Stay Protected in 2024: Update Your Cyber Incident Prevention and Coverage Strategies
APRIL 2, 2024
With the cybersecurity awareness training many organizations require, most employees should know what a suspicious email looks like. Yet social engineering still accounts for 98% of all cyber-related attacks.1 Criminals take maximum advantage of social engineering tactics, costing organizations millions of dollars either directly or in subsequent damage from theft, malware, ransomware, reputational damage, service disruption, and other incidents.
To compound the problem, many organizations do not stay up to date on the insurance coverage needed to protect them from potentially catastrophic events. Because every organization has unique cybercrime risks, it’s necessary to seek cybercrime coverage that is heavily customized.
Know About the Latest Exposures and Coverages
Cybercrime is one of the most frequently discussed, but least understood, risks and insurance coverages. Claims-made insurance policies, whether crime (aka fidelity bond) or cyber policies, are often issued without critical coverage enhancements, leaving the insured organization with potential coverage gaps. Therefore, it’s crucial to obtain a comprehensive insurance review and terms and conditions that match your organization’s unique risks. This often extends to indirectly related coverages like errors and omissions (E&O) liability and even directors and officers (D&O) liability policies.
Depending on your organization’s needs, cyber, crime and E&O/D&O policies can be used to gain the broadest coverage possible. Click each icon below to learn more:
Prevent Cyber Events From Occurring
While social engineering security threats continue to proliferate and become more advanced (including the use of AI to enhance the subterfuge), organizations can mitigate these risks by taking these proactive steps:
- Train employees properly. Ensure employees know what to look for in a phishing email and how to spot other social engineering threats. Give employees clear policies on protecting sensitive information, password best practices, effective cyber security, and visitor management. Use up-to-date training and threat scenarios with scoring and feedback.
- Document specific verification procedures for any wire/money transfers. Establish prearranged “call backs” or other verification procedures in contracts or service agreements with third parties, such as customers, clients and vendors. For example, a phone call to a specific person at the third party will help confirm banking and routing information that’s not on a particular invoice or email. The phone call should not involve any telephone number in a recently received email.
- Implement procedures for responding to a scam. If an organization falls victim to a fraudulent transfer scam, it should act quickly and 1) ask its financial institution to contact the financial institution where the transfer was sent, 2) contact the local FBI field office to report the crime, and 3) file a complaint with the FBI’s Internet Crime Complaint Center.
How USI Can Help
Prevention Is the Best Medicine
Areas of cybercrime vulnerability can be addressed by USI’s AnswerlyticsTM program. Answerlytics provides access to proven companies in cybersecurity stacks, helping you understand the depth and breadth of your organization’s risk, as well as the sophistication of threats it faces and solutions to solve for them.
Risk Transfer
In the event of a social engineering incident, standard or “off the shelf” crime and cyber policies may have coverage gaps, which can lead to material uninsured losses. USI can review your organization’s existing insurance policies and provisions to determine if any gaps exist within the coverage terms.
Pre-Negotiated Social Engineering Coverage
USI clients also have access to expanded, pre-negotiated social engineering coverage on crime policies (through our ExecuSafe solution) and cyber policies (through our PrivaSafe solution). We can also modify the crime and cyber policies to interact clearly, granting the broadest coverage across both policies. If additional coverage is appropriate for your organization’s risk profile, USI may suggest a stand-alone social engineering fraud policy that has full limits (as opposed to sublimits).
The time to address this insidious risk is now, before an event inevitably finds you and your organization.
To learn more about mitigating cybercrime losses with insurance and risk management, contact your USI consultant or email us at pcinquiries@usi.com.
Source:
1 Statista
SUBSCRIBE
Get USI insights delivered to your inbox monthly.