Key Takeaway
- The cyber endorsement bundled with most medical malpractice or business owner's policies caps at $10,000 to $50,000 and typically excludes social engineering fraud, which is the most common cyber loss small practices actually face.
- The IBM 2025 Cost of a Data Breach Report puts the average healthcare breach at $7.42 million, the highest of any industry IBM tracks. Healthcare ransomware in 2024 and 2025 averaged $1.3 to $2 million per incident, with extortion demands reaching $4 million.
- The February 2024 Change Healthcare attack disrupted approximately 192.7 million patient records (per HHS) and broke revenue cycles at thousands of small practices whose own systems were never touched. Per the AMA's post-attack poll of roughly 1,400 practices, more than half used personal funds to cover expenses and 31% could not make payroll. 78% of those respondents ran practices of ten physicians or fewer.
- Stand-alone cyber for a two-to-five-provider practice with reasonable controls runs $1,500 to $7,000 a year, typically $1,700 to $3,000 per provider per year for $1 million in coverage. A $2,000 premium on a $1 million limit prices coverage at 0.2% of the limit.
- The three line items that decide whether the policy pays: contingent business interruption with a short waiting period, social engineering sublimit of at least $250,000, and regulatory fines coverage well above the OCR discretionary cap.
On February 21, 2024, thousands of small medical practices with clean security records and competent IT staff got knocked offline. Their own systems were never compromised. The breach happened at Change Healthcare, the clearinghouse that processes one in every three U.S. patient records.
The practices couldn't submit claims, couldn't verify eligibility, couldn't get paid. Cyber insurance for small medical practices is supposed to cover exactly that scenario. Most policies don't. Of the roughly 1,400 practices the American Medical Association polled after the attack, more than half reported using personal funds to cover expenses, and 31% said they could not make payroll. Seventy-eight percent of those respondents ran practices of ten physicians or fewer. The Change Healthcare attack went on to affect approximately 192.7 million individuals per HHS, making it the largest healthcare data breach in U.S. history. None of the small practices it crushed had their own systems attacked. They were paying the bill for someone else's controls failure, with cyber endorsements that were never built for vendor-side exposure.
The cyber endorsement on your malpractice policy is theater
Most small medical practices already have some form of cyber coverage. It's bundled into the malpractice policy or the business owner's policy as a low-cost endorsement. The marketing copy is reassuring. The actual limits are not.
According to Medical Economics' 2026 analysis of physician practice insurance, cyber insurance provided through a malpractice or business insurance policy often caps coverage at $10,000 or $50,000 and excludes the risks most likely to hit a practice, social engineering fraud at the top of the list. IBM's 2025 Cost of a Data Breach Report put the average healthcare breach at $7.42 million, the highest of any industry IBM tracks and well above the cross-industry average of $4.88 million. The arithmetic is brutal. A $50,000 endorsement covers less than one percent of the average healthcare breach. Healthcare ransomware attacks in 2024 and 2025 averaged $1.3 to $2 million in losses per incident, with extortion demands reaching as high as $4 million.
The social engineering exclusion is the worst part. The most common cyber loss medical practices actually face isn't a ransomware crew encrypting the EHR. It's a fraudulent invoice in the high five figures that walks out the door because a staffer trusted an email that looked like one from a real vendor or a familiar referring physician. The endorsement won't pay for that. The endorsement was never built to.
What real premiums look like in 2026
Stand-alone cyber coverage is cheaper than most physicians assume. Industry data aggregated across multiple healthcare-focused brokers puts annual premiums for cyber insurance for small medical practices in the $1,500 to $7,000 range, depending on practice size, patient volume, specialty, and existing security controls. A two-to-five-provider practice with reasonable IT hygiene typically lands at $1,700 to $3,000 per provider per year for $1 million in coverage. Deductibles for that size practice typically fall in the low single-digit thousands.
A $2,000 annual premium for a $1 million limit prices coverage at 0.2% of the limit. Carriers are competing for small healthcare business that has invested in basic security controls, and the pricing reflects it. The same dynamic shows up in adjacent verticals; the breakdown of cyber insurance for small law firms in 2026 traces the same gap between $30-a-month aggregator policies and genuine stand-alone coverage, with the same conclusion: the entry-tier premium pays for thin third-party limits that don't survive contact with the actual exposure.
Practices that handle higher-acuity specialties or higher patient volumes price up. A multi-location urgent care or ambulatory surgery center will see premiums north of $5,000 a year for the same $1 million limit, and may need to step up to $2 million or $3 million in primary coverage with an excess tower above it. Practices that have not implemented the underwriter-required controls (more on those below) may not get quoted at all, or may only get quoted at materially higher rates with broader exclusions.
Three coverages to verify before signing
Most first-time cyber buyers get quoted a generic policy that looks comprehensive but has gaps in the exact places small healthcare gets hit. Three coverages are non-negotiable.
Contingent business interruption. This is the coverage that pays when a vendor's breach takes your revenue offline, which is what Change Healthcare did to thousands of small practices. The American Hospital Association's survey of nearly 1,000 hospitals after the attack found 94% reported financial impact and 33% reported the disruption affected more than half of their revenue. Older cyber policies typically paid business interruption only when the insured itself was breached. Confirm yours has contingent BI explicitly named in the policy schedule. Confirm the waiting period is short (12 to 24 hours), not the multi-day waits common in older policies that effectively delete the first week of coverage from any realistic outage.
Social engineering sublimit at $250,000 or above. Medical Economics' 2026 analysis recommends dedicated social engineering sublimits at $250,000 or higher to match 2024-2025 healthcare ransomware loss severity. A $1 million policy with a $25,000 social engineering sublimit is roughly as useful as the malpractice endorsement was: the sublimit caps the payout at the precise loss type the policy is supposed to address. Read the schedule, find the social engineering line, and require it sized to at least one full quarter of accounts payable for the practice.
Regulatory fines coverage above the OCR discretionary cap. The HIPAA Civil Monetary Penalty schedule, updated by HHS on January 28, 2026 with the 2025 inflation multiplier, runs from $145 per violation in tier one up to $2,190,294 per violation in tier four. OCR's 2019 Notice of Enforcement Discretion currently caps tiers one through three at $25,000, $100,000, and $250,000 annually. But OCR can rescind that discretion at any time, and the statutory cap on every tier remains $2.19 million. In 2024 alone, OCR collected $12.84 million in penalties across 22 enforcement actions. A cyber policy with $50,000 in regulatory coverage is gambling that the practice doesn't get the wrong investigator on the wrong year.
What carriers now require to write the policy
Underwriting in 2026 looks more like a security audit than an insurance application. Per Medical Economics' 2026 analysis, the baseline safeguards carriers expect are multi-factor authentication (MFA) on every system that touches PHI, endpoint detection and response (EDR or XDR) on every workstation, 3-2-1 backup architecture (three copies of data, on two different media, with one offline or immutable), and annual phishing and payment-verification training documented in writing.
These are not suggestions. They are declarations on the insurance application, and they are legally binding. If the application says MFA is in place on email and there is one laptop in the back office still using a password manager from 2019 with no second factor, the carrier can deny the claim on material misrepresentation. The practice then writes personal checks to the forensic investigators, breach coach, and notification vendor, on top of the underlying loss the policy was supposed to cover. The breach scramble is the worst time to discover the application was inaccurate.
The same pattern shows up in adjacent professional verticals. The breakdown of HIPAA-compliant AI agents for solopreneurs covers how Business Associate Agreements function as the equivalent of an underwriter's reasonableness defense at the vendor layer, which matters because a carrier will look at every BAA on file the day a vendor breach triggers contingent BI coverage. Practices using AI scribes, intake bots, or any patient-facing automation without a signed BAA from the vendor are running an uninsurable exposure regardless of what the cyber policy says.
Controls that lower premiums also lower breach probability
The honest secondary point: the same controls underwriters use to set premium are the same controls that reduce breach probability in the first place. MFA on every PHI-touching system. EDR on every workstation. Encrypted backups in a 3-2-1 architecture with at least one offline or immutable copy. A documented incident response plan reviewed annually with the staff. Vendor risk reviews for the EHR, clearinghouse, billing service, telehealth platform, and any AI tool that processes patient data.
A practice with documented MFA, EDR, encryption, and tested backups quotes lower than a practice without them, with higher limits available at the better-controls price. Industry data suggests typical premium savings of 5 to 15% for documented incident response planning alone, with multi-policy bundling adding another 5 to 10%. The premium savings is the visible benefit. The bigger benefit is breach probability dropping by far more than the premium reduction is worth. Most practices looking to cut their cyber insurance premium would do better cutting their breach probability with the same money spent on controls instead of policy haggling.
Cyber liability also sits inside a broader small-practice insurance stack that solo and small-group physicians often underweight. For practitioners running solo or in a small partnership, the income-protection layer matters at least as much as the cyber tower; the breakdown of disability insurance for the self-employed covers the personal-income side of the same risk picture, because a disabling event takes a small practice offline as effectively as a ransomware attack does and the cyber policy will not pay a dollar of it.
The recommendation
A stand-alone cyber policy for a small medical practice in 2026 should run $1 million to $2 million in primary limits, with a social engineering sublimit of at least $250,000, contingent business interruption coverage with a short waiting period (12 to 24 hours), and regulatory fines coverage in excess of $250,000. The annual premium for a two-to-five-provider practice with proper controls falls between $1,500 and $3,000. The cyber endorsement on the malpractice policy can stay where it is. It is not the protection. It is a marketing line item that prices in at roughly $200 a year and pays for almost nothing.
Add the stand-alone policy. Close the MFA gaps before the application gets signed. Document the incident response plan, the backup architecture, the annual training cadence, and the vendor BAA inventory in writing, because every one of those will become a question on the application and a representation on the binder. Put the renewal date on the calendar with a thirty-day pre-quote review every year, because the contingent business interruption coverage that came standard in 2026 may be a separate endorsement again by 2028 if claims experience in the healthcare clearinghouse tier worsens.
Frequently Asked Questions
How much does cyber insurance cost for a small medical practice in 2026?
Stand-alone cyber insurance for a small medical practice in 2026 typically runs $1,500 to $7,000 per year depending on practice size, patient volume, specialty, and existing security controls. A two-to-five-provider practice with reasonable IT hygiene generally lands at $1,700 to $3,000 per provider per year for $1 million in primary coverage, with deductibles in the low single-digit thousands. A $2,000 annual premium for a $1 million limit prices coverage at roughly 0.2% of the limit. Multi-location urgent cares, ambulatory surgery centers, and higher-acuity specialty practices price higher and often need to step up to $2 million or $3 million in primary limits with an excess tower on top.
Does my malpractice policy already cover cyber attacks?
Most medical malpractice and business owner's policies include a narrow cyber endorsement, but the coverage is typically capped at $10,000 to $50,000 and excludes the risks small practices most often face. Medical Economics' 2026 analysis specifically calls out social engineering fraud as a common exclusion, which is the most frequent cyber loss type at medical practices. With IBM's 2025 Cost of a Data Breach Report putting the average healthcare breach at $7.42 million, a $50,000 endorsement covers less than one percent of the average exposure. The endorsement is real coverage for narrow incidents (a single laptop theft with a small notification cost, for example) but is not a substitute for a stand-alone cyber policy with adequate limits and the right line items.
What was the Change Healthcare attack and why does it matter for cyber insurance?
On February 21, 2024, ALPHV/BlackCat ransomware operators breached Change Healthcare, the clearinghouse that processes one in every three U.S. patient records and handles billing, eligibility verification, and pharmacy claims for most of the country. The attack disrupted approximately 192.7 million patient records per HHS, making it the largest healthcare data breach in U.S. history. The American Medical Association's post-attack poll of roughly 1,400 practices found that more than half used personal funds to cover expenses and 31% could not make payroll. 78% of those respondents ran practices of ten physicians or fewer. None of the small practices crushed by the outage had their own systems compromised. The attack matters for cyber insurance because it proved that the most common revenue-killing cyber event for a small practice is a vendor breach, not the practice's own breach, and most older cyber policies only paid business interruption when the insured itself was attacked. Contingent business interruption coverage is now the line item that separates a policy that would have paid Change Healthcare losses from one that would not have.
What is contingent business interruption coverage and why do small medical practices need it?
Contingent business interruption (CBI) coverage pays for revenue lost when a third-party vendor's breach disrupts the insured's operations, even when the insured's own systems are not compromised. For medical practices, the most relevant CBI scenario is a clearinghouse, EHR vendor, or billing service breach that prevents claim submission, eligibility verification, or payment processing. The Change Healthcare attack is the textbook example. Older cyber policies typically paid business interruption only when the insured itself was breached, which meant practices whose revenue cycle was offline for weeks because of someone else's breach had no coverage. CBI needs to be explicitly named in the policy schedule, with a waiting period of 12 to 24 hours rather than the multi-day waits common in older policies that effectively delete the first week of coverage. The American Hospital Association's post-attack survey found 94% of nearly 1,000 surveyed hospitals reported financial impact and 33% reported the disruption affected more than half of their revenue, which is the scale CBI needs to be sized against.
What are HIPAA fines and how much can OCR charge?
HIPAA Civil Monetary Penalties run on a four-tier schedule based on culpability. The schedule, updated by HHS on January 28, 2026 with the 2025 inflation multiplier, ranges from $145 per violation in tier one (the entity did not know and could not reasonably have known) up to $2,190,294 per violation in tier four (willful neglect not corrected). OCR's 2019 Notice of Enforcement Discretion currently caps tiers one through three at $25,000, $100,000, and $250,000 annually, but OCR retains the discretion to rescind that cap at any time, which restores the full $2.19 million ceiling on every tier. In 2024 alone, OCR collected $12.84 million in penalties across 22 enforcement actions. A cyber policy with $50,000 in regulatory fines coverage is gambling that the practice never draws an investigator on a year OCR steps up enforcement, which is not a defensible bet for a practice handling protected health information at any meaningful volume.
What security controls do cyber insurance carriers require in 2026?
Per Medical Economics' 2026 analysis, the baseline safeguards carriers expect on the application are multi-factor authentication on every system that touches PHI, endpoint detection and response (EDR or XDR) deployed on every workstation, 3-2-1 backup architecture (three copies of data on two different media with at least one copy offline or immutable), and documented annual phishing and payment-verification training for all staff. These controls are not suggestions. They are declarations on the insurance application and they are legally binding representations. If the application states that MFA is in place across all PHI-touching systems and a forensic investigation after a breach finds one workstation without it, the carrier can deny the claim on material misrepresentation grounds, which means the practice writes personal checks for forensic costs, breach coach fees, notification vendors, and any regulatory defense. Closing every control gap before the application is signed is a higher-priority task than negotiating the premium.
Is social engineering coverage included in standard cyber policies?
Sometimes, but almost always with a sublimit that defeats the purpose. A standard $1 million cyber policy often carries a social engineering sublimit of $10,000 to $25,000, which is well below the loss size of a typical fraudulent invoice or wire diversion at a medical practice. Medical Economics' 2026 analysis recommends dedicated social engineering sublimits of at least $250,000 to match the 2024-2025 healthcare ransomware and BEC loss severity. The right way to read a policy schedule is to find the social engineering line, the funds transfer fraud line, and the invoice manipulation line as three separate sublimits, then size each one against the practice's actual accounts payable exposure rather than against the headline policy limit. A $1 million policy with a $25,000 social engineering sublimit is sized for the wrong loss type, regardless of how the marketing copy reads.
