Security Requirements for Protection Eligibility

To qualify for added protection benefits, clients must implement and maintain essential security controls. Our team helps organizations put these safeguards in place and maintain them over time.

Required Controls
Control Description
Next-Gen Antivirus / EDR
Industry-standard and up-to-date antivirus or comparable prevention tools are installed on endpoints.
MDR / SIEM
Managed SOC or network monitoring tools on endpoint devices.
MFA
Multi-factor authentication enabled for all email accounts.
Backups
Immutable backups (secure copies of data for recovery).
Data Privacy / Encryption
If applicable, participants must comply with national, state, and federal privacy and security policies, such as PCI, HIPAA, GDPR, SOC or other regulatory standards. Encryption standards, such as PHI or PII for HIPAA (if regulatory conditions apply).
Patch Updates
Commercially reasonable maintenance of software patch updates must be made within 60 days of their release.
Security Awareness Training
Continuous security awareness training delivered to employees.
Invoice & Wire Change Request Procedures
All "Out-of-cycle" change requests to existing banking details for invoice and wire transfer payments. Must be verified through trusted contacts and documented prior to action taken.

Need help implementing these controls? Our team provides complete setup and ongoing management.

Get Implementation Support

Eligibility and Business Value

Clients using select baseline security programs may qualify for added protection benefits and may also strengthen their overall cyber insurance readiness, depending on their environment, controls, and insurer requirements.

Protection Eligibility

Eligibility depends on service alignment and control maturity

  • Many clients on qualifying baseline security programs may be eligible for added protection benefits
  • Eligibility depends on implemented controls, client environment, and program fit
  • Protection options can be integrated into existing security operations with minimal disruption

Insurance Readiness Support

A stronger security posture can improve your readiness when discussing cyber insurance with brokers or carriers

  • Stronger controls can support better insurance conversations
  • Security improvements may help demonstrate insurability and risk reduction
  • Premium outcomes vary and are determined by the insurer, not guaranteed by SPM Advisors

Layered Protection Approach

Our security programs are designed to help clients build a layered defense strategy that combines prevention, response readiness, and, where available, added financial protection options.

Learn About Our Programs View Pricing

Financial Protection for Covered Cyber Events

For qualifying clients, added financial protection may be available for certain covered cyber events. Coverage structure, limits, pricing, and eligibility depend on the selected program and partner terms.

Cyber Incidents

Ransomware and BEC Incident

Recovery benefits for ransomware attack and business email compromise incident.

Compliance Fines and Regulatory Penalties

Protection against resulting fines from compliance violations and penalties.

Business Income Loss Protection

Expenses that compensate business income losses due to down-time.

Legal Liability Protection

Legal expenses resulting from ransomware and business email compromise event.

Coverage
Options

360°
PROTECTION
Available through an external protection partner
Cyber Incident
$1MM Coverage
$500K Coverage
$100K Coverage

Ransomware and BEC Incident

Business Email Compromise and ransomware attacks

$200K
$100K
$100K
(Ransom Only)

Compliance Fines and Regulatory Penalties

Regulatory violations and compliance-related fines

$200K
$100K
-

Business Income Loss Protection

Revenue loss due to cyber incidents

$100K
$50K
-

Legal Liability Protection

Legal costs and liability coverage

$500K
$250K
-

Built for Small and Midsize Organizations

For organizations that want stronger resilience but are not ready for every enterprise-level insurance or security investment, these protection options can be a practical way to add another layer of confidence alongside core cybersecurity services.

Explore Your Protection Options

We can help you evaluate whether your environment may qualify for added protection benefits and what combination of security controls makes the most sense for your business.

Schedule a Protection Review View Service Options