When you see the words “cyber attack” or “data breach," you likely picture an anonymous hacker carrying out a sophisticated, targeted attack on your network. While these attacks do occur, unfortunately cyber attacks do not require advanced technical prowess in order to be effective.
In truth, some breaches take advantage of a lack of technical knowledge: these attacks, called social engineering attacks, are just as they sound: instead of exploiting a weakness in the network, they exploit a human weakness.
In these social engineering breaches, an attacker poses as a reputable individual and reaches out to an individual employee for what often appears to be a good reason at first glance. Often they will appear legitimate: they likely will have spoofed their email address, provided fake credentials, or written with an urgent enough tone that the targeted employee feels pressured. They will then convince the employee to transfer a large sum of money to their account, provide login information, or other sensitive data.
These attacks are somewhat atypical for cyber attacks: all information or money technically is given voluntarily, and they do not rely on a weak or compromised network. In fact, you could say that there’s no breaching done. Because of this, it’s important that you and your business understand the signs of a social engineering attack and take the right measures to protect yourselves, as the average cybersecurity measures may not be enough.
A social engineering attack cannot be successful without your cooperation. Take a look at these common methods of social engineering
The first and most effective line of defense against social engineering attacks is your employees, who need to be trained to spot a potential attack. Give your teams the examples above, and provide training on what to do if they receive an email or phone call requesting large sums of money, sensitive information, or other important materials.
Another way to help yourself is to establish a protocol for such transfers. You can require that all sensitive transfers have the approval of a certain member of the company before they can be initiated, or establish a code word or phrase to include should an exchange of money or confidential information be necessary.
When reinforcing your business against social engineering attacks, be mindful of potential coverage gaps with your insurance policies. While many assume that these attacks are covered under a cyber liability or commercial crime policy, carriers have been known to deny coverage under the grounds that, in social engineering cases, the information is given up voluntarily rather than taken through a breach or other involuntary means.
Make sure that you know the ins and outs of your current policy and talk to your insurance carrier to make sure that you will be fully covered.
About Axis Insurance Services
At Axis Insurance Services, we aim to help our customers identify their exposures and protect themselves. Founded in 1999, we offer insurance programs to a wide variety of professionals and industries including attorneys, real estate, healthcare, architects, and more, and also have a wholesale division. We pride ourselves on offering flexible insurance coverage tailored specifically to each customer’s needs. To learn more about our solutions, contact us at (201) 847-9175 to speak with one of our professionals.