy at a sensible price unless the security work has been done. The two are a pair: controls reduce the chance and the severity of an incident, insurance absorbs the financial blow of the one that gets through.
What should we do first if we suspect an incident?
Call the carrier's cyber incident hotline before you do anything else, including before you hire your own forensic vendor or outside counsel. Cyber policies have strict notice provisions and usually require the firm to use the carrier's pre-approved panel of responders. A firm that cleans up first and notifies later can prejudice the claim or find its self-arranged costs are not reimbursable. Keep the hotline number in the written incident response plan so it is found in seconds, not searched for in panic.
Before your next cyber renewal
Make sure every yes on the application is true.
We run fixed-fee cyber insurance readiness reviews for law firms against the exact controls underwriters require. You get an honest gap list, a documented evidence pack for the broker, and a clear plan to close anything outstanding before you sign. If your firm is already in good shape, we will tell you that on the call.
Book a 30-minute call
Alexander Sverdlov
Founder of Atlant Security. Author of 2 information security books, cybersecurity speaker at the largest cybersecurity conferences in Asia and a United Nations conference panelist. Former Microsoft security consulting team member, external cybersecurity consultant at the Emirates Nuclear Energy Corporation.