By Kyle Sawdey | Chief Revenue Officer & EVP of Underwriting | Updated April 2026 The conflict with Iran has been a reminder for businesses across the United States of the potential cyber risk threats. Over the past several weeks, I posted on LinkedIn about the uptick in questions I’ve been fielding from policyholders, brokers, […]
Coverage & Policy Education
View allBy Ryan Windt | Head of Growth Marketing | Updated April 2026 Most businesses treat a cyber insurance application the way they treat a software end-user license agreement. Scroll through it, check the boxes, and move on. It is a form. It will get approved. The policy will show up in email. That approach works […]
By Ryan Windt | Head of Growth Marketing | Updated April 2026 If you run a technology company, a software firm, or a managed service provider, you have probably seen the term Technology Errors and Omissions insurance on a contract, a vendor questionnaire, or a renewal checklist. You may have even purchased it without being […]
By Ryan Windt | Head of Growth Marketing | Updated April 2026 Business email compromise cost U.S. businesses $2.77 billion in 2024 across more than 21,000 reported incidents, according to the FBI’s Internet Crime Complaint Center. The average loss per incident was $137,132 and rising. Yet when businesses file a claim after a fraudulent wire […]
By Ryan Windt | Head of Growth Marketing | Updated April 2026 If you have a general liability (GL) policy, you might assume your business is protected if a cyberattack hits. It is a reasonable assumption. GL insurance is designed to cover unexpected losses, and a cyberattack is certainly unexpected. But here is the hard […]
By Ryan Windt | Head of Growth Marketing | Updated March 2026 Business email compromise does not look like a cyberattack. There is no ransomware alert, no system going offline, no obvious sign that anything is wrong. An employee gets an email that looks like it’s from the CEO asking for an urgent wire transfer. […]
Cyber Threats & Incident Analysis
View allBy Ryan Windt | Head of Growth Marketing | Updated April 2026 Most businesses buy cyber insurance hoping they never have to use it. But when a ransomware attack hits, a breach notification lands in your inbox, or a wire transfer disappears into a fraudulent account, the policy you bought suddenly becomes the most important […]
By Kyle Sawdey, CRO & EVP of Underwriting, SeedPod Cyber | March 2026 In early January, the Crimson Collective extortion group posted to Telegram claiming they had stolen the personal data of more than one million Brightspeed customers. Names, email addresses, phone numbers, billing addresses, service records, partial payment card data, account status. Brightspeed, a […]
By Kyle Sawdey | CRO & EVP of Underwriting | Updated April 2026 By now, most people in our industry have seen the headlines. Stryker, a Fortune 300 medical device giant with $25 billion in revenue, had its global Microsoft environment hit by a destructive wiper attack on March 11. Over 200,000 endpoints wiped. 50 […]
By Ryan Windt | Head of Growth Marketing | Updated April 2026 For years, cyber risk conversations focused on stolen data. How many records were exposed? Was customer information compromised? What were the notification costs? That is no longer where the biggest losses occur. Today, business interruption has become the single largest driver of cyber […]
By Ryan Windt | Head of Growth Marketing | Updated April 2026 Every April, the FBI’s Internet Crime Complaint Center publishes its annual report on cybercrime losses across the United States. Every year, the numbers get worse. The 2025 IC3 Annual Report is no exception, and this year the numbers crossed a threshold that nobody […]
By Ryan Windt | Head of Growth Marketing | Updated April 2026 Phishing is the starting point for most of the cyber incidents that end up as insurance claims. It is how ransomware gets in. It is how business email compromise begins. It is how credentials get stolen, accounts get compromised, and wire transfers go […]
Industry Verticals
View allBy Ryan Windt | Head of Growth Marketing | Updated April 2026 Small businesses are the most targeted segment in cybercrime. Not because attackers have a grudge against small operators, but because small businesses combine three things that make them attractive: real money to steal, sensitive data worth taking, and security postures that are significantly […]
By Ryan Windt | Head of Growth Marketing | Updated April 2026 Restaurants, hotels, and hospitality businesses collect enormous amounts of sensitive data every single day. Payment card information, guest names and addresses, employee Social Security numbers, reservation details, loyalty program accounts. All of it flows through interconnected systems that are often underfunded from a […]
By Ryan Windt | Head of Growth Marketing | Updated April 2026 Nonprofits spend years building the donor trust, community relationships, and operational infrastructure that make their mission possible. A single cyberattack can threaten all of it. The idea that nonprofits are too small, too mission-driven, or too under the radar to be targeted by […]
By Ryan Windt | Head of Growth Marketing | Updated April 2026 Logistics and distribution companies run on precision. On-time delivery, accurate inventory, real-time tracking, and tight coordination between carriers, warehouses, and clients. Every one of those systems is digital, and every digital system is a potential target. The industry has learned this the hard […]
By Ryan Windt | Head of Growth Marketing | Updated April 2026 Architecture and engineering firms spend years building reputations on precision, reliability, and client trust. A single ransomware attack can put all of that at risk in hours. Yet many A&E firms still treat cyber insurance as an afterthought, assuming that cybercriminals are more […]
By Ryan Windt | Head of Growth Marketing | Updated April 2026 The cannabis industry has a target on its back. Cash-heavy operations, sensitive customer data, complex compliance systems, and an emerging regulatory environment combine to create one of the most attractive attack profiles in retail. Cybercriminals know that dispensaries, cultivators, and cannabis technology companies […]
Security Controls & Compliance
View allBy Ryan Windt | Head of Growth Marketing | Updated April 2026 If you have filled out a cyber insurance application in the last two years, you have seen the EDR question. It shows up in different forms depending on the carrier, but the intent is always the same: do you have endpoint detection and […]
By Ryan Windt | Head of Growth Marketing | Updated April 2026 If you have read anything about qualifying for cyber insurance in the last two years, you have seen the phrase “immutable backups” somewhere in the requirements list. It appears in underwriting questionnaires, in policy conditions, in carrier declination letters, and in post-incident forensic […]
By Ryan Windt | Head of Growth Marketing | Updated April 2026 Most businesses have some version of an incident response plan. It lives in a shared drive somewhere, it was written two or three years ago by someone who has since left the company, and nobody has looked at it since. That document will […]
By Ryan Windt | Head of Growth Marketing | Updated April 2026 Multi-factor authentication is the single control that appears on every cyber insurance application, every underwriting questionnaire, and every carrier declination letter when it is missing. It is also the control that generates the most confusion when businesses actually try to implement it. What […]
By Ryan Windt | Head of Growth Marketing | Updated March 2026 Most businesses treat cyber insurance renewal the same way they treat renewing a lease: sign the paperwork, hope the rate does not jump too much, and move on. That approach is leaving money on the table and, in some cases, creating coverage gaps […]
By Ryan Windt | Head of Growth Marketing | Updated April 2026 Executive Summary PCI DSS v4.0 has been fully in effect since March 2025. Organizations that have not yet addressed the payment-page script controls, expanded MFA requirements, and Targeted Risk Analysis framework are now operating out of compliance, and that gap shows up directly […]
MSP & Broker Resources
View allBy Ryan Windt | Head of Growth Marketing | Updated April 2026 The Short Version Managed security service providers carry a fundamentally different insurance exposure than MSPs. The moment you take on an explicit security mandate, whether that is SOC monitoring, threat detection, incident response, or vulnerability management, you are no longer just managing IT. […]
By Ryan Windt | Head of Growth Marketing | Updated March 2026 Most MSPs know their clients need cyber insurance. The harder part is the conversation. Clients push back. They say they’re too small to be a target. They say their existing coverage handles it. They ask why their MSP is suddenly talking about insurance. […]
By Ryan Windt | Head of Growth Marketing | Updated March 2026 When a client suffers a breach, the technical work is only half the battle. The rest is legal, financial, and reputational, and that is where many MSPs get pulled into disputes they were not prepared for. Embedding client-owned cyber insurance into your service […]
By Ryan Windt | Head of Growth Marketing | Updated March 2026 Cyber insurance has become one of the most complex lines brokers manage. The market has stabilized after years of rate volatility, but that stability has come with a catch: underwriters are more selective than ever about what they’ll bind, and clients are asking […]
By Ryan Windt | Head of Growth Marketing | Updated April 2026 Most MSPs think about cyber insurance as something they have to buy. A compliance requirement. A line item on the renewal list. Something the accountant asks about once a year. The MSPs growing fastest in 2026 are thinking about it differently. They are […]
CISA (The Cybersecurity and Infrastructure Security Agency) is warning organizations that Russia’s invasion of Ukraine could include malicious cyber activity against the U.S. and stated that “evolving intelligence indicates that the Russian Government is exploring options for potential cyberattacks.”
WE’D LOVE TO TALK
"*" indicates required fields