Back to Posts

Law Firms Cyber Insurance Requirements

March 31, 2025

Attorney reviewing documents

Law firms are high-value targets. Attorneys hold confidential client data, financial records, trade secrets, and privileged communications, often with lean IT teams and no dedicated security team.

Hackers know this. As do cyber insurers.

Increasingly, the requirements insurers set to qualify for coverage are colliding with the reality of how most legal firms operate.

The result: law practices are discovering gaps not during routine audits, but when a claim gets denied.

Why Law Firms Draw Hackers

The legal industry combines three factors making it persistently attractive to cybercriminals: high-value data, email-heavy workflows, and trust-based client relationships.

A successful law firm breach often yields not just financial records but privileged communications, litigation strategy, and pending transaction details. That information commands a premium on criminal markets and carries enormous leverage in ransom negotiations.

The numbers reflect the exposure. According to IBM's 2025 Cost of a Data Breach Report (PDF), the average breach cost for U.S. businesses, including legal practices, reached $10.22 million.

For smaller practices, a single incident can threaten the firm's ability to continue operating. STACK's overview of cyber insurance covers how breach costs factor into coverage decisions.

The American Bar Association's own data shows the scope of the problem. The ABA's 2023 Legal Technology Survey Report found that nearly 30% of law firms reported experiencing a security breach. This reflects a sector-wide pattern. Regulators and insurers are responding with tighter requirements.

What the ABA Requires

Cybersecurity for law firms is an ethical obligation. Under ABA Model Rule 1.6(c), attorneys must make reasonable efforts to prevent unauthorized access to or disclosure of client information. ABA Formal Opinion 483 extends that duty to cover how firms respond after a breach, including obligations to monitor for incidents, stop unauthorized access, and notify affected clients.

Firms failing to meet these standards face potential malpractice exposure and state bar disciplinary proceedings. Client lawsuits following breaches have already resulted in multi-million-dollar settlements. Florida-based business law firm Gunster Yoakley & Stewart agreed to pay $8.5 million in 2024 to settle a class action arising from a 2022 breach that exposed nearly 10,000 individuals' personal and health information, according to Embroker's law firm cyberattack analysis.

For clients, a breach is often disqualifying. Research cited by Embroker shows 40% of clients consider firing a firm after a security incident. The reputational damage frequently outlasts the financial one.

Cyber Liability Insurance Issue

Cyber insurance was designed to function as a financial backstop when defenses fail. But coverage is increasingly conditional, and the conditions are getting stricter. Insurers have tightened underwriting standards significantly in recent years as breach claims and costs have increased.

According to Marsh McLennan's cyber insurance market analysis, 41% of applications are denied on first submission. The two most common reasons: missing multi-factor authentication (MFA) and inadequate endpoint protection.

The Coalition 2024 Cyber Threat Index found 82% of the firms filing cyber insurance claims lacked MFA. That single missing cybersecurity tool can mean the difference between a covered claim and a firm absorbing the full cost of a breach.

Denial isn't the only risk. Insurers can also reduce payout limits, add exclusions, or non-renew policies when cybersecurity controls are found to be incomplete at the time of a claim. A firm that believed it was covered may find itself unprotected after the fact.

What Insurers Require

Underwriting questionnaires have evolved from high-level checklists to technical audits. Carriers now ask for documentation, screenshots, and configuration exports, not just verbal attestations. The controls most commonly required include:

Multi-factor authentication. MFA is now a baseline requirement on email, VPN, remote access, and privileged accounts. SMS-based authentication is increasingly insufficient. Insurers look for app-based or hardware token MFA, and many require it across all user accounts, not just administrators.

Endpoint detection and response (EDR). Traditional antivirus does not satisfy underwriters. EDR tools provide real-time monitoring, behavioral detection, and automated response capabilities across all endpoints. Insurers verify coverage during underwriting and expect documentation showing agents are active on all servers, workstations, and laptops.

Tested backups. Firms must demonstrate they can recover data without paying a ransom. The Coalition 2024 Cyber Threat Index reports that 94% of firms hit by ransomware saw attackers target their backups. Insurers require backups that are immutable, stored offline or in isolated environments, and tested regularly, with documented restore results. STACK's post on ransomware payments covers why recovery capability matters more than ever.

A documented incident response plan. Having a plan is not enough. Carriers want evidence it has been reviewed and tested. IBM's 2025 Cost of a Data Breach Report found that firms with documented and tested incident response plans reduced breach costs by an average of $1.49 million compared to those without one.

24/7 monitoring. Attacks don't follow business hours. Insurers expect continuous monitoring with the capability to respond to active threats, not just detect them after the fact. Firms that rely solely on daytime IT support leave significant windows of exposure that underwriters treat as unacceptable risk. A cybersecurity dashboard gives leadership visibility into monitoring status in real time.

Email security. Phishing remains the leading entry point for law firm breaches. Insurers look for advanced email filtering, anti-phishing controls, and user training, not just basic spam filters. According to the ABA's 2023 Legal Technology Survey Report, 80% of law firms still relied on spam filters as their primary defense that year, a standard that no longer satisfies coverage requirements.

The Gap Between Coverage and Reality

Many firms carry cyber insurance without knowing whether they'll actually be covered when they need it. Policies that aren't backed by the required controls create a false sense of security that can collapse at the worst possible moment. This mirrors a broader pattern STACK has written about: cybersecurity overconfidence is one of the most consistent risk factors across industries.

Consider a representative scenario common to mid-sized practices: a 40-attorney firm carries cyber liability coverage, has basic email filtering in place, and relies on passwords for remote access. A phishing email compromises a paralegal's account over a weekend. By Monday morning, the hacker has moved laterally through the network, encrypted client files, and exfiltrated confidential case records.

The firm files a claim, and the insurer denies it. The firm lacked MFA on email and remote access, had no EDR on endpoints, and the backups, while present, hadn't been tested or isolated from the network. The firm absorbs the full cost: forensic investigation, breach notification, client communications, regulatory response, and potential litigation.

This is the pattern driving claim denials across the legal sector.

What a Structured Security Program Looks Like

Qualifying for cyber insurance requires the same foundational controls that prevent breaches in the first place. The two goals aren't separate: firms that build a complete security program are also firms that qualify for coverage, maintain lower premiums, and have a defensible position in the event of a claim or regulatory inquiry. STACK's post on cybersecurity ROI covers how that investment calculus plays out.

That program starts with understanding what you have. A risk assessment maps current controls against insurer requirements and identifies gaps before they become claim denials. From there, firms can close priority gaps: deploying MFA across all access points, rolling out EDR on every endpoint, establishing tested backup protocols, and building a written incident response plan with documented tabletop exercises.

Firms that work with a managed security service provider (MSSP) gain an advantage during underwriting. MSSPs can produce the documentation carriers require: coverage reports, MFA policy exports, backup restore logs, and incident response exercise artifacts. That proof pack, submitted with the application, reduces back-and-forth with underwriters and supports better terms.

The cost of building that program is almost always less than the cost of a breach. For law firms, where client confidentiality is both an ethical obligation and a business foundation, the math is straightforward.

Why Law Firms Choose STACK Cybersecurity

STACK Cybersecurity is a Michigan-based security-first IT managed service provider (MSP) with more than 20 years in business. The team is 100% U.S.-based. STACK works with firms to close gaps that expose them to breach risk and insurance denial, including multi-factor authentication, endpoint detection and response, 24/7 monitoring, and incident response planning.

Learn more on the STACK about page or review industry recognition and media coverage.

For law firms ready to understand where they stand, a risk assessment is the right starting point. It establishes a clear picture of current controls, identifies what insurers will look for, and maps a path to coverage-ready security before a breach forces the conversation.

Schedule a risk assessment with STACK Cybersecurity today.

Cybersecurity Consultation

Do you know if your company is secure against cyber threats? Do you have the right security policies, tools, and practices in place to protect your data, reputation, and productivity? If you're not sure, it's time for a cybersecurity risk assessment (CSRA). STACK Cybersecurity's CSRA will meticulously identify and evaluate vulnerabilities and risks within your IT environment. We'll assess your network, systems, applications, and devices, and provide you a detailed report and action plan to improve your security posture. Don't wait until it's too late.

Schedule a Consultation Explore our Risk Assessment