{"id":6372,"date":"2023-10-11T12:37:11","date_gmt":"2023-10-11T17:37:11","guid":{"rendered":"https:\/\/www.salvadorinsurance.com\/?p=6372"},"modified":"2025-04-22T11:02:14","modified_gmt":"2025-04-22T16:02:14","slug":"cyber-insurance-protecting-small-businesses-from-social-engineering-fraud","status":"publish","type":"post","link":"https:\/\/www.salvadorinsurance.com\/es\/blog\/cyber-insurance-protecting-small-businesses-from-social-engineering-fraud\/","title":{"rendered":"Cyber Insurance: Protecting Small Businesses from Social Engineering Fraud"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignnone size-full wp-image-6373 lazyload\" data-src=\"https:\/\/www.salvadorinsurance.com\/wp-content\/uploads\/sites\/280\/2023\/10\/cyber.png\" alt=\"\" width=\"600\" height=\"399\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 600px; --smush-placeholder-aspect-ratio: 600\/399;\" \/><\/p>\n<p>October is Cyber Security Awareness Month, so now is the perfect time to examine and refine your business\u2019s cyber security precautions, things like password policies and employee training. It\u2019s also the perfect time to make sure you have a cyber insurance policy.<\/p>\n<p>If you operate a small or midsize business (SMB), this domain of criminal enterprise increasingly has you in its crosshairs.<\/p>\n<h2>Why Are SMBs Targeted?<\/h2>\n<p>If you\u2019re a small business owner, it may seem odd to imagine criminals targeting you rather than bigger names with bigger revenues. But, with small businesses constituting 44% of American gross domestic product, according to the Small Business Administration, there are logical reasons for the bad guys to pick on the little guys including:<\/p>\n<ul>\n<li><strong>Low security budget.<\/strong>\u00a0Smaller companies tend to have smaller security budgets. Often without a dedicated security team or lacking the most up-to-date countermeasures, they can be seen as easier targets than bigger companies with beefier budgets.<\/li>\n<li><strong>Weak security protocols.\u00a0<\/strong>Smaller companies are also more likely to have less sophisticated security policies and protocols than their larger counterparts, leaving sensitive information unaddressed and unprotected.<\/li>\n<li><strong>Gateway to bigger prey.<\/strong>\u00a0By committing supply chain attacks \u2014 exploiting vulnerabilities in small companies that service numerous larger clients \u2014 attackers can often get more bang for their cyber-crime buck by gaining illicit access to several victims at once.<\/li>\n<\/ul>\n<p>Once it\u2019s understood that a smaller market footprint offers no real protection from cyber crime, it\u2019s important to know the ways your business can be targeted. And, given the trends highlighted in the FBI\u2019s March 10, 2023 release of its annual\u00a0<a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2022_IC3Report.pdf\">Internet Crime Report<\/a>, there\u2019s at least one threat everyone should pay attention to:\u00a0<strong>Social Engineering Fraud<\/strong>.<\/p>\n<h2>What Is Social Engineering Fraud?<\/h2>\n<p>While traditional \u201chacking\u201d relies on vulnerabilities in software or hardware to gain unauthorized access to networks and computer systems, social engineering fraud relies on people and emotions.<\/p>\n<p>According to the Cybersecurity and Infrastructure Security Agency, socially engineered attacks are those that use \u201chuman interaction (social skills) to obtain or compromise information about an organization or its computer systems.\u201d<\/p>\n<p>Such exchanges can take the form of convincing text messages, email and voice interaction capable of duping even cautious employees into disclosing sensitive information \u2014 especially when combined with powerful emotions like fear, love and urgency.<\/p>\n<h2>Social Engineering: 10 Types of Fraud<\/h2>\n<p>As criminals attempt to leverage technology, trust and emotion against you and your team, familiarity with their techniques can help you avoid becoming a victim. Popular techniques for this ever-evolving type of fraud include:<\/p>\n<ul>\n<li><strong>Baiting.\u00a0<\/strong>Baiting attacks tempt victims into reusing passwords with offers of quick or easy access to goods and materials or by luring them into inserting USB flash drives to install\u00a0<a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/malware\">malware<\/a>.<\/li>\n<li><strong>Business Email Compromise (BEC).\u00a0<\/strong>Among the most costly and difficult-to-detect social engineering attacks, BEC uses executive impersonation to direct subordinates to perform fraudulent funds transfers.<\/li>\n<li><strong>Diversion Theft.\u00a0<\/strong>An old tactic adapted for contemporary use, victims of diversion theft attacks are tricked into sending or obtaining sensitive information to\/from a spoofed location or person.<\/li>\n<li><strong>Honeytrap.\u00a0<\/strong>Often used with romantic overtones, the honeytrap uses a counterfeit online profile to deceive a victim into disclosing information to what she or he believes is a real person.<\/li>\n<li><strong>Phishing.\u00a0<\/strong>These attacks use email or a counterfeit website from a seemingly trustworthy source about topics of broad interest to solicit personal information from a large pool of people.<\/li>\n<li><strong>Pretexting.\u00a0<\/strong>Impersonating an authoritative or trustworthy source, a pretexting attack will ask for personal information that can be used either to directly gain unauthorized access or further impersonate its initial victim in a subsequent attack on the intended target.<\/li>\n<li><strong>Quid Pro Quo.\u00a0<\/strong>Usually posed as a bogus offer for a valuable service (like improved network speed or updated software), a quid pro quo attacker asks for login credentials as a precondition.<\/li>\n<li><strong>Smishing.\u00a0<\/strong>Easy and cheap to set up and perform, smishing uses malicious links sent as text messages in order to lure victims to fraudulent websites for malware installation.<\/li>\n<li><strong>Tailgating.\u00a0<\/strong>Sometimes referred to as \u201cpiggybacking,\u201d the tailgate attack is an in-person exploit that solicits seemingly trivial courtesies (e.g. \u201cI forgot my laptop. Can I borrow yours?\u201d) as a means of gaining access to otherwise restricted areas and resources.<\/li>\n<li><strong>Whaling.\u00a0<\/strong>These attacks are specialized phishing attacks that target a powerful stakeholder such as a CEO using highly developed personal information rather than general interests.<\/li>\n<\/ul>\n<p>A common theme in all of these attacks is the use of emotion \u2014 for example, the desire to help another person or the fear of being responsible for a costly mistake \u2014 as a means of encouraging the victim to grant the attacker access.<\/p>\n<h2>What Can I Do About Social Engineering Fraud?<\/h2>\n<p>As always,\u00a0<a href=\"https:\/\/www.erieinsurance.com\/blog\/protect-business-data-now\">encourage employees to use best practices<\/a>\u00a0like creating a strong password and using a VPN when possible to help protect your business data. And, while it\u2019s always a good idea to make sure your security policies and systems are current, there are some important non-technical steps you can take to promote cyber security:<\/p>\n<ul>\n<li><strong>Understand the threat environment.<\/strong>\u00a0Dedicate time throughout the year to stay current with authorities like the FBI or the Cybersecurity &amp; Infrastructure Security Agency Knowing about an attack before it\u2019s used on you can make a big difference.<\/li>\n<li><strong>Communicate with your team.<\/strong>\u00a0Make sure your team knows about these threats and how to call them out. A quarterly update of the latest scams and threats will keep everyone informed. Encourage your team to question and verify rather than act on fear or urgency. Most cyber crimes are easily preventable with rationality and diligence.<\/li>\n<li><strong>Get cyber insurance.<\/strong>\u00a0Review and update your\u00a0<a href=\"https:\/\/www.erieinsurance.com\/business-insurance\">commercial insurance policy<\/a>\u00a0to ensure proper coverage. Business owners are discovering that they are either uninsured or underinsured for cyber crime since many insurance companies\u2019 cyber insurance policies don\u2019t cover social engineering claims.However, ERIE offers a cyber insurance coverage that may cover claims arising out of social engineering. As Commercial Lines Product Development Consultant Kristen Stevanus explains, \u201cERIE\u2019s\u00a0<a href=\"https:\/\/www.erieinsurance.com\/business-insurance\/cybersuite\">Cyber Suite<\/a>\u00a0coverage addresses a variety of cyber-crime consequences \u2014 including things like data breach, misdirected payments and malware \u2014 where a policyholder\u2019s employee unwittingly grants access to the attacker.\u201d Cyber Suite coverage with ERIE includes access to additional resources to help business owners protect themselves against cyber threats.\u00a0<span dir=\"ltr\">With Cyber Suite, customers gets Cyber Safety, a risk management service that provides employee training, cyber security policy templates, website scanning and more.\u00a0\u00a0<\/span>\n<p>This kind of cyber crime protection addresses more than just the direct effects of the attack itself. Covered claims also include protection for downstream consequences like forensics, compliance and recovery.<\/li>\n<\/ul>\n<h2>Stay Current, Stay Safe<\/h2>\n<p>Cyber security is an evolving concern, and keeping up to date with the latest threats is one way to avoid them. But even when you take precautions, cyber fraud can still occur. That\u2019s why it\u2019s so important to make sure you protect your business by having the right insurance protection.<\/p>\n<p>With\u00a0<a href=\"https:\/\/www.erieinsurance.com\/business-insurance\/cybersuite\">Cyber Suite from ERIE<\/a><sup>1<\/sup>, you\u2019re covered for losses arising from a host of cybercrimes, including data breaches, computer fraud and attacks, cyber extortion, misdirected payment fraud and telecommunications fraud. Cyber Suite also includes third-party liability coverages for privacy incident liability, network security liability and electronic media liability. And as an added bonus, you\u2019ll have access to a team of cyber professionals experienced in handling these types of claims.<\/p>\n<p>A local agent can help you understand the benefits of this important coverage, which is just one reason why\u00a0<a href=\"https:\/\/www.erieinsurance.com\/blog\/why-local-agency-for-business-insurance\">it\u2019s beneficial to have a knowledgeable Erie Insurance agent<\/a>.<\/p>\n<p><em><sup>1<\/sup><\/em><em>Cyber Suite is only available to Customers with an ErieSecure Business\u00ae policy (not available in NY). Cyber Suite coverage and associated services reinsured under an arrangement with the Hartford Steam Boiler (Home Office: Hartford, Connecticut). \u00a9 2021 The Hartford Steam Boiler Inspection and Insurance Company (\u201cHSB\u201d). All rights reserved. This document is intended for informational purposes only and does not modify or invalidate any of the terms or conditions of the policy and endorsements. For specific terms and conditions, please refer to the coverage form.<\/em><\/p>\n<p><em>The insurance products and rates, if applicable, described in this blog are in effect as of September 2023 and may be changed at any time.\u00a0<\/em><\/p>\n<p><em>Insurance products are subject to terms, conditions and exclusions not described in this blog. The policy contains the specific details of the coverages, terms, conditions and exclusions.\u00a0<\/em><\/p>\n<p><em>The insurance products and services described in this blog are not offered in all states.\u00a0 ERIE life insurance and annuity products are not available in New York.\u00a0 ERIE Medicare supplement products are not available in the District of Columbia or New York.\u00a0 ERIE long-term care products are not available in the District of Columbia and New York.\u00a0<\/em><\/p>\n<p><em>Eligibility will be determined at the time of application based upon applicable underwriting guidelines and rules in effect at that time.<\/em><\/p>\n<p><em>Your ERIE agent can offer you practical guidance and answer questions you may have before you buy.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>(Source:<a href=\"https:\/\/www.erieinsurance.com\/blog\/social-engineering-fraud\" target=\"_blank\" rel=\"noopener\">https:\/\/extramile.thehartford.com\/auto\/maintenance\/complex-car-repair-cost\/<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>October is Cyber Security Awareness Month, so now is the perfect time to examine and refine your business\u2019s cyber security precautions, things like password policies and employee training. It\u2019s also the perfect time to make sure you have a cyber insurance policy. If you operate a small or midsize business (SMB), this domain of criminal [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":null,"_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_analytify_skip_tracking":false,"footnotes":""},"categories":[1,17],"tags":[],"class_list":["post-6372","post","type-post","status-publish","format-standard","hentry","category-blog","category-business"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.salvadorinsurance.com\/es\/wp-json\/wp\/v2\/posts\/6372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.salvadorinsurance.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.salvadorinsurance.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.salvadorinsurance.com\/es\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.salvadorinsurance.com\/es\/wp-json\/wp\/v2\/comments?post=6372"}],"version-history":[{"count":0,"href":"https:\/\/www.salvadorinsurance.com\/es\/wp-json\/wp\/v2\/posts\/6372\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.salvadorinsurance.com\/es\/wp-json\/wp\/v2\/media?parent=6372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.salvadorinsurance.com\/es\/wp-json\/wp\/v2\/categories?post=6372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.salvadorinsurance.com\/es\/wp-json\/wp\/v2\/tags?post=6372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}