Skip to content
Back to Blog
Cyber Insurance

Top 10 cybersecurity controls

Creating a strong cybersecurity profile begins with understanding where your security vulnerabilities exist and how you can eliminate those threats.

Creating a strong cybersecurity profile begins with understanding where your security vulnerabilities exist and how you can eliminate those threats. Often your cyber insurance broker or carrier can help you get started by providing a list of controls they require. Here’s a list of common cybersecurity controls for obtaining cyber insurance; it is a good starting point helping you determine your cybersecurity profile and identify weaknesses.

  1.  Multi-factor authentication
  2.  Asset management
  3.  Privileged account management
  4.  Endpoint detection and response
  5.  Third-party risk management
  6.  Email filtering
  7.  Patch management
  8.  Incident response planning
  9.  Logging and monitoring
  10.  Staff training and education
It is not enough to simply have these controls in place. You need to make sure the controls are up to date and working properly. A recent court case underscored that simply having a control that was out of date and inadequate to meet todays cyberattacks is insufficient to collect on a cyber insurance policy.

One approach to ensure your security controls meet today’s threats is to have an independent, third- party compliance or consulting firm stress test your controls. Consultants who do independent verification can offer vendor-neutral recommendations on where your vulnerabilities lie and how you can remediate the problem to reduce your risk.

Latest Articles

California Regulators Underscore Need to Delete Unneeded Residents’ Personal Information

California Regulators Underscore Need to Delete Unneeded Residents’ Personal Information

Stay compliant with California's data privacy laws by understanding the California Privacy Protection Agency's reminder to only retain esse...

Test Accounts May Accidentally Be Testing Your Security

Test Accounts May Accidentally Be Testing Your Security

Uncover the hidden risks of test accounts in system administration and cloud services. Learn crucial tips to safeguard your security from p...

Data Keeps Getting More Sensitive, and Identity Fraudsters Love It

Data Keeps Getting More Sensitive, and Identity Fraudsters Love It

More breaches in 2023, but 16% fewer victims than 2022, according to Identity Theft Resource Center (ITRC).