Cyber Insurance
May 18, 2026· 6 min read

Cyber Insurance IT Checklist for Ohio Small Businesses

What to review before renewal so the questionnaire does not turn into a scramble.

Editorial note: We review posts for accuracy and practical usefulness. Where examples reference industry trends, readers should validate time-sensitive figures against primary sources.

Cyber insurance applications have become more detailed because insurers want evidence that basic controls are actually in place. For small businesses, the hard part is often not the technology itself. It is proving who owns each control and whether it is working.

1. Multi-factor authentication

Confirm MFA is enabled for email, remote access, admin portals, accounting tools, and any system that stores sensitive customer or employee data. Pay special attention to administrator accounts and shared accounts.

2. Endpoint protection and patching

Insurers may ask whether computers and servers have managed antivirus or EDR, whether alerts are reviewed, and how quickly critical patches are applied. Keep an inventory of devices so unmanaged laptops do not slip through.

3. Backup design and restore testing

A backup is not insurance unless recovery has been tested. Document what is backed up, how often it runs, who receives failures, and when the last restore test was completed.

4. Email security

Review spam filtering, phishing protection, mailbox forwarding rules, SPF, DKIM, and DMARC. Domain authentication is especially important because spoofing and business email compromise remain common claim drivers.

5. Admin access and offboarding

Keep admin roles limited, named, and reviewed. Former employees, old vendors, and unused service accounts should not retain access just because no one owns cleanup.

6. Incident response contacts

Write down who to call during ransomware, mailbox compromise, wire fraud, lost devices, or suspected data exposure. Include IT, insurance, legal, banking, and leadership contacts.

What to do next

Treat the insurance questionnaire as a roadmap. If the answer is unclear, that is a control to review. Start with MFA, backups, endpoint coverage, email authentication, and administrator access because those gaps carry the most operational risk.

Need help with IT services or web hosting?

Talk with our team about managed IT support, secure hosting, migration, and day-to-day operations.

About the Author

NHM LLC

NHM is a Canton, Ohio-based managed IT and cybersecurity company serving Northeast Ohio businesses. We share practical IT security insights to help local businesses stay protected.

Learn more about us →

IT Security Tips Newsletter

Weekly insights for Northeast Ohio businesses

Join hundreds of Ohio business owners getting practical security and IT tips — no spam, unsubscribe any time.

DMARC setup guidesPhishing examplesSSL renewal checklistsOhio SMB case studies

Need a cleaner cyber insurance review?

NHM can review your controls, identify missing documentation, and help prioritize practical fixes before renewal.

Looking for specific offerings? Managed IT services or web hosting services.