{"id":37549,"date":"2022-09-15T15:30:05","date_gmt":"2022-09-15T14:30:05","guid":{"rendered":"https:\/\/www.n-able.com\/?p=37549"},"modified":"2022-09-15T15:40:25","modified_gmt":"2022-09-15T14:40:25","slug":"cybersecurity-insurance-trends-key-takeaways-msps","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/cybersecurity-insurance-trends-key-takeaways-msps","title":{"rendered":"Cybersecurity Insurance Trends: Key Takeaways for MSPs"},"content":{"rendered":"<p class=\"p2\"><span class=\"s1\">The increasing frequency and severity of ransomware attacks are driving significant changes in the cyber insurance market. The <a href=\"https:\/\/www.techtarget.com\/whatis\/feature\/Colonial-Pipeline-hack-explained-Everything-you-need-to-know#:~:text=The%20Colonial%20Pipeline%20was%20the,airlines%20along%20the%20East%20Coast.\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">May 2021 attack on Colonial Pipeline Co.<\/span><\/a> showed\u2014or rather, confirmed\u2014just how vicious and financially damaging these events can be. Unsurprisingly, cyber security insurers are taking steps to limit their exposure to losses from cyberattacks. While some of these changes are small and reasonable, like requiring broader use of MFA, insurers like <a href=\"https:\/\/www.csoonline.com\/article\/3670571\/lloyd-s-of-london-to-exclude-state-backed-attacks-from-cyber-insurance-policies.html\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Lloyd\u2019s of London<\/span><\/a> are also moving to place tighter exclusions around state-backed cyberattacks within their policies, which is causing a lot of frustration in the industry, especially among MSP businesses.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">As an MSP\u2019s role is to manage their clients\u2019 IT assets, data, and business processes, they have become an attractive attack vector for cybercriminals. In fact, in a recent report, N&#8209;able found that <a href=\"https:\/\/www.n-able.com\/resources\/state-of-the-market-the-new-threat-landscape?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">MSPs are fast becoming primary targets for cyberattacks<\/span><\/a>, with 90% having seen an increase in attacks on their business since the pandemic started. This means that insurers now see MSP businesses as representing a greater risk, and as a result MSPs applying for cyber insurance cover are seeing tougher application criteria and increased rates.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">In this blog, I\u2019ll highlight some key things MSPs should keep in mind when applying for cyber insurance and some best practices to help them navigate the process of getting proper cyber insurance cover, as well as how having the right tools (from <a href=\"https:\/\/www.n-able.com\/products\/endpoint-detection-and-response?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">EDR<\/span><\/a> to <a href=\"https:\/\/www.n-able.com\/products\/cove-data-protection?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">data protection<\/span><\/a>) can help reduce perceived risk.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Let\u2019s start from the top.<\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">What is cybersecurity insurance?<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">Cybersecurity insurance, also referred to as cyber insurance or cyber liability insurance, is an insurance policy that provides coverage for business losses caused by cyberattacks, data breaches, or other technology-related risks.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">It\u2019s important to note that policy agreements vary from insurer to insurer. While some insurers may provide only a single cybersecurity insurance policy, others may offer multiple distinct policy agreements. Additionally, some insurers may also offer first-party and third-party cybersecurity liability insurance separately, and it\u2019s important that MSPs understand the difference here:<\/span><\/p>\n<ul>\n<li class=\"p4\"><span class=\"s1\"><strong>First-party cybersecurity liability insurance<\/strong> provides coverage for cyberattacks, data breaches, or other covered events involving the insured business and can help reduce the financial burden associated with responding to the event.<\/span><\/li>\n<li class=\"p5\"><span class=\"s1\"><strong>Third-party insurance<\/strong> provides coverage for the insured business against claims made by a third-party that the actions of the insured business caused damages to the third-party. This provides protection for businesses like MSPs and other IT service providers that are responsible for maintaining a client\u2019s IT infrastructure or defending a customer against cyberattacks, data breaches, or other security incidents.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/li>\n<\/ul>\n<p class=\"p3\"><span class=\"s1\">Also, some insurers may offer data breach insurance separately. This type of insurance often has a narrower scope of what qualifies for coverage than cyber liability insurance, offering first-party coverage for costs associated with a breach where the covered sensitive information is stolen, lost, or otherwise improperly shared with an unauthorized third party.<\/span><\/p>\n<table width=\"100%\" bgcolor=\"#8742f5\">\n<tbody>\n<tr>\n<td height=\"10\"><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td width=\"1%\"><\/td>\n<td width=\"98%\"><span style=\"color: white\"><b><i>Be Aware:<\/i><\/b><i> Third-party cyber liability insurance does not cover the financial costs associated with an MSP responding to an incident at a customer. It would only protect the MSP in the event the third party (their customer) sought to recover damages incurred because of a cyber incident. This means that if a customer does not have their own first-party cyber liability coverage then the cost of responding to an incident would have to come out of their own pocket, or they could seek to recover their losses by suing.<\/i><\/span><\/td>\n<td width=\"1%\"><\/td>\n<\/tr>\n<tr>\n<td height=\"10\"><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><\/h2>\n<h2 class=\"p3\"><span class=\"s1\">How much does cybersecurity insurance cost?<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">As with the policy agreements, the cost of cyber insurance policies varies a lot too. Many factors influence cyber insurance premiums, from company size and annual revenue to coverage level and claims history, they can also vary between country or state. However, risk exposure and the level of coverage you choose are the most influential factors.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">According to a <a href=\"https:\/\/advisorsmith.com\/business-insurance\/cyber-liability-insurance\/cost\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">recent industry study<\/span><\/a>, in 2021 the average cost of cyber insurance for companies in the U.S. with moderate risk was around $1,500 per year. The rise in ransomware attacks and data breaches has subsequently increased companies\u2019 risk exposure, leading to higher premiums. In fact, the same study reports an average increase of 25% in premiums for 2022, with some companies paying as much as 80% more. The <a href=\"https:\/\/www.marsh.com\/us\/services\/international-placement-services\/insights\/global_insurance_market_index.html\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Marsh Global Insurance Market Index<\/span><\/a> shows significant cyber insurance price increases in all geographies, not just the U.S..<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">For 2023, the outlook for companies looking to access cyber insurance is quite gloomy. Experts are warning that <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/firms-unable-access-cyberinsurance\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">many organizations may not be able to get cover<\/span><\/a> due to the surge in cyber threats, economic struggles, and changing regulations.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">However, you should not lose hope.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<table width=\"100%\" bgcolor=\"#8742f5\">\n<tbody>\n<tr>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td width=\"1%\"><\/td>\n<td width=\"98%\"><span style=\"color: white\"><b><i>Be Aware: <\/i><\/b><i>Dependent on the security controls you have in place and how many cyber insurance requirements they help you meet, you could still potentially obtain a lower cyber insurance premium.<\/i><\/span><\/td>\n<td width=\"1%\"><\/td>\n<\/tr>\n<tr>\n<td height=\"10\"><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><\/h2>\n<h2 class=\"p3\"><span class=\"s1\">What are the most common cybersecurity insurance requirements?<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">To assess the amount of coverage you need,<b> <\/b>your business will have to go through a risk assessment. Part of the risk assessment requires the business being insured to fill out a questionnaire outlining their cybersecurity insurance requirements. Again, these questionnaires can vary a lot between insurers, as there is no commonly accepted questionnaire template in the industry. But while the individual questions vary, they can still be grouped into a few broad categories:<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<ul>\n<li class=\"p4\"><span class=\"s1\">General Information\u2014Company name, revenue, etc.<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">People\u2014Roles and responsibilities<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">Technology\u2014Information technology solutions in use, including single point solutions like EDR or AV<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">Processes\u2014How technology is used in the business, workflows, etc.<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">Data and Data Collection\u2014Type of data being held, who owns it, process it, etc.<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">Security Controls\u2014Secure IT configurations, physical security, best practices, NIST CSF, CIS Controls being followed<\/span><\/li>\n<li class=\"p5\"><span class=\"s1\">Historical and Previous Claims\u2014Previous events related to insurability<\/span><\/li>\n<\/ul>\n<p class=\"p3\"><span class=\"s1\">In terms of security controls, it\u2019s increasingly apparent that some tools and services are becoming \u201cmust-haves\u201d for cyber insurance coverage\u2014these include, multi-factor authentication, vulnerability scanning, <a href=\"https:\/\/www.n-able.com\/products\/endpoint-detection-and-response?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">endpoint detection and response<\/span><\/a>, backups, and business continuity planning. While additional ones, such as privileged access management, may also help lower the rates. However, again, because of the lack of any defined standards, \u201cmust-haves\u201d and \u201cgood-to-haves\u201d can also vary from insurer to insurer.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<table width=\"100%\" bgcolor=\"#8742f5\">\n<tbody>\n<tr>\n<td height=\"10\"><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td width=\"1%\"><\/td>\n<td width=\"98%\"><span style=\"color: white\"><b><i>Be Aware: <\/i><\/b><i>It\u2019s important to provide factually correct information on these questionnaires as well as any other questions asked by the insurer. You must never get creative with your answers or take shortcuts to speed through the risk assessment process. Misrepresentation of any information provided to the insurer may provide grounds for the insurer to refuse to pay any future claims.<\/i><\/span><\/td>\n<td width=\"1%\"><\/td>\n<\/tr>\n<tr>\n<td height=\"10\"><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><\/h2>\n<h2 class=\"p3\"><span class=\"s1\">Key Takeaways for MSPs<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">Cybersecurity Insurance can be an intimidating project to tackle. However, familiarizing yourself with the types of policies on the market and the different requirements you\u2019re likely to be faced with can help alleviate some of the anxiety that comes with it. Also, it\u2019s crucial to have a clear understanding of the risk your business presents and the risk exposure you face from your clients before you start.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">MSPs need to be mindful of the differences between first-party and third-party cybersecurity coverage. And more importantly, you need to remember that as an MSP or IT service provider, the first-party cybersecurity insurance cover you receive for your own business does not confer any benefits to a client if they suffer a cyber threat event.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Also keep in mind that the process of getting cyber insurance coverage is one thing; making a claim in the event of a successful cyberattack is another. Make sure you can demonstrate you have taken due care in implementing a solid security posture with documentation and auditability of security controls that are in place\u2014you don\u2019t want to find yourself in a situation where an insurer may have cause to deny a claim.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Ensure that you fully assess your security posture and that of your customers, and ensure you have a strong baseline for security. If you need ideas on where to start, put in place a solid security baseline such as the <a href=\"https:\/\/www.cisecurity.org\/controls\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CIS Controls v8<\/span><\/a> for <a href=\"https:\/\/www.cisecurity.org\/controls\/implementation-groups\/ig1\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Implementation Group 1<\/span><\/a> and enforce it across all your customers. And then think about what additional security controls, such as those in <a href=\"https:\/\/www.cisecurity.org\/controls\/implementation-groups\/ig2\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">IG2<\/span><\/a> and <a href=\"https:\/\/www.cisecurity.org\/controls\/implementation-groups\/ig3\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">IG3<\/span><\/a>, that you can add to strengthen your posture and possibly lower your cyber insurance premiums.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">And last, but not least, remember that your business is on the line. If unsure, seek legal counsel familiar with the MSP space and cyber insurance.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><b>If you are pressed for time and resources and need to get started with improving the security posture of your clients today, you\u2019re not out of luck. There are some quick wins that anyone can implement in almost every environment. Making the move from legacy AV to an <\/b><a href=\"https:\/\/www.n-able.com\/products\/endpoint-detection-and-response?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\"><b>Endpoint Detection and Response<\/b><\/span><\/a><b> solution and from on-site, image based backups to more modern off-site first <\/b><a href=\"https:\/\/www.n-able.com\/products\/cove-data-protection?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\"><b>data protection<\/b><\/span><\/a><b> solutions can help you meet or even exceed the requirements asked for by many cyber liability insurance providers. Check out <\/b><a href=\"https:\/\/www.n-able.com\/products\/endpoint-detection-and-response\/demo?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\"><b>N&#8209;able EDR<\/b><\/span><\/a><b> and <\/b><a href=\"https:\/\/www.n-able.com\/products\/cove-data-protection\/trial?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\"><b>Cove Data Protection<\/b><\/span><\/a><b> to find out how we can help meet your business\u2019 requirements.<\/b><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><b><i>For more security insights and best practices, be sure to check out the <\/i><\/b><a href=\"https:\/\/www.n-able.com\/security-and-privacy\/security-resources\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\"><b><i>security events organized by N&#8209;able\u2019s Head Nerds.<\/i><\/b><\/span><\/a><\/span><\/p>\n<p class=\"p7\"><span class=\"s1\"><i>Lewis Pope is the Head Security Nerd at N&#8209;able. You can follow him on Twitter:\u00a0<\/i><a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s6\"><i>@cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p8\"><span class=\"s7\"><i>LinkedIn:\u00a0<\/i><a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\"><span class=\"s8\"><i>thesecuritypope<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p8\"><span class=\"s7\"><i>Twitch:\u00a0<\/i><a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s8\"><i>cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Insurance can be an intimidating project to tackle. Lewis Pope looks at some key things MSPs need to know before setting out to get covered.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-37549","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity Insurance Trends: Key Takeaways for MSPs - N-able<\/title>\n<meta name=\"description\" content=\"Cybersecurity Insurance can be an intimidating project to tackle. This blog looks at some key things MSPs need to know to get covered.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/cybersecurity-insurance-trends-key-takeaways-msps\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Insurance Trends: Key Takeaways for MSPs - N-able\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity Insurance can be an intimidating project to tackle. This blog looks at some key things MSPs need to know to get covered.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/cybersecurity-insurance-trends-key-takeaways-msps\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-15T14:30:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-15T14:40:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/09\/220912_blogbanner_CybersecurityInsurance_ss.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/09\/220912_blogbanner_CybersecurityInsurance_ss.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/cybersecurity-insurance-trends-key-takeaways-msps#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/cybersecurity-insurance-trends-key-takeaways-msps\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"Cybersecurity Insurance Trends: Key Takeaways for MSPs\",\"datePublished\":\"2022-09-15T15:30:05+01:00\",\"dateModified\":\"2022-09-15T14:40:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/cybersecurity-insurance-trends-key-takeaways-msps\"},\"wordCount\":1543,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"articleSection\":[\"Head Nerds\",\"Security\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/cybersecurity-insurance-trends-key-takeaways-msps\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/cybersecurity-insurance-trends-key-takeaways-msps\",\"name\":\"Cybersecurity Insurance Trends: Key Takeaways for MSPs - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2022-09-15T15:30:05+01:00\",\"dateModified\":\"2022-09-15T14:40:25+00:00\",\"description\":\"Cybersecurity Insurance can be an intimidating project to tackle. This blog looks at some key things MSPs need to know to get covered.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/cybersecurity-insurance-trends-key-takeaways-msps#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/cybersecurity-insurance-trends-key-takeaways-msps\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/cybersecurity-insurance-trends-key-takeaways-msps#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Head Nerds\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/head-nerds-pt-br\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Insurance Trends: Key Takeaways for MSPs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Insurance Trends: Key Takeaways for MSPs - N-able","description":"Cybersecurity Insurance can be an intimidating project to tackle. This blog looks at some key things MSPs need to know to get covered.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/cybersecurity-insurance-trends-key-takeaways-msps","og_locale":"pt_BR","og_type":"article","og_title":"Cybersecurity Insurance Trends: Key Takeaways for MSPs - N-able","og_description":"Cybersecurity Insurance can be an intimidating project to tackle. This blog looks at some key things MSPs need to know to get covered.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/cybersecurity-insurance-trends-key-takeaways-msps","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2022-09-15T14:30:05+00:00","article_modified_time":"2022-09-15T14:40:25+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/09\/220912_blogbanner_CybersecurityInsurance_ss.jpg","type":"image\/jpeg"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/09\/220912_blogbanner_CybersecurityInsurance_ss.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Lewis Pope","Est. tempo de leitura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/cybersecurity-insurance-trends-key-takeaways-msps#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/cybersecurity-insurance-trends-key-takeaways-msps"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"Cybersecurity Insurance Trends: Key Takeaways for MSPs","datePublished":"2022-09-15T15:30:05+01:00","dateModified":"2022-09-15T14:40:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/cybersecurity-insurance-trends-key-takeaways-msps"},"wordCount":1543,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"articleSection":["Head Nerds","Security"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/cybersecurity-insurance-trends-key-takeaways-msps","url":"https:\/\/www.n-able.com\/pt-br\/blog\/cybersecurity-insurance-trends-key-takeaways-msps","name":"Cybersecurity Insurance Trends: Key Takeaways for MSPs - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2022-09-15T15:30:05+01:00","dateModified":"2022-09-15T14:40:25+00:00","description":"Cybersecurity Insurance can be an intimidating project to tackle. This blog looks at some key things MSPs need to know to get covered.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/cybersecurity-insurance-trends-key-takeaways-msps#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/cybersecurity-insurance-trends-key-takeaways-msps"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/cybersecurity-insurance-trends-key-takeaways-msps#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Head Nerds","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/head-nerds-pt-br"},{"@type":"ListItem","position":2,"name":"Cybersecurity Insurance Trends: Key Takeaways for MSPs"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/37549","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=37549"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/37549\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=37549"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}