March 10, 2026

Why “We Have MFA” No Longer Guarantees Cyber Insurance

Evgeniy Kharam

In recent years, Multi-Factor Authentication (MFA) has become a widely adopted security measure for organizations looking to bolster their defenses against cyber threats. Many believe that simply having MFA in place can secure their systems and qualify them for cybersecurity insurance. 

However, as cyber threats evolve and insurers revise their criteria, the assumption that "We Have MFA" still guarantees access to cyber insurance is no longer valid. 

In part one of our blog series on cyber insurance, we will outline the reasons behind this shift and what organizations need to know to ensure comprehensive cybersecurity coverage.

The $9 Million Lesson

A mid-sized healthcare company believed it was covered. They had endpoint detection and response (EDR), MFA, and immutable backups in place. Their cyber insurance policy was current, and audits were clean.

Then came the ransomware attack.

During the investigation, the insurer's technical team found a legacy file server without EDR, three break-glass admin accounts exempt from MFA, and backup credentials stored in a shared admin account. The company had controls, just not everywhere that mattered.

The dispute dragged on for nine months. Legal fees exceeded the original incident cost. The CFO reported to the board that $9 million in damages from an incident was not covered by a $5 million policy.

This scenario is increasingly common in 2026 and signals a fundamental shift in the cyber insurance market.

Transitioning from Self-Attestation to Technical Validation

The market has shifted from self-attestation to demanding concrete proof. As cyber threats grow more advanced and widespread, strong cybersecurity, swift incident response, and smart risk transfer strategies are more critical than ever.

Recent data shows:

Furthermore, insurance providers have experienced financial losses due to claims in which entities claimed the implementation of controls but failed to substantiate their overall effectiveness. As a result, the industry has implemented more rigorous requirements, and recent data suggests that over a third of cyber insurance claims are denied, primarily owing to incomplete, inaccurate, or misleading information.

What Changed and Why It Matters

Before 2024: "Do you have MFA deployed?" Answer: "Yes" → Policy issued.

By 2026: "Prove MFA is enforced on all accounts, including privileged access". Technical verification, documented exceptions, and timestamped evidence required.

This shift redefines what security success looks like. It's no longer enough to implement controls; organizations must be able to prove they are active, comprehensive, and operational at all times.

The "We Thought It Was Covered" Trap

Consider this scenario: you report MFA enforcement, and your policy is issued based on that.

Six months later, an attacker exploits a contractor’s VPN account or a legacy admin portal, surfacing gaps in MFA coverage. These gaps appear in forensic reports and become coverage exclusions.

You still have a policy, but now you're in a dispute, not a payout.

The Three Gatekeeper Controls

Underwriters now expect three essential controls as prerequisites for coverage:

1. Phishing-Resistant MFA with Universal Enforcement. Standard SMS-based MFA is no longer sufficient. Hardware keys, passkeys, or certificate-based auth are expected for remote access, privileged, and email systems. "Universal enforcement" means exceptions are rare. Any break-glass, service, or legacy account must have phishing-resistant MFA or be clearly documented with compensating controls.

2. EDR with Verified 24/7 Monitoring. Having EDR is basic. Underwriters want verification: Who monitors alerts? What's the response time? How effective is the detection? This often leads organizations toward managed detection and response (MDR) services, as monitoring outside business hours is now a standard expectation.

3. Immutable Backups with Tested Recovery. Backups alone aren’t enough. Insurers require backups to be immutable, with isolated credentials and recent, documented recovery tests. Backups must be protected from encryption or deletion, and tested regularly to ensure resilience.

What Success Looks Like in 2026

When a breach occurs on an unprotected asset, organizations face compounded losses. First, the breach itself entails downtime, data loss, recovery expenses, regulatory fines, customer impact, and damage to the brand. Next, disputes over coverage hinder claims processing, escalate legal risks due to insufficient controls, attract scrutiny from boards and shareholders, result in increased premiums, and extend recovery periods.

Most organizations aren't failing because they lack security tools; they struggle to quickly and accurately demonstrate coverage and control effectiveness when it matters most.

Leading organizations treat evidence as an ongoing process, not just a renewal checkbox:

The era of checkbox compliance is over. Being ready means having current, verifiable evidence of comprehensive controls at all times.

Experience the future of security
with a collaborative mesh
ecosystem powered by AI

Let's Talk