By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026
Computing

Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026

News Room
Last updated: 2026/02/20 at 6:20 AM
News Room Published 20 February 2026
Share
Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026
SHARE

The Hacker NewsFeb 20, 2026Cyber Insurance / Password Security

With one in three cyber-attacks now involving compromised employee accounts, insurers and regulators are placing far greater emphasis on identity posture when assessing cyber risk. 

For many organizations, however, these assessments remain largely opaque. Elements such as password hygiene, privileged access management, and the extent of multi-factor authentication (MFA) coverage are increasingly influential in how cyber risk and insurance costs are evaluated.

Understanding the identity-centric factors behind these assessments is critical for organizations seeking to demonstrate lower risk exposure and secure more favorable insurance terms.

Why identity posture now drives underwriting

With the global average cost of a data breach reaching $4.4 million in 2025, more organizations are turning to cyber insurance to manage financial exposure. In the UK, coverage has increased from 37% in 2023 to 45% in 2025, but rising claims volumes are prompting insurers to tighten underwriting requirements. 

Credential compromise remains one of the most reliable ways for attackers to gain access, escalate privileges, and persist within an environment. For insurers, strong identity controls reduce the likelihood that a single compromised account can lead to widespread disruption or data loss, supporting more sustainable underwriting decisions.

What insurers want to see in identity security

Password hygiene and credential exposure

Despite the growing use of multi-factor authentication and passwordless initiatives, passwords still play a key role in authentication. Organizations should pay particular attention to the behaviors and issues that increase the risk of credential theft and abuse, including: 

  • Password reuse across identities, particularly among administrative or service accounts, increases the likelihood that one stolen credential leads to broader access.
  • Legacy authentication protocols are still common in networks and frequently abused to harvest credentials. NTLM persists in many environments despite being functionally replaced by Kerberos in Windows 2000.
  • Dormant accounts with valid credentials, which act as unmonitored entry points and often retain unnecessary access.
  • Service accounts with never-expiring passwords, creating long-lived, low-visibility attack paths.
  • Shared administrative credentials, reduce accountability and amplify the impact of compromise.

From an underwriting perspective, evidence that an organization understands and actively manages these risks is often more important than the presence of individual technical controls. Regular audits of password hygiene and credential exposure help demonstrate maturity and intent to reduce identity-driven risk.

Privileged access management

Privileged access management is a critical measure of an organization’s ability to prevent and mitigate breaches. Privileged accounts can have high-level access to systems and data, but are frequently over-permissioned. As a result, insurers pay close attention to how these accounts are governed.

Service accounts, cloud administrators, and delegated privileges outside central monitoring significantly elevate risk. This is especially true when they operate without MFA or logging.

Excessive membership in Domain Admin or Global Administrator roles and overlapping administrative scopes all suggest that privilege escalation would be both rapid and difficult to contain. 

Poorly governed or unknown privileged access is typically viewed as higher risk than a small number of tightly controlled administrators. Security teams can use tools such as Specops Password Auditor to identify stale, inactive, or over-privileged administrative accounts and prioritize remediation before those credentials are abused.

Specops Password Auditor – Dashboard

When determining the likelihood of a damaging breach, the question is straightforward: if an attacker compromises a single account, how quickly can they become an administrator? Where the answer is “immediately” or “with minimal effort,” premiums tend to reflect that exposure.

MFA coverage 

Most organizations can credibly state that MFA has been deployed. However, MFA only meaningfully reduces risk when it is consistently enforced across all critical systems and accounts. In one documented case, the City of Hamilton was denied an $18 million cyber insurance payout after a ransomware attack because MFA had not been fully implemented across affected systems.

While MFA isn’t infallible, fatigue attacks first require valid account credentials and then depend on a user approving an unfamiliar authentication request, an outcome that is far from guaranteed.

Meanwhile, accounts that authenticate via older protocols, non-interactive service accounts, or privileged roles exempted for convenience all offer viable bypass paths once initial access is achieved.

That’s why insurers increasingly require MFA for all privileged accounts, as well as for email and remote access. Organizations that neglect it may face higher premiums.

Four steps to improve your identity cyber score 

There are many ways organizations can improve identity security, but insurers look for evidence of progress in a few key areas:

  1. Eliminate weak and shared passwords: Enforce minimum password standards and reduce password reuse, particularly for administrative and service accounts. Strong password hygiene limits the impact of credential theft and reduces the risk of lateral movement following initial access.
  2. Apply MFA across all critical access paths: Ensure MFA is enforced on remote access, cloud applications, VPNs, and all privileged accounts. Insurers increasingly expect MFA coverage to be comprehensive rather than selectively applied.
  3. Reduce permanent privileged access: Limit permanent administrative rights wherever practical and adopt just-in-time or time-bound access for elevated tasks. Fewer always-on privileged accounts directly reduce the impact of credential compromise.
  4. Regularly review and certify access: Conduct routine reviews of user and privileged permissions to ensure they align with current roles. Stale access and orphaned accounts are common red flags in insurance assessments.

Insurers increasingly expect organizations to demonstrate not only that identity controls exist, but that they are actively monitored and improved over time.

Specops Password Auditor supports this by providing clear visibility into password exposure within Active Directory and enforcing controls that reduce credential-based risk.

To understand how these controls can be applied in your environment and aligned with insurer expectations, speak with a Specops expert or request a live demo.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Messenger Website Is Shutting Down in April: Here’s What Next for Users Messenger Website Is Shutting Down in April: Here’s What Next for Users
Next Article The latest WhatsApp update makes it easier to catch up on group chats The latest WhatsApp update makes it easier to catch up on group chats
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

What Is Social Media Engagement? 13 Tips To Improve It in 2025
Computing
Incogni vs DeleteMe: Which Data Removal Service Is Better?
Incogni vs DeleteMe: Which Data Removal Service Is Better?
News
YouTube is trialing conversational AI on its TV apps
YouTube is trialing conversational AI on its TV apps
Gadget
No Bad Weather: Stay Warm by Dressing in Layers
No Bad Weather: Stay Warm by Dressing in Layers
Gadget

You Might also Like

What Is Social Media Engagement? 13 Tips To Improve It in 2025

14 Min Read
Why I Built a Web of Trust Browser Extension for Nostr | HackerNoon
Computing

Why I Built a Web of Trust Browser Extension for Nostr | HackerNoon

0 Min Read
ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT RAT
Computing

ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT RAT

3 Min Read
Linux 7.0 Brings Apple Type-C PHY, Snapdragon X2 & Rockchip HDMI 2.1 FRL Additions
Computing

Linux 7.0 Brings Apple Type-C PHY, Snapdragon X2 & Rockchip HDMI 2.1 FRL Additions

2 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?