{"id":114948,"date":"2024-08-26T15:31:33","date_gmt":"2024-08-26T19:31:33","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=114948"},"modified":"2024-10-17T12:09:47","modified_gmt":"2024-10-17T16:09:47","slug":"cyberinsurance-guide-for-msps","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps","title":{"rendered":"Comprehensive Guide to Cyber Insurance for MSPs"},"content":{"rendered":"\n

Cybercrime is as lucrative as ever, generating millions in illicit revenues for threat actors. Between 2021 and 2023, global data breaches rose by 72%<\/a>, breaking all previous records.<\/p>\n\n\n\n

Meanwhile, data breach costs continue to rise. The average cost of an enterprise data breach in 2024 is $4.88 million<\/a> \u2014 another all-time high.<\/p>\n\n\n\n

This puts managed service providers (MSPs) in a tight position. Cyber liability insurance can help reduce exposure to steep losses associated with cyberattacks.<\/p>\n\n\n\n

Understanding MSP Cyber Liability Insurance<\/h2>\n\n\n\n

Cybercriminals target MSPs to gain access to customer data and infrastructure. Almost all MSPs<\/a> have suffered a successful cyberattack in the last 18 months. Nine out of 10 report facing more attacks now than during the height of the pandemic.<\/p>\n\n\n\n

Cyber liability insurance<\/a> gives MSPs a valuable backup plan in the event of a catastrophic data breach. A good insurance plan can significantly soften the blow of an advanced cyberattack.<\/p>\n\n\n\n

What Is MSP Cyber Liability Insurance?<\/h3>\n\n\n\n

Cyber liability insurance provides coverage against cyberattacks and data breaches. This protects MSPs from the potentially unlimited damages they would otherwise be exposed to after an attack. A cyber insurance policy may cover investigation and recovery expenses, ransom payments, and more.<\/p>\n\n\n\n

Why Do MSPs Need Cyber Insurance?<\/h3>\n\n\n\n

MSP cyber insurance provides financial protection against losses incurred after a cyberattack. That can include covering incident response actions, investigative efforts, and legal costs. This limits the potential damage that a successful cyberattack can cause.<\/p>\n\n\n\n

The Importance of Cyber Insurance for MSPs<\/h3>\n\n\n\n

Cyber insurance allows MSPs and their customers to manage cyberattack risk more effectively. Even the most secure organizations cannot guarantee every attempted attack will fail. A good insurance policy provides valuable resources when they are needed most.<\/p>\n\n\n\n

Types of Cyber Insurance for MSPs<\/h2>\n\n\n\n

There are several different types of MSP cyber insurance policies. Each policy covers different types of damages to a varying degree. Many policies cover first-party and third-party damages separately.<\/p>\n\n\n\n

First-Party Cyber Insurance<\/h3>\n\n\n\n

This type of cyber insurance policy protects against cyberattacks and data breaches. It covers the costs associated with the event itself \u2014 like incident response, data recovery, and ransom payments. These first-party costs are damages that stem directly from the cyber incident.<\/p>\n\n\n\n

Third-Party Cyber Insurance<\/h3>\n\n\n\n

This type of cyber insurance policy protects against liability claims made by third parties. If individuals or organizations file court claims against you for failing to protect their data, this policy would cover the legal fees, court expenses, and settlement payments. Non-compliance fines are also covered by third-party cyber insurance.<\/p>\n\n\n\n

Specialized Policies for MSPs<\/h3>\n\n\n\n

MSPs have unique legal and financial exposure to cyberattack damages. Specialized MSP cyber insurance policies may include both first-party and third-party coverage. These contracts may feature an increased indemnity that matches the risk of third-party damages to multiple clients.<\/p>\n\n\n\n

Key Coverage Areas of Cyber Insurance<\/h2>\n\n\n\n

Cyberattack incidents are different from most other types of insurable events. As a result, cyber insurance policies typically provide multiple types of coverage. Each of these coverage areas may have its own terms and conditions, with unique indemnities for each.<\/p>\n\n\n\n

Data Breach and Privacy Liability<\/h3>\n\n\n\n

This type of coverage focuses on the immediate costs of a data breach that exposes sensitive information. As liability insurance, it protects the organization from third-party claims. For example, it may cover settlement for a client that sues their MSP for failing to protect valuable intellectual property.<\/p>\n\n\n\n

Network Security Coverage<\/h3>\n\n\n\n

This type of coverage reimburses the MSP for first-party losses caused by a cyber incident. That includes bringing in third-party IT forensics teams, setting up a call center to notify customers of the incident, and investigating the incident itself. <\/p>\n\n\n\n

Business Interruption Coverage<\/h3>\n\n\n\n

Cyberattacks often lead to system failures that interrupt normal business operation. The average cost of downtime for enterprise organizations is $9,000 per minute<\/a>. Business interruption coverage provides payment for MSPs that suffer downtime as a result of cyberattack.<\/p>\n\n\n\n

Errors and Omissions Insurance<\/h3>\n\n\n\n

Errors and omissions coverage protects MSPs against damages related to unfulfilled contractual obligations. If a cyberattack interrupts your organization\u2019s ability to carry out routine operations for customers, this coverage will pay for the legal costs associated with customer disputes.<\/p>\n\n\n\n

How to Select the Best Cyber Insurance Policy<\/h2>\n\n\n\n

Every MSP has a unique security risk profile. The best cyber insurance policy is the one that meets that profile most closely. Not all policies cover the same types of events, and additional coverage often comes at a higher price.<\/p>\n\n\n\n

Assessing Your Risks and Needs<\/h3>\n\n\n\n

As an MSP, your security risk profile is largely defined by your client portfolio. If your customers are high-value targets (like manufacturers and financial service providers<\/a>), your cyber insurance needs will reflect that. Your tech stack and access to in-house security expertise will also play an important role here.<\/p>\n\n\n\n

Comparing Policy Features and Limits<\/h3>\n\n\n\n

Most insurance policies follow a general structure. Enhanced protection against cyber risks comes at a higher price. Your policy should cover the cyber incidents most likely to occur and provide some protection against less likely attacks. Be mindful of policy limits that might make you liable for damages in large-scale supply-chain attacks.<\/p>\n\n\n\n

Choosing the Right Insurance Provider<\/h3>\n\n\n\n

Cyber insurance is a relatively new phenomenon. Pricing and terms are important when selecting a provider, but a good reputation is vital. Higher-quality insurance providers will often require customers to demonstrate compliance with industry-standard frameworks. Be prepared to showcase your adherence to these regulations.<\/p>\n\n\n\n

Cost Considerations<\/h3>\n\n\n\n

Cyber insurance premiums typically cost between $1,000 and $7,500 annually for small businesses<\/a>. Large organizations pay much more, but they also have more opportunities to reduce costs. Implementing secure technologies and adopting compliant workflows can significantly reduce cyber insurance premiums for MSPs.<\/p>\n\n\n\n

Common Challenges MSPs Face with Cyber Insurance<\/h2>\n\n\n\n

Cyber insurance policies can be complex. MSP leaders must pay close attention to the terms and conditions of the policy before signing an agreement. Here are three key areas to focus on when considering MSP cyber insurance:<\/p>\n\n\n\n

1. Understanding Policy Exclusions<\/h3>\n\n\n\n

Cost-effective policies do not generally cover every type of security event. Your policy should cover the types of events your organization is most likely to face. It may not cover less likely scenarios. You should be aware of those scenarios and be prepared to detect them if they occur.<\/p>\n\n\n\n

2. Meeting Security Requirements<\/h3>\n\n\n\n

Insurance providers may refuse to cover organizations that fail to meet their security requirements. These requirements are often taken from industry-wide cybersecurity frameworks like NIST<\/a> and SANS<\/a>. Meeting these requirements might involve changing workflows or implementing new technologies.<\/p>\n\n\n\n

3. Managing Claims and Coverage Disputes<\/h3>\n\n\n\n

Cybersecurity incidents are complex and unpredictable. When one occurs, you may not know whether it is covered until after you conduct an investigation. Pay close attention to how your provider resolves coverage disputes when they occur.<\/p>\n\n\n\n

\n
\n \"JumpCloud\"\n <\/div>\n
\n

\n <\/p>\n

\n JumpCloud for MSPs enables you to securely and efficiently provide your customers with seamless access to resources to make work happen. <\/p>\n <\/div>\n

\n Learn More<\/a>\n <\/div>\n<\/div>\n\n\n\n\n

Best Practices for Integrating Cyber Insurance Into Your MSP Business<\/h2>\n\n\n\n

Cyber insurers have a clear incentive to prioritize the most secure organizations. Taking ownership of your security risk profile now can help you obtain better terms from your cyber insurance provider. Here are some ways you can negotiate insurance terms from a position of strength.<\/p>\n\n\n\n

Proactive Risk Management<\/h3>\n\n\n\n

Less than half of MSPs<\/a> implement multi-factor authentication (MFA)<\/a> and 48-hour encrypted backups on their systems. These two improvements can help your organization stand out from the crowd as a reliable manager of cyber risk.<\/p>\n\n\n\n

Additionally, consider implementing automated patch management<\/a> capabilities to secure endpoint devices against attack. Patch management ensures your devices are protected from the latest threats the moment new security features are made available.<\/p>\n\n\n\n

Incident Response Planning<\/h3>\n\n\n\n

Expect insurers to ask questions about your incident response capabilities. They will want to know what happens after an attacker successfully infiltrates your network. Does your organization have dedicated incident response personnel and resources on hand?<\/p>\n\n\n\n

Be prepared to walk insurers through your incident response workflows. The more robust your security capabilities are, the more likely you are to get favorable terms on your insurance policy. Identify some cyberattack scenarios and simulate them internally before talking to cyber insurance providers.<\/p>\n\n\n\n

Aligning Cyber Insurance with Cybersecurity Measures<\/h3>\n\n\n\n

On average, MSPs are raising their security budgets by 5% per year<\/a>. As you implement new technologies and workflows, your cyber insurance risk profile will change. Investments in things like password management<\/a> can positively impact the terms and conditions of your insurance policy.<\/p>\n\n\n\n

Ideally, all new cybersecurity investments should align with your insurance policy. Modernization efforts \u2014 like replacing legacy servers with cloud-based alternatives<\/a> \u2014 can also impact your organization\u2019s appeal to insurance underwriters.<\/p>\n\n\n\n

Reducing Vulnerabilities and Preparing for Cyber Insurance with JumpCloud<\/h2>\n\n\n\n

JumpCloud provides mobile device management (MDM)<\/a> and endpoint protection to MSPs using flexible multi-tenant architecture<\/a>. Now you can secure multiple device fleets and automate device provisioning and deprovisioning for all your clients through a single interface.<\/p>\n\n\n\n

Deploying JumpCloud can make a significant difference in your search for secure, cost-effective cyber risk insurance. Consider enabling MFA, encrypted backups, and automated patch management on all your clients\u2019 devices before requesting a cyber insurance quote. With JumpCloud helping you meet strict security requirements, you can earn better terms from higher-quality insurers you trust.<\/p>\n","protected":false},"excerpt":{"rendered":"

Learn the importance of MSP cyber insurance, types available, and how to select the best coverage to safeguard your business from cyber threats.<\/p>\n","protected":false},"author":144,"featured_media":103350,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[2782],"tags":[],"collection":[2775],"platform":[],"funnel_stage":[3016],"coauthors":[2532],"acf":[],"yoast_head":"\nComprehensive Guide to Cyber Insurance for MSPs - JumpCloud<\/title>\n<meta name=\"description\" content=\"Learn the importance of MSP cyber insurance, types available, and how to select the best coverage to safeguard your business from cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comprehensive Guide to Cyber Insurance for MSPs\" \/>\n<meta property=\"og:description\" content=\"Learn the importance of MSP cyber insurance, types available, and how to select the best coverage to safeguard your business from cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-26T19:31:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-17T16:09:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2024\/01\/1413603540.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kate Lake\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kate Lake\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps#article\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps\"},\"author\":{\"name\":\"Kate Lake\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/f8e192cbcdde7ffa4bc2f96c48ceda78\"},\"headline\":\"Comprehensive Guide to Cyber Insurance for MSPs\",\"datePublished\":\"2024-08-26T19:31:33+00:00\",\"dateModified\":\"2024-10-17T16:09:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps\"},\"wordCount\":1501,\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2024\/01\/1413603540.jpg\",\"articleSection\":[\"MSP\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps\",\"url\":\"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps\",\"name\":\"Comprehensive Guide to Cyber Insurance for MSPs - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2024\/01\/1413603540.jpg\",\"datePublished\":\"2024-08-26T19:31:33+00:00\",\"dateModified\":\"2024-10-17T16:09:47+00:00\",\"description\":\"Learn the importance of MSP cyber insurance, types available, and how to select the best coverage to safeguard your business from cyber threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2024\/01\/1413603540.jpg\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2024\/01\/1413603540.jpg\",\"width\":1000,\"height\":750,\"caption\":\"a person tapping on their tablet\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Comprehensive Guide to Cyber Insurance for MSPs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/f8e192cbcdde7ffa4bc2f96c48ceda78\",\"name\":\"Kate Lake\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/46cab796831a4f3fb686940689408879\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/49d664ae369f57340f0165a652ddb04b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/49d664ae369f57340f0165a652ddb04b?s=96&d=mm&r=g\",\"caption\":\"Kate Lake\"},\"description\":\"Kate Lake is a Senior Content Writer at JumpCloud, where she writes about JumpCloud\u2019s cloud directory platform and trends in IT, technology, and security. She holds a Bachelors in Linguistics from the University of Virginia and is driven by a lifelong passion for writing and learning. When she isn't writing for JumpCloud, Kate can be found traveling, exploring the outdoors, or quoting a sci-fi movie (often all at once).\",\"sameAs\":[\"https:\/\/jumpcloud.com\/blog\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Comprehensive Guide to Cyber Insurance for MSPs - JumpCloud","description":"Learn the importance of MSP cyber insurance, types available, and how to select the best coverage to safeguard your business from cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps","og_locale":"en_US","og_type":"article","og_title":"Comprehensive Guide to Cyber Insurance for MSPs","og_description":"Learn the importance of MSP cyber insurance, types available, and how to select the best coverage to safeguard your business from cyber threats.","og_url":"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps","og_site_name":"JumpCloud","article_published_time":"2024-08-26T19:31:33+00:00","article_modified_time":"2024-10-17T16:09:47+00:00","og_image":[{"width":1000,"height":750,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2024\/01\/1413603540.jpg","type":"image\/jpeg"}],"author":"Kate Lake","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kate Lake","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps#article","isPartOf":{"@id":"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps"},"author":{"name":"Kate Lake","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/f8e192cbcdde7ffa4bc2f96c48ceda78"},"headline":"Comprehensive Guide to Cyber Insurance for MSPs","datePublished":"2024-08-26T19:31:33+00:00","dateModified":"2024-10-17T16:09:47+00:00","mainEntityOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps"},"wordCount":1501,"publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2024\/01\/1413603540.jpg","articleSection":["MSP"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps","url":"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps","name":"Comprehensive Guide to Cyber Insurance for MSPs - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2024\/01\/1413603540.jpg","datePublished":"2024-08-26T19:31:33+00:00","dateModified":"2024-10-17T16:09:47+00:00","description":"Learn the importance of MSP cyber insurance, types available, and how to select the best coverage to safeguard your business from cyber threats.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2024\/01\/1413603540.jpg","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2024\/01\/1413603540.jpg","width":1000,"height":750,"caption":"a person tapping on their tablet"},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/cyberinsurance-guide-for-msps#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"Comprehensive Guide to Cyber Insurance for MSPs"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/f8e192cbcdde7ffa4bc2f96c48ceda78","name":"Kate Lake","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/46cab796831a4f3fb686940689408879","url":"https:\/\/secure.gravatar.com\/avatar\/49d664ae369f57340f0165a652ddb04b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49d664ae369f57340f0165a652ddb04b?s=96&d=mm&r=g","caption":"Kate Lake"},"description":"Kate Lake is a Senior Content Writer at JumpCloud, where she writes about JumpCloud\u2019s cloud directory platform and trends in IT, technology, and security. She holds a Bachelors in Linguistics from the University of Virginia and is driven by a lifelong passion for writing and learning. When she isn't writing for JumpCloud, Kate can be found traveling, exploring the outdoors, or quoting a sci-fi movie (often all at once).","sameAs":["https:\/\/jumpcloud.com\/blog"]}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/114948"}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/144"}],"replies":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/comments?post=114948"}],"version-history":[{"count":3,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/114948\/revisions"}],"predecessor-version":[{"id":116509,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/114948\/revisions\/116509"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/103350"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=114948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=114948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/tags?post=114948"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=114948"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=114948"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=114948"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=114948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}