Platinum.
See the newest premium analysis and recently added content
Advanced Strategic Reviews
Platinum Library
Advanced Strategic Reviews Platinum Library
Thoughtfully crafted to help business thrive
Review the Platinum Library
The Platinum Library is the premium archive of 365 Risk Desk, giving members access to advanced risk intelligence, strategic reviews and high value decision tools for sharper commercial judgment
Our Most Popular Guide of 2026
The Business Owner’s Complete Guide to Cyber Risk in 2026
What It Costs, How It Happens and What Better Prepared Businesses Do Differently
Draws on insurer, regulatory and market research current as at April 2026. General commercial information, not regulated advice.
What Cyber Risk Means for a Business Owner in 2026
Cyber risk is often discussed as a technical issue, but for a business owner it is more useful to treat it as an operating and financial risk. When systems fail, payments are delayed, orders stop moving, suppliers are disrupted, customers lose confidence and management attention is pulled into crisis mode. The technology matters, but the commercial effect is what usually does the damage.
That is why this guide matters. A cyber event does not need to become a headline-making breach to create serious disruption. For a growing business, the combination of downtime, uncertainty, notification obligations, contract pressure and recovery cost can quickly turn a technical failure into a board-level problem.
Cyber risk is a commercial problem with a technology dimension. It affects revenue, customer relationships, regulatory standing, insurance costs, supply chain integrity, investor confidence and in some cases the viability of the business itself. The Allianz Risk Barometer, which surveys over 3,300 risk management professionals across 97 countries and territories, ranked cyber incidents as the number one global business risk for 2026. It is the fifth consecutive year that cyber has held the top position. In 2026 it achieved its highest ever score in the survey, sitting a full 10% ahead of the second ranked risk. That second ranked risk, incidentally, is now artificial intelligence, which climbed from tenth place the previous year to second place in 2026. Both cyber and AI now rank in the top five risks across every region and almost every industry sector analysed in the survey.
Those numbers are not abstract. They reflect what risk professionals are seeing inside real organisations. In Nardello and Co’s January 2026 UK survey, nearly six in ten business leaders identified cyber breaches as one of their most significant areas of concern, and around two in ten respondents said their business had experienced a cybersecurity breach in the previous two years. For a scaling business, that is a prompt for serious commercial reflection rather than a reason for complacency.
Why the Last Three Years Changed Everything
Three structural shifts have fundamentally altered the cyber risk environment since 2023, and each one compounds the others.
The first is the acceleration of AI as both a defensive tool and an offensive weapon. Threat actors are now using artificial intelligence to automate reconnaissance, develop exploits and scale social engineering campaigns with a speed and sophistication that was not previously achievable. According to Marsh’s cyber risk predictions for 2026, AI powered malware that can dynamically rewrite its own code during an attack to evade detection is already being developed, and the market expects a fuller black market in these tools to emerge this year. This risk is no longer theoretical and deserves to be treated as a live commercial issue.
The second shift is the regulatory tightening. The proposed UK Cyber Security and Resilience Bill would widen the UK cyber regulatory perimeter, introduce faster incident reporting requirements for in scope entities and bring a broader range of organisations and service providers into scope than before. The EU AI Act also introduces a tiered penalty framework, with the most severe penalties reaching 35 million euros or 7% of global turnover for prohibited practices and lower but still material ceilings applying to other breaches. Businesses that previously operated outside more formal governance frameworks now face compliance demands that were once associated more closely with heavily regulated sectors. The commercial implications of that shift are significant and, for many owners, not yet fully understood.
The third shift is systemic dependency. Cloud services now sit at the core of operations for a large share of organisations. Three global providers control over 60% of cloud infrastructure. That level of concentration creates a systemic exposure that did not exist at this scale five years ago. When a cloud provider experiences an outage or a breach, the commercial consequences can cascade through every business that depends on its infrastructure. Only 3% of organisations consider their supply chains very resilient. That Allianz Risk Barometer 2026 finding is a clear warning about systemic dependency.
Why Risk Compounds as a Business Scales
A business with ten employees and a simple technology stack has a certain level of cyber exposure. That exposure is real, but it is contained. The same business at 50 employees, with a CRM system, a cloud accounting platform, three or four SaaS applications, remote workers, customer data obligations and two or three key supplier integrations has a fundamentally different risk profile. The attack surface has expanded. The number of potential entry points has multiplied. The commercial consequences of an incident have grown in direct proportion to the complexity of the operations that would be disrupted.
This is the dynamic that most scaling business owners underestimate. They assume that the cyber controls that were adequate at an earlier stage of growth remain adequate as the business expands. They rarely are. Every new employee, every new software integration, every new customer contract with data handling obligations, every new supplier relationship creates additional exposure. The businesses that manage this well treat cyber risk as a continuously evolving commercial consideration. The ones that do not tend to discover the gaps only when an incident forces them to.
One of the most common and costly assumptions among scaling business owners is that cyber incidents mainly happen to larger organisations. In practice, attackers often target smaller and mid sized organisations precisely because they tend to have weaker controls, fewer resources dedicated to security and less mature incident response capabilities. A business turning over £5 million with 30 employees and poor access controls is, from an attacker’s perspective, often an easier and more profitable target than a large enterprise with a dedicated security operations centre.
The Real Anatomy of a Cyber Incident
When a cyber incident occurs, the first thing the management team loses is certainty. It does not yet know what has happened, how far the compromise extends, what data has been affected or how long the disruption will last. That uncertainty is often the most commercially damaging element of an incident, because it slows decision making at exactly the point where clear judgment matters most.
Understanding what actually happens during and after a cyber incident, not in technical terms but in commercial terms, is essential for any business owner who wants to make informed decisions about risk, investment and insurance. This section walks through the timeline from initial breach to full commercial consequence and examines the specific types of incident most relevant to scaling businesses.
The Timeline of Commercial Impact
Most cyber incidents follow a broadly similar commercial trajectory, regardless of the specific technical vector involved.
In the first hours, the immediate priority is containment. The business needs to determine what has been compromised, isolate affected systems and prevent further damage. This is typically where an incident response team, whether internal or external, begins forensic investigation. For a business without a pre agreed incident response retainer, simply finding and engaging the right specialists under pressure can cost critical time. During this phase, affected systems are usually taken offline. Depending on which systems are involved, this can mean a complete halt to operations, order processing, customer communication and revenue generation.
In the first days, the scope of the compromise becomes clearer but rarely complete. The forensic investigation may reveal that the attacker had access to systems for weeks or months before the incident became visible. Data exfiltration, where an attacker copies sensitive data before deploying ransomware or triggering other disruption, is increasingly common and often only discovered during forensic analysis. At this stage, the business is simultaneously managing technical remediation, legal obligations, customer and stakeholder communication, regulatory notification requirements and the commercial reality of lost revenue. The management team is typically consumed by the incident, which means that normal business operations, even those not directly affected, suffer from the diversion of leadership attention.
In the weeks that follow, the direct costs mount. Technical remediation, forensic investigation fees, legal counsel, regulatory notification, customer notification and credit monitoring obligations can collectively reach six or seven figures depending on the nature and scale of the incident. But the indirect costs often exceed the direct ones. Business interruption losses, customer churn, reputational damage, increased insurance premiums at renewal, recruitment difficulties following a public incident and the sheer management time consumed by recovery can persist for months or even years after the technical incident has been resolved.
Ransomware: The Commercial Mechanics
Ransomware remains the most commercially devastating category of cyber incident for scaling businesses. The attack model is straightforward. An attacker gains access to a business’s systems, deploys encryption across the network and demands payment in exchange for the decryption key and, increasingly, a promise not to publish stolen data.
The commercial damage mechanism extends far beyond the ransom demand itself. When encryption spreads across a business’s servers, the operational impact is immediate and total. The Allianz Risk Barometer 2026 notes that traditional recovery techniques are being rendered ineffective by rapidly spreading encryption deployed by increasingly effective malware. This means that even businesses with backup systems in place may find that their backups are compromised, out of date or insufficient to restore full operations quickly.
The Jaguar Land Rover cyber incident is a useful illustration of how disruption can spread beyond the directly affected company. Allianz Commercial, citing Cyber Monitoring Centre modelling, said the event may have affected more than 5,000 organisations in JLR’s supply and distribution chain and estimated economic impact at up to roughly £2.1 billion. That figure is better treated as an estimate than a settled final loss number, but the wider point stands. When a major operator stops, the commercial shock can travel well beyond the original victim.
The supply chain dimension is particularly significant. Ransomware impacts are now felt throughout interconnected supply chains due to the highly integrated nature of modern business operations. A breach at a single supplier can halt production for dozens of downstream businesses. A scaling business that depends on a technology provider or logistics partner with weak security controls inherits the risk profile of that partner, whether it realises it or not.
Business Email Compromise: Quiet, Precise and Expensive
Business email compromise does not attract the same headlines as ransomware, but it remains one of the most financially damaging categories of cyber incident for businesses of all sizes. The attack model involves an attacker gaining access to a legitimate email account, typically through phishing or credential theft, and using that access to redirect payments, issue fraudulent invoices or manipulate financial processes.
The commercial damage mechanism is deception. Because the communication comes from a legitimate internal email account, it bypasses the instinctive scepticism that most employees apply to external requests. A finance team member receiving an email from what appears to be the managing director instructing a change to supplier payment details has no obvious reason to question it. The loss is often discovered only when the legitimate supplier chases for unpaid invoices days or weeks later.
What makes business email compromise particularly dangerous for scaling businesses is that the controls which prevent it are primarily procedural rather than technical. Technical defences can reduce the likelihood of an account being compromised in the first place, but the actual financial loss occurs because of a process failure. A business that does not require verbal confirmation of payment changes, dual authorisation for transactions above a certain threshold or independent verification of new banking details is structurally vulnerable to this type of attack regardless of how strong its technical security may be.
Third Party Breach: The Risk You Cannot Directly Control
A third party breach occurs when an attacker compromises a supplier, technology provider or service partner and uses that access to reach downstream businesses. This category of incident is growing in both frequency and severity as businesses become more interconnected through shared platforms, API integrations and cloud infrastructure.
The commercial challenge with third party risk is that a business can have excellent internal security controls and still suffer significant commercial damage because of weaknesses in an organisation it depends on but does not control. The lack of reliable, accurate information from third and fourth party suppliers exacerbates this problem. According to Deloitte’s 2026 technology and digital risk report, cyberattacks, data breaches and compliance failures in third party ecosystems are frequent occurrences. Businesses often do not know what they do not know about the risk posture of the organisations their operations depend on.
For scaling businesses, this risk is amplified by the tendency to onboard new tools, platforms and suppliers rapidly during growth phases without conducting thorough security assessments. Every new SaaS platform, every new supplier integration and every new data sharing arrangement creates an additional dependency that the business may not be actively monitoring for security risks.
Data Exfiltration and Account Takeover
Data exfiltration involves an attacker copying sensitive data from a business’s systems. This can occur as a standalone incident or as a precursor to a ransomware attack. The commercial consequences are significant. Depending on the nature of the data compromised, the business may face mandatory notification requirements under data protection legislation, customer remediation costs, regulatory investigation and enforcement action, reputational damage and the potential loss of customer relationships.
Account takeover, where an attacker gains control of user accounts through credential theft, phishing or brute force attacks, is often the mechanism through which other types of incident are initiated. A compromised admin account can provide access to customer data, financial systems, email infrastructure and cloud resources. The commercial impact depends on what the attacker does with that access, but the underlying vulnerability is the same. Weak authentication, poor password practices and the absence of multi factor authentication are the primary enablers.
What It Costs
Most business owners, when they think about the cost of a cyber incident at all, think about it in terms of the immediate technical fix. Get the systems back online, restore the data, move on. That framing materially understates the true commercial impact.
The cost of a cyber incident is not a single number. It is a cascade of direct costs, indirect costs, regulatory costs and long tail commercial consequences that can affect a business for years after the technical incident has been resolved. Business interruption is often the most expensive component of a cyber claim. When operations stop, revenue stops. But the financial bleeding extends far beyond lost trading days.
The Direct Cost Stack
The direct costs of a cyber incident begin accumulating from the moment the incident is discovered and continue for weeks or months afterwards. Forensic investigation is typically the first significant expense. Determining the scope of the compromise, identifying the attack vector, assessing what data has been affected and establishing whether the attacker still has access requires specialist expertise that commands premium rates, particularly when engaged under the time pressure of an active incident.
Legal fees follow closely behind. A business that has suffered a data breach needs immediate legal guidance on its notification obligations, regulatory exposure, contractual liabilities and potential litigation risk. For businesses subject to the UK GDPR, mandatory notification to the Information Commissioner’s Office must occur within 72 hours of becoming aware of a breach that poses a risk to individuals. Customer notification obligations may follow, along with the cost of providing credit monitoring services to affected individuals.
Technical remediation, the cost of actually restoring systems, rebuilding infrastructure and implementing additional controls to prevent recurrence, varies enormously depending on the nature and severity of the incident. A ransomware attack that encrypts an entire network and compromises backups may require a complete infrastructure rebuild. A business email compromise that redirects a single payment may require relatively minimal technical remediation but significant process changes.
The Indirect Costs That Nobody Budgets For
The indirect costs of a cyber incident are where the commercial damage becomes truly significant, and they are the costs that most business owners fail to anticipate.
Business interruption is the dominant indirect cost. Every day that a business cannot operate at full capacity represents lost revenue, delayed orders, contractual penalties and the compound effect of operational disruption on customer relationships. For a scaling business in a competitive market, even a week of reduced capacity can result in lost customer opportunities that never return. Customers who experience service disruption during an incident may accelerate conversations with competitors that were previously dormant.
Reputational damage is difficult to quantify but commercially real. A public cyber incident creates a narrative around a business that can persist in customer and partner perceptions long after the technical issue has been resolved. In competitive tender situations, a recent cyber incident can be the deciding factor that moves a prospective customer to a competitor. In investor due diligence, a history of cyber incidents raises questions about operational governance that can affect valuation and funding terms.
Management time is the hidden cost that almost never appears in post incident analyses. During an active incident and through the recovery period, the senior leadership team is overwhelmingly focused on managing the crisis. That means they are not managing the business. Strategic initiatives stall. Sales conversations are deprioritised. The routine operational decisions that keep a growing business on track are deferred or delegated downward. The opportunity cost of that leadership diversion can be substantial.
Recruitment difficulty following a public incident is an underappreciated consequence. Skilled technology professionals are in high demand and have choices about where they work. A business that has recently suffered a major cyber incident may find it harder to attract the technical talent it needs for recovery and future resilience, creating a structural disadvantage that persists well beyond the immediate aftermath.
The Regulatory Cost
The regulatory dimension of cyber cost is changing rapidly and the direction of travel is unambiguously toward greater obligations and more severe consequences for non compliance.
The proposed UK Cyber Security and Resilience Bill would shorten the reporting window for certain incidents affecting in scope entities. That potential shift has immediate practical significance. A faster reporting timetable fundamentally changes what needs to be in place before an incident occurs. The business needs pre agreed internal escalation processes, clear decision making authority, contact details for legal counsel and forensic specialists that are accessible outside business hours and a communications plan that can be activated under extreme time pressure.
Under the EU AI Act, the most severe penalties can reach 35 million euros or 7% of global turnover for prohibited practices, while lower but still significant tiers apply to other compliance failures. For a scaling business with EU market exposure, the commercial risk of non compliance is material. The Act imposes specific obligations around transparency, human oversight, data governance and risk management for systems classified as high risk. Organisations in retail, manufacturing, healthcare and energy may therefore face compliance demands that require meaningful investment in governance and documentation.
The Supply Chain Cost Multiplier
Only 3% of organisations consider their supply chains very resilient. That figure from the Allianz Risk Barometer 2026 reveals a systemic vulnerability that sits underneath the majority of businesses.
When a cyber incident affects a supplier, the commercial consequences cascade through every business that depends on that supplier’s products or services. The Jaguar Land Rover ransomware incident, with its £2.1 billion in estimated losses and disruption to more than 5,000 suppliers, demonstrates how quickly direct impacts radiate through interconnected business networks. Most of those 5,000 suppliers did not experience a direct attack. They experienced the commercial consequences of an attack on a business they depended on. Their revenue was disrupted, their operations were affected and their own customers were impacted, all because of a vulnerability in a system they did not control.
For a scaling business, the lesson is that cyber cost is not limited to what happens inside your own network. It includes the potential cost of incidents at any organisation in your supply chain, your technology stack and your customer ecosystem. That is a much larger number than most business owners have accounted for.
The Specific Risks Most Scaling Businesses Are Underweighting
Most cyber risk content covers phishing, ransomware and the importance of strong passwords. Those are real risks and they deserve attention. But some of the risks that matter most to scaling businesses receive less attention precisely because they are more complex, less visible and harder to address with a simple checklist.
Cloud Concentration Risk
A small number of global cloud providers account for the majority of cloud infrastructure spending, with the top three typically representing well over half the market. That level of concentration creates a dependency risk that many business owners have never consciously evaluated.
Cloud concentration risk is not about whether a particular cloud provider is secure. AWS, Microsoft Azure and Google Cloud Platform invest billions of pounds in security. The risk is systemic. When a significant proportion of the global business ecosystem depends on the same small number of infrastructure providers, a single outage, breach or policy change at one of those providers can affect thousands of businesses simultaneously. The Allianz Risk Barometer 2026 identifies this systemic concentration risk as a growing concern.
For a scaling business, the practical question is not whether to use cloud services. For most organisations, that decision has already been made by the way their operations run. The real question is whether the business understands its cloud dependencies, has evaluated the commercial consequences of an extended outage at its primary cloud provider and has considered whether critical workloads should be distributed across multiple providers or retained on premises where the commercial case supports it.
Cloud infrastructure spending grew by 28% year over year in the third quarter of 2025. That growth rate means that businesses are becoming more cloud dependent, not less. The expanding cloud environment also creates specific risks around data sovereignty, vendor lock in and the difficulty of ensuring data compliance across multiple jurisdictions. A scaling business that stores customer data across regions needs to understand where that data physically resides and what regulatory obligations attach to each location.
Third and Fourth Party Risk
Most businesses conduct some level of due diligence on their direct suppliers. Far fewer extend that scrutiny to the suppliers of their suppliers, the fourth parties whose security posture can have a direct commercial impact on their operations.
The challenge is practical as much as it is strategic. Businesses often do not have visibility into the security practices of the organisations that sit deeper in their supply chain. A managed service provider that handles a business’s IT infrastructure may itself rely on third party tools, hosting providers and software platforms whose security practices are opaque. A breach at any point in that chain can create a pathway into systems that the business assumed were secure.
According to Deloitte’s 2026 technology and digital risk report, cyberattacks, data breaches and compliance failures in third party ecosystems are frequent occurrences. The lack of reliable, accurate information from third and fourth party suppliers makes this one of the most difficult risk categories to manage effectively. But difficulty does not reduce the commercial exposure. It increases it, because the risks that are hardest to see are the ones that are most likely to cause surprise.
AI Related Risks: The Governance Gap
The AI risk landscape has shifted materially. Artificial intelligence climbed from tenth place to second place in the Allianz Risk Barometer in a single year. That pace of change reflects a genuine acceleration in both the opportunities and the risks that AI presents to businesses.
The risk operates on two dimensions simultaneously. Externally, threat actors are using AI to augment traditional attack methods. AI accelerates reconnaissance, automates exploit development and scales social engineering campaigns with speed and sophistication that was not previously achievable. Sophisticated threat groups are using localisation tactics that exploit regional trust and cultural familiarity, making phishing and social engineering attacks significantly more convincing than they were in previous years. This is not theoretical. It is happening in real attacks against real businesses right now.
Internally, the rapid adoption of AI tools within businesses is creating governance gaps that many organisations have not yet closed. Research cited by Red Hat suggests that UK organisations expect to increase AI investment materially, while many are still struggling to convert that activity into measurable customer value. The commercial point is straightforward. Adoption is running ahead of governance in a lot of businesses, and that gap creates exposure.
AI agents within organisations are themselves becoming targets. Prompt injection attacks, where adversaries manipulate AI inputs to leak sensitive data or trigger unauthorised actions, are increasingly being treated as a meaningful governance and security risk. A business that deploys a customer facing AI chatbot connected to internal databases without robust input validation and access controls may be creating a new attack surface that did not previously exist.
The integration challenge compounds the risk. In the Protiviti 2026 Top Risks and Opportunities Survey of over 1,500 board members and C suite leaders, 31% of executives ranked integrating AI with existing technologies as one of their top three AI related risk concerns. That is the joint highest AI related priority, alongside data and cyber risks. The commercial implication is clear. Businesses are adopting AI with enthusiasm but managing its risks with insufficient rigour.
The Human Dimension
No amount of technical investment addresses the primary attack vector in most cyber incidents. The human element, whether through phishing, social engineering, employee error or insider threat, remains one of the principal entry points for attackers. The most technically robust security architecture can be circumvented by a single well crafted email sent to the right person at the right moment.
Scaling businesses are particularly vulnerable to the human dimension of cyber risk because growth typically outpaces security culture. New employees are onboarded quickly, often without thorough security awareness training. Temporary staff, contractors and third party consultants may have access to systems and data without the same level of vetting applied to permanent employees. The informal communication culture that characterises many growing businesses, where rapid decision making is valued over process compliance, creates exactly the conditions that social engineering attacks are designed to exploit.
The challenge is not that business owners are unaware of the human element. It is that their response to it is often inadequate. An annual compliance training module completed in twenty minutes does not materially change employee behaviour. The businesses that manage human risk effectively treat it as a continuous programme of awareness, testing and cultural reinforcement rather than a tick box exercise completed once a year.
Growth Stage Risks
Specific risks emerge at each stage of business growth that are distinct from the general cyber risks all organisations face.
When a business adds headcount rapidly, the administrative processes around access management, device provisioning and security onboarding come under strain. Employee accounts that should be deactivated when someone leaves remain active. Access permissions granted for a specific project are never revoked. The technology stack expands as individual teams adopt tools that solve immediate operational problems without evaluating their security implications. Each of these creates incremental exposure that compounds over time.
When a business takes on larger customers, particularly enterprise clients with mature security requirements, it inherits obligations that may not be reflected in its existing controls. A supplier security questionnaire from a major customer can reveal gaps that the business did not know it had. Failing to meet those requirements does not just create risk. It can cost the business commercially significant customer relationships.
When a business prepares for investment or acquisition, its cyber security posture becomes a due diligence item. Investors and acquirers increasingly assess cyber resilience as part of their evaluation, and weaknesses identified during that process can affect valuation, deal terms or whether the transaction proceeds at all. The time to address those weaknesses is well before the due diligence process begins, not during it.
The Regulatory Tightening and What It Means Commercially
Regulation does not exist in a vacuum. It reflects the political and commercial response to a problem that has grown large enough to demand intervention. The regulatory tightening around cyber security and data governance in 2026 is significant, and its practical implications extend well beyond the compliance teams of large corporations. Business owners who are not yet paying attention to these developments risk being caught by obligations they did not anticipate. The regulatory position described here reflects the picture as at April 2026.
The UK Cyber Security and Resilience Bill
The UK Cyber Security and Resilience Bill introduced in 2025 would represent one of the most significant expansions of the UK’s cyber regulatory framework since the original NIS Regulations came into force. It would extend the framework to additional managed service providers and supporting data infrastructure, which means that businesses relying on these services could be affected indirectly even if they do not sit within the regulatory perimeter themselves.
A proposed 24 hour initial reporting requirement for certain incidents is one of the most operationally significant elements. For in scope organisations, that kind of timetable materially changes what needs to be in place before an incident occurs. The business needs pre agreed internal escalation processes, clear decision making authority, contact details for legal counsel and forensic specialists that are accessible outside business hours and a communications plan that can be activated under extreme time pressure.
Consider the practical reality. A business discovers a breach at 5pm on a Friday. The IT manager who first identifies the issue needs to know who to call. That person needs the authority to activate the incident response process. Legal counsel needs to be available to advise on notification obligations. The leadership team needs to convene, assess the situation and authorise the regulatory report. If a shortened reporting window applies, all of this may need to happen within roughly a day. A business that has not rehearsed this process, and does not have its contacts, authorities and protocols documented and accessible, will struggle to meet the timeline. The regulatory pressure then adds another layer to an already costly operational crisis.
The EU AI Act and Its Reach into UK Businesses
The EU AI Act introduces a risk based framework for regulating AI systems, with obligations that vary according to the level of risk the system presents. For UK businesses, the relevance of the EU AI Act depends on whether the business operates in the EU, serves EU customers, or develops AI systems that are deployed in EU markets. Given the interconnected nature of modern business, a significant number of UK organisations will find themselves within scope.
Penalties under the EU AI Act vary by category of breach. The most severe penalties can reach 35 million euros or 7% of global turnover for prohibited practices, while lower tiers apply to many other compliance failures. For a scaling business with EU market exposure, the commercial risk of non compliance is still material. The Act imposes specific obligations around transparency, human oversight, data governance and risk management for systems classified as high risk. Organisations in retail, manufacturing, healthcare and energy may therefore face compliance demands that require meaningful investment in governance and documentation.
The UK Data Use and Access Act changes the UK framework around personal data use and automated decision making rather than simply mirroring the EU approach. Businesses that use AI for customer facing decisions, credit assessments, recruitment screening or operational automation need to understand the legal framework within which those systems operate and how UK and EU requirements may differ in practice. Ignorance of those obligations is not a defence and is not a commercially viable strategy.
FCA Operational Resilience Requirements
Businesses with financial sector exposure face additional regulatory obligations. The FCA’s operational resilience framework under SYSC 15A remains relevant, while newer incident and third party reporting rules have been finalised with future commencement dates. The UK Critical Third Party regime also adds an additional layer for designated providers and the firms that depend on them. The practical point is that financial sector and financial sector facing businesses may need to navigate overlapping frameworks rather than a single simple rule set.
EU DORA requirements create parallel obligations for businesses operating in or serving clients in the European financial sector. The cumulative effect of these overlapping frameworks is that a business providing technology services to financial sector clients may face regulatory obligations from multiple jurisdictions simultaneously. Understanding which frameworks apply, what they require and how to demonstrate compliance is a non trivial commercial undertaking that requires proactive planning rather than reactive response.
What This Means for the Way a Business Operates
The regulatory tightening is not a reason for alarm. It is a reason for commercial preparation. The businesses that approach these changes proactively, that invest in understanding their obligations, building compliant processes and documenting their governance frameworks, will be better positioned than their competitors. Compliance becomes a commercial differentiator when it enables faster, more confident responses to customer requirements, regulatory enquiries and market opportunities.
Compliance concerns, including changing industry regulations and complex enforcement actions, were ranked highly as a top worry by 37% of respondents in Nardello and Co’s research published in January 2026. That level of concern reflects a market that is adjusting to a new regulatory reality. The businesses that adjust fastest will carry the least disruption.
How Insurers Assess and Price Cyber Risk
This section provides general commercial intelligence on how the cyber insurance market operates. It does not constitute insurance advice. Business owners should discuss specific coverage requirements, policy terms and risk transfer strategies with a suitably qualified insurance broker.
The cyber insurance market has matured rapidly over the past five years. The simple application forms and broad policy wordings that characterised the market’s early years have been replaced by sophisticated, data driven underwriting processes that scrutinise a business’s security posture with a level of technical detail that would have been unusual even three years ago. Understanding how insurers assess and price cyber risk is commercially valuable for any business owner, because it reveals what the market considers genuinely important about a business’s security practices.
The Evolution from Forms to Data
The early cyber insurance market relied primarily on proposal forms completed by the applicant. Businesses described their own security controls, their data handling practices and their incident history. Underwriters assessed risk based largely on that self reported information, supplemented by the underwriter’s general market knowledge and claims experience.
That approach had obvious limitations. Self reported information is only as accurate as the respondent’s understanding of their own environment. A business owner who states that multi factor authentication is deployed across the organisation may genuinely believe that to be true, while in practice several legacy systems, admin accounts or remote access points remain protected only by single factor credentials. The gap between perceived security posture and actual security posture is one of the most consistent findings in cyber underwriting.
Modern cyber underwriting increasingly supplements self reported information with external data assessments and technical scanning. Underwriters and their technology partners scan internet facing assets, assess patching cadence, evaluate the configuration of email security protocols, check for exposed credentials on the dark web and review the business’s digital footprint for indicators of vulnerability. This shift means that a business’s security posture is no longer a matter of what it says about itself. It is a matter of what is externally observable and verifiable.
What Underwriters Are Assessing
When a cyber underwriter evaluates a business, the assessment typically covers several key areas. Multi factor authentication deployment is consistently one of the most significant factors. Underwriters want to know whether MFA is in place across email, remote access, privileged accounts and cloud administration. A business that has not deployed MFA across these areas may face restricted terms, higher premiums or, in some cases, difficulty obtaining the breadth of cover it wants.
Backup architecture is another critical assessment area. Underwriters evaluate whether backups are maintained, how frequently they are tested, whether they are stored offline or in a separate environment from the primary systems and whether the business has verified that backups can actually be used to restore operations within a commercially acceptable timeframe. Having backups is not sufficient. Having tested, isolated, recoverable backups is what underwriters are looking for.
Patching cadence, the speed and consistency with which a business applies security updates, is closely scrutinised. Unpatched vulnerabilities are one of the most common entry points for attackers, and underwriters assess patching practices as an indicator of operational security discipline. A business that consistently applies critical patches within a reasonable timeframe demonstrates a level of operational maturity that correlates with lower claim frequency.
Incident response capability is assessed both in terms of whether a documented plan exists and whether it has been tested. Governance maturity, the extent to which cyber risk is understood and actively managed at a leadership level, is increasingly part of the assessment. Underwriters recognise that businesses where cyber risk is a board level or leadership team agenda item tend to have more coherent security programmes and more effective incident response than those where it is delegated entirely to an IT function.
Coverage Gaps That Catch Businesses at Claim Time
Coverage gaps are one of the easiest parts of cyber insurance to misunderstand. A cyber policy is not a blanket guarantee. It is a contract with specific terms, conditions, exclusions and sub limits that can materially affect the scope of coverage at the point a claim is made, and those features can vary materially from one wording to another.
War exclusions have received significant attention in recent years, particularly following the NotPetya attacks which led to disputed claims running into hundreds of millions of pounds. Cyber policies often contain exclusions addressing acts of war or state linked attacks, but the drafting and application can vary materially. The definition of what constitutes an act of war in the context of cyber remains contested and evolving. A business that assumes its policy covers every form of cyber attack without reading the exclusion language may discover, after an incident, that the coverage position is more complex than expected.
Infrastructure exclusions may limit or exclude coverage for losses caused by outages at cloud providers, internet service providers or other infrastructure on which the business depends. If a business’s operations are halted because its primary cloud provider experiences a major outage, the cyber policy may not cover the resulting business interruption unless the policy specifically includes infrastructure failure coverage.
Failure to maintain security standards conditions are increasingly common in cyber policies. These conditions require the business to maintain specific security controls, such as MFA deployment, regular patching or employee training, as a condition of coverage. If the business fails to maintain those controls and subsequently suffers an incident, the insurer may argue that the condition has been breached, which can affect how the claim is handled or paid.
Sub limits on specific categories of coverage, such as ransomware payments, regulatory fines, crisis communication costs or forensic investigation expenses, can mean that the actual coverage available for a particular type of loss is significantly lower than the headline policy limit. A business with a £5 million cyber policy limit may find that the sub limit for ransomware related costs is only £500,000, which may be insufficient for a serious incident.
A Commercially Intelligent Approach to Cyber Insurance
There are several questions that a commercially aware business owner may wish to explore with their broker when reviewing cyber insurance arrangements. These include whether the policy responds to the specific types of incident most relevant to the business, what conditions are attached to coverage and whether the business is confident it meets those conditions, what sub limits apply to key coverage categories, how the war exclusion and infrastructure exclusion are drafted and whether they could affect a claim in a realistic scenario, and whether the policy includes pre incident services such as access to incident response panels or security assessment tools that could reduce the risk of a claim occurring in the first place.
The businesses that achieve the most commercially intelligent outcomes from their cyber insurance tend to be the ones that treat the insurance buying process as a governance exercise rather than a procurement exercise. They understand the policy they are buying. They know the conditions they need to meet. They can demonstrate to underwriters that their security practices are genuine rather than aspirational. That approach tends to produce both more appropriate coverage and more favourable pricing.
What Better Prepared Businesses Do Differently
There is a meaningful commercial difference between a business that navigates a cyber incident with minimal long term damage and one that suffers permanent commercial consequences. That difference is rarely about the sophistication of the technology involved. It is about preparation, governance, decision making speed and the commercial discipline applied before, during and after the event.
Governance as a Commercial Differentiator
The businesses that recover well from cyber incidents almost invariably treat cyber risk as a leadership issue rather than an IT issue. That distinction sounds simple, but it changes everything about how the business prepares for and responds to incidents.
When cyber risk sits on the leadership agenda, it gets the attention, resources and strategic context it requires. Investment decisions are evaluated against the commercial risk they address, not just the technical capabilities they provide. Incident response plans are owned by the leadership team, not by the IT department. The business understands its risk appetite and has made deliberate decisions about what risks to accept, what risks to mitigate and what risks to transfer through insurance.
When cyber risk is delegated entirely to the IT function, it tends to be addressed through a technical lens that does not fully account for the commercial consequences. The IT team may deploy excellent technical controls but lack the authority or budget to address the governance, process and cultural factors that are equally important. The result is a business that looks secure on a technical assessment but is structurally unprepared for the commercial reality of a major incident.
The Investments That Produce Meaningful Risk Reduction
Not all security investments are equally effective. The businesses that achieve genuine risk reduction focus their resources on the controls that address the most likely and most consequential attack vectors, rather than spreading investment thinly across every possible category.
Multi factor authentication is consistently the single most impactful control a business can deploy. It addresses the credential theft and account takeover scenarios that underpin the majority of successful attacks. MFA is not expensive and it is not technically complex. Its absence from a business’s security programme is difficult to justify commercially.
Regular backup testing is more valuable than having backups. A business that maintains backups but has never tested whether those backups can actually restore operations within a commercially acceptable timeframe has a false sense of security. Ransomware attackers increasingly target backup systems specifically, knowing that the ability to restore from backups is the primary alternative to paying the ransom. Backups that are stored offline, tested regularly and verified to be complete provide genuine resilience. Backups that exist but have never been tested provide only the appearance of resilience.
Incident response planning that has been tested through tabletop exercises or simulation usually produces a faster and more coordinated response when a real incident occurs. The businesses that handle incidents better are often the ones where the leadership team has already discussed and agreed the key decisions: who has authority to take systems offline, who contacts legal counsel, who manages customer communication, who interfaces with the insurer and who leads the regulatory notification process. Making those decisions during an active incident is significantly harder and usually leads to weaker outcomes than making them in advance.
Employee training that goes beyond annual compliance exercises produces measurable improvements in an organisation’s resistance to social engineering and phishing attacks. Effective programmes combine regular simulated phishing exercises with short, practical awareness sessions that are specific to the threats most relevant to the business. They create a culture where employees feel comfortable reporting suspicious activity rather than ignoring it or trying to handle it themselves.
Cyber Resilience as Competitive Advantage
The commercial case for treating cyber resilience as a competitive advantage rather than a cost centre is increasingly compelling, particularly for businesses selling to enterprise customers, raising investment or operating in sectors where trust is a primary driver of customer relationships.
Enterprise customers increasingly require suppliers to meet specific security standards as a condition of doing business. A scaling business that can demonstrate mature cyber governance, tested incident response capabilities and appropriate insurance coverage is better positioned to win and retain enterprise contracts than a competitor that cannot. The ability to pass a supplier security assessment quickly and confidently is a commercial capability that directly affects revenue.
Investors and acquirers assess cyber resilience as part of their due diligence process. A business with a documented security programme, clear governance structures and a clean incident history presents a lower risk profile than one with ad hoc security practices and unresolved vulnerabilities. That assessment can materially affect valuation, deal terms and the speed at which a transaction completes.
Customer trust, particularly in sectors where data sensitivity is high, is directly influenced by a business’s perceived security posture. Businesses that can articulate their security practices clearly and confidently in customer conversations build a level of trust that translates into longer customer relationships, higher retention rates and a stronger competitive position.
Building a Cyber Risk Framework for a Scaling Business
A cyber risk framework for a scaling business does not need to replicate the complexity of what a large enterprise deploys. It needs to be practical, proportionate and commercially grounded. The goal is to create a structure that ensures cyber risk is actively managed, that the most important controls are in place and functioning, that the business is prepared to respond effectively when an incident occurs and that insurance coverage reflects the actual risk profile of the organisation.
The Governance Foundations
Every effective cyber risk framework starts with clarity about ownership. Someone in the leadership team needs to own cyber risk. Not in the sense of doing the technical work, but in the sense of being accountable for ensuring the business has an appropriate level of cyber resilience and that cyber risk is regularly reviewed at a leadership level.
Reporting structures matter. Cyber risk should be a standing item on the leadership or board agenda, reviewed at a frequency that reflects the business’s risk profile and the pace of change in its technology environment. The reporting should cover the current threat landscape as it affects the business, the status of key security controls, any incidents or near misses since the last review, and any changes to the business’s technology environment that affect its risk profile.
Escalation paths need to be clear and documented. Everyone in the business needs to know what to do if they suspect a cyber incident. That path should lead to a named individual who has the authority to activate the incident response process and the access to specialist resources needed to manage the situation. The escalation path should work outside business hours, over weekends and during holiday periods. Incidents do not respect office hours.
The Operational Foundations
Certain security controls are genuinely non negotiable regardless of business size. Multi factor authentication across email, remote access and privileged accounts falls into this category. So does regular, tested backup of critical systems and data. So does a patching process that ensures critical security updates are applied within a defined and reasonable timeframe.
Beyond the non negotiables, the operational security programme should be risk based. This means focusing resources on the areas of greatest vulnerability and greatest commercial consequence rather than attempting to address every conceivable risk. For most scaling businesses, the areas that warrant the most attention are access management, ensuring that only authorised users have access to the systems and data they need, endpoint protection, ensuring that devices used to access business systems are secured and monitored, email security, since email remains the primary attack vector for phishing and business email compromise, and third party risk, understanding and managing the security posture of the suppliers and technology providers the business depends on.
Outsourcing security functions can be effective for scaling businesses that do not have the resources to maintain internal capability. Managed security service providers, managed detection and response services and virtual chief information security officer services can provide access to expertise and tooling that would be prohibitively expensive to build internally. The key is to outsource the operational capability while retaining the strategic oversight. A business can outsource the monitoring and management of its security controls. It should not outsource the understanding of its own risk profile or the governance decisions that determine how risk is managed.
The Incident Response Foundations
An incident response plan needs to exist before an incident occurs. The plan does not need to be a hundred pages long. It needs to be clear, practical and accessible. At a minimum, it should cover who to contact in the first hour, including internal escalation, legal counsel, forensic specialists, the insurer’s incident response line and any regulatory notification contacts. It should define who has the authority to make key decisions, such as taking systems offline, engaging external specialists and authorising expenditure on emergency response. It should set out the commercial priorities in the immediate aftermath, including customer communication, regulatory notification, supply chain communication and media management.
The plan needs to be tested. A tabletop exercise, where the leadership team walks through a realistic incident scenario and discusses the decisions they would need to make, is the most effective and least disruptive way to test an incident response plan. The exercise typically reveals gaps in the plan, ambiguities in decision making authority and assumptions about capability that may not hold up under real conditions. Those discoveries are vastly more valuable when they occur during a tabletop exercise than when they occur during an actual incident.
Communication during an incident requires particular care. Customers, suppliers and partners need to be informed with an appropriate level of detail at an appropriate time. Too much information too early can create panic. Too little information too late can destroy trust. The communication approach should be planned in advance, with templates and approval processes agreed before they are needed. A faster regulatory reporting timetable, where applicable, adds time pressure to these communication decisions and makes advance planning even more important.
The Insurance Foundations
Insurance is a critical component of a comprehensive cyber risk framework. It does not replace the need for strong security controls and effective governance, but it provides a financial safety net that can be the difference between a business that recovers from an incident and one that does not.
When approaching the cyber insurance market, a business benefits from understanding what underwriters are looking for and ensuring that its security posture genuinely reflects what it states on its application. Providing accurate, honest information about security controls, governance practices and incident history is both a contractual obligation and a practical necessity. Overstating security practices on an application creates a coverage risk that may only become apparent at the worst possible moment.
Reading and understanding the policy is essential. The specific terms, conditions, exclusions and sub limits that apply to a cyber policy can materially affect whether and how a claim is paid. Business owners who invest the time to understand their coverage, or who work with a broker who explains it in commercially clear terms, are better positioned to make informed decisions about risk transfer and to avoid the coverage gaps that catch many businesses by surprise.
Reviewing coverage annually, rather than simply renewing on existing terms, ensures that the policy reflects the current risk profile of the business. A business that has grown significantly, expanded its technology stack, entered new markets or taken on new regulatory obligations since its last policy review may find that its existing coverage is no longer appropriate for its current exposure.
The Commercial Argument for Taking This Seriously Now
Cyber resilience is not just a compliance issue or a technical hygiene issue. For many businesses it now affects insurability, supplier onboarding, customer confidence, incident recovery speed and the amount of operational disruption a company can absorb when something goes wrong.
Better-prepared businesses tend to move faster in a crisis because roles, controls and escalation paths are already defined. That does not remove cyber risk, but it usually reduces the cost of uncertainty, delay and poor decision-making when an incident occurs.
Forty three percent of executives surveyed in Protiviti’s 2026 Top Risks and Opportunities Survey selected cybersecurity as their top strategic investment priority, ahead of business process improvements and infrastructure modernisation. That gives some indication of where larger leadership teams are directing attention and budget.
The UK cyber security sector contributes £13.2 billion annually to the UK economy and employs around 67,300 people. That scale reflects the commercial reality of the issue. Cyber resilience is no longer a niche concern. It is now part of how businesses protect continuity, credibility and growth.
The practical question for an owner is simple. If a serious incident happened tomorrow morning, would the business know who is responsible, what systems matter most, what external help is already lined up, and whether existing insurance is likely to respond as expected? If the answer is not clear, that is the gap that needs work next.
Source note
This guide draws on insurer, regulator and market research available as at April 2026, including Allianz Risk Barometer 2026, Nardello & Co’s January 2026 UK survey, Marsh cyber predictions for 2026, UK government material on the Cyber Security and Resilience Bill, EU AI Act materials, Protiviti’s 2026 Top Risks research, Red Hat UK AI research, and the UK government’s cyber sector analysis. Market shares, legislative status and survey findings can change, so this page should be read as general commercial information rather than legal, regulatory or insurance advice.