{"id":10968,"date":"2024-10-07T10:11:51","date_gmt":"2024-10-07T15:11:51","guid":{"rendered":"https:\/\/www.bbrown.com\/?post_type=insight&#038;p=10968"},"modified":"2024-10-11T12:25:42","modified_gmt":"2024-10-11T17:25:42","slug":"the-ins-and-outs-of-social-engineering-coverage","status":"publish","type":"insight","link":"https:\/\/www.bbrown.com\/us\/insight\/the-ins-and-outs-of-social-engineering-coverage\/","title":{"rendered":"The Ins and Outs of Social Engineering Coverage"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row row_style=&#8221;page-hero&#8221; full_width=&#8221;stretch_row_content&#8221;][vc_column]\n\t<div class=\"hero hero--wrap    \">\n\n\t\t<div class=\"hero--background-image hero--background-image-blur\">\n\t\t\t<div class=\"hero--overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"hero-background\" style=\"background: url(https:\/\/www.bbrown.com\/wp-content\/uploads\/2024\/10\/The-Ins-and-Outs-of-Social-Engineering-Coverage-Brown-Brown-External_web-image.jpg) center center no-repeat; background-size: cover;\"><\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"hero--container\">\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class=\"hero--inner width-100\">\n\n\t\t\t\t\t\n  <div class='content-heading  100%  '>\n    <p class='text-white subheading'>Property &amp; Casualty<\/p>\n    <h1 class='text-white    '>\n      The Ins and Outs of Social Engineering Coverage\n    <\/h1>\n\t\n  <\/div>\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t<\/div>\n\n\t\n[\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243;]\n  <div class='content-heading  100% content-heading--ruled '>\n    \n    <h1 class='text-brand-dark-blue    h2'>\n      The Ins and Outs of Social Engineering Coverage\n    <\/h1>\n\t\n  <\/div>[vc_column_text css=&#8221;&#8221;]Imagine a CEO receiving an urgent call from their finance department because an employee received an email from a sender they believed to be a company officer. The sender requested payment, and the employee granted it. However, that company officer says they never sent the email.<\/p>\n<p>This scenario is likely a social engineering attack. Bad actors\u2019 creativity and ingenuity are endless. Entry points into organizations can be as simple as a one-letter differential in an email address going undetected or a person disguising their voice on the phone to make the request seem authentic. Whatever the method, once an employee initiates a wire transfer and the money has been moved, companies and banks are often left empty-handed.<\/p>\n<p>To help mitigate risks surrounding social engineering, companies can purchase insurance products assisting this type of loss. A comprehensive crime or cyber policy may include social engineering coverage to address the loss in the above scenario. There are considerations to review to help maximize potential coverage.<\/p>\n<h3>Callback Provision<\/h3>\n<p>Many standard crime policies require any employee receiving a request to transfer funds to make an \u201cout-of-band\u201d callback verification. This means a call is placed using a previously validated phone number to reach the requestor. In the scenario, the employee would have made an internal call to the company officer to determine the authenticity of the request before issuing payment. Coverage is typically limited or excluded if a phone call is not made when a policy has such a requirement.<\/p>\n<h3>Vendor or Other Requirements<\/h3>\n<p>Other policies require that the falsified request for funds come from a purported vendor or customer of the insured organization. Coverage could be precluded if the bad actor impersonates someone other than a vendor or customer and transfers funds. <strong>Some cyber policies limit who the bad actor purports to be in an otherwise covered social engineering loss. <\/strong><\/p>\n<h3>Mode of Communication<\/h3>\n<p>Certain cyber and crime policies require fraudulent instructions to be provided through a specific mode of communication such as phone, email or facsimile. Coverage can be limited based on how the bad actor conveyed the request. This is significant, given the increase in deep fakes using artificial intelligence (AI) technology.<\/p>\n<h3>Coverage Section Nuances<\/h3>\n<p>Many crime and cyber policies have a social engineering insuring agreement either built into the base form or added by endorsement. However, there is often confusion around other insuring agreements involving the transfer of funds. Crime policies, for example, characterize losses involving the movement of funds as \u201cfunds transfer\u201d or \u201ccomputer transfer.\u201d The fact pattern of a loss determines which insuring agreement is triggered based on factors such as the entry point of the bad actor, how funds were comprised and whether or not an employee or others were involved.<\/p>\n<h3>Policy Overlap<\/h3>\n<p>A comprehensive review of all policies potentially providing social engineering coverage is critical for discovering possible gaps in coverage and whether an organization could be uninsured or underinsured. It is not uncommon for both a crime and cyber policy to provide coverage for social engineering. Reviewing policies with potential overlap while considering factors including breadth of coverage, retention differences, pricing deltas and insurance provisions (such as other insurance clauses) allows our customers to align their risk transfer strategy with an informed purchasing decision.<\/p>\n<p>With the continued rise in social engineering losses, businesses may wish to ensure adequate coverage. Given the publicity of these incidents, companies should stay proactive and alert. Cyber and crime liability coverage can assist companies seeking to mitigate risks presented by the threat of social engineering losses.<\/p>\n<p>As business, insurance and technology communities monitor for incidents, companies should carefully assess the effects of a potential social engineering loss and determine if their policies address the incidents as broadly as possible. A trusted broker can help companies seeking to limit the risk with the proper insurance coverage.[\/vc_column_text]\t<div class='wpb_content_element text-left btn-container'>\n\t\t\t\t\t<a class='btn btn-brand-green  '\n\t\t\t\thref='https:\/\/www.bbrown.com\/wp-content\/uploads\/2024\/10\/The-Ins-and-Outs-of-Social-Engineering-Coverage-Brown-Brown-External_web-1-1-1.pdf' target='_blank' data-toggle=''>\n\t\t\t\t<span class=\"btn-text-color--default\">Download PDF<\/span>\n\t\t\t<\/a>\n\t\t\t<\/div>\n[\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;1015&#8243; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_separator border_width=&#8221;2&#8243; el_width=&#8221;60&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h6 style=\"text-align: center;\">Huntley Jackson<\/h6>\n<p style=\"text-align: center;\">Managing Director, Senior Broker<\/p>\n<p>[\/vc_column_text][vc_separator border_width=&#8221;2&#8243; el_width=&#8221;60&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h6 style=\"text-align: center;\">Jessica Slater<\/h6>\n<p style=\"text-align: center;\">Vice President, Cyber<\/p>\n<p>[\/vc_column_text][vc_separator border_width=&#8221;2&#8243; el_width=&#8221;60&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h6 style=\"text-align: center;\">Michael D&#8217;Ambrise<\/h6>\n<p style=\"text-align: center;\">Senior Vice President<\/p>\n<p>[\/vc_column_text]\t<div class='wpb_content_element text-center btn-container'>\n\t\t\t\t\t<a class='btn btn-brand-dark-blue  '\n\t\t\t\thref='\/us\/contact\/contact-general\/' target='' data-toggle=''>\n\t\t\t\t<span class=\"btn-text-color--default\">Connect Now<\/span>\n\t\t\t<\/a>\n\t\t\t<\/div>\n[\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row row_style=&#8221;page-hero&#8221; full_width=&#8221;stretch_row_content&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]Imagine a CEO receiving an urgent call from their finance department because an employee received an email from a sender they believed to be a company [&hellip;]<\/p>\n","protected":false},"author":66,"featured_media":10969,"template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"insight_category":[34],"class_list":["post-10968","insight","type-insight","status-publish","has-post-thumbnail","hentry","insight_category-property-casualty"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Ins and Outs of Social Engineering Coverage - Brown &amp; Brown<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bbrown.com\/us\/insight\/the-ins-and-outs-of-social-engineering-coverage\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Ins and Outs of Social Engineering Coverage\" \/>\n<meta property=\"og:description\" content=\"[vc_row row_style=&#8221;page-hero&#8221; full_width=&#8221;stretch_row_content&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]Imagine a CEO receiving an urgent call from their finance department because an employee received an email from a sender they believed to be a company [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bbrown.com\/us\/insight\/the-ins-and-outs-of-social-engineering-coverage\/\" \/>\n<meta property=\"og:site_name\" content=\"Brown &amp; Brown\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-11T17:25:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bbrown.com\/wp-content\/uploads\/2024\/10\/The-Ins-and-Outs-of-Social-Engineering-Coverage-Brown-Brown-External_LinkedIn-Image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"4170\" \/>\n\t<meta property=\"og:image:height\" content=\"2084\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.bbrown.com\\\/us\\\/insight\\\/the-ins-and-outs-of-social-engineering-coverage\\\/\",\"url\":\"https:\\\/\\\/www.bbrown.com\\\/us\\\/insight\\\/the-ins-and-outs-of-social-engineering-coverage\\\/\",\"name\":\"The Ins and Outs of Social Engineering Coverage - Brown &amp; Brown\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.bbrown.com\\\/us\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.bbrown.com\\\/us\\\/insight\\\/the-ins-and-outs-of-social-engineering-coverage\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.bbrown.com\\\/us\\\/insight\\\/the-ins-and-outs-of-social-engineering-coverage\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.bbrown.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/The-Ins-and-Outs-of-Social-Engineering-Coverage-Brown-Brown-External_web-image.jpg\",\"datePublished\":\"2024-10-07T15:11:51+00:00\",\"dateModified\":\"2024-10-11T17:25:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.bbrown.com\\\/us\\\/insight\\\/the-ins-and-outs-of-social-engineering-coverage\\\/#breadcrumb\"},\"inLanguage\":\"us\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.bbrown.com\\\/us\\\/insight\\\/the-ins-and-outs-of-social-engineering-coverage\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"us\",\"@id\":\"https:\\\/\\\/www.bbrown.com\\\/us\\\/insight\\\/the-ins-and-outs-of-social-engineering-coverage\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.bbrown.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/The-Ins-and-Outs-of-Social-Engineering-Coverage-Brown-Brown-External_web-image.jpg\",\"contentUrl\":\"https:\\\/\\\/www.bbrown.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/The-Ins-and-Outs-of-Social-Engineering-Coverage-Brown-Brown-External_web-image.jpg\",\"width\":1000,\"height\":527},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.bbrown.com\\\/us\\\/insight\\\/the-ins-and-outs-of-social-engineering-coverage\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.bbrown.com\\\/us\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insights\",\"item\":\"https:\\\/\\\/www.bbrown.com\\\/us\\\/news-events\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Ins and Outs of Social Engineering Coverage\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.bbrown.com\\\/us\\\/#website\",\"url\":\"https:\\\/\\\/www.bbrown.com\\\/us\\\/\",\"name\":\"Brown &amp; Brown\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.bbrown.com\\\/us\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.bbrown.com\\\/us\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"us\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.bbrown.com\\\/us\\\/#organization\",\"name\":\"Brown &amp; Brown\",\"url\":\"https:\\\/\\\/www.bbrown.com\\\/us\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"us\",\"@id\":\"https:\\\/\\\/www.bbrown.com\\\/us\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.bbrown.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/cropped-BBRetail002-RGBrevs.png\",\"contentUrl\":\"https:\\\/\\\/www.bbrown.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/cropped-BBRetail002-RGBrevs.png\",\"width\":1000,\"height\":136,\"caption\":\"Brown &amp; Brown\"},\"image\":{\"@id\":\"https:\\\/\\\/www.bbrown.com\\\/us\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Ins and Outs of Social Engineering Coverage - Brown &amp; Brown","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bbrown.com\/us\/insight\/the-ins-and-outs-of-social-engineering-coverage\/","og_locale":"en_US","og_type":"article","og_title":"The Ins and Outs of Social Engineering Coverage","og_description":"[vc_row row_style=&#8221;page-hero&#8221; full_width=&#8221;stretch_row_content&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]Imagine a CEO receiving an urgent call from their finance department because an employee received an email from a sender they believed to be a company [&hellip;]","og_url":"https:\/\/www.bbrown.com\/us\/insight\/the-ins-and-outs-of-social-engineering-coverage\/","og_site_name":"Brown &amp; Brown","article_modified_time":"2024-10-11T17:25:42+00:00","og_image":[{"width":4170,"height":2084,"url":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2024\/10\/The-Ins-and-Outs-of-Social-Engineering-Coverage-Brown-Brown-External_LinkedIn-Image.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.bbrown.com\/us\/insight\/the-ins-and-outs-of-social-engineering-coverage\/","url":"https:\/\/www.bbrown.com\/us\/insight\/the-ins-and-outs-of-social-engineering-coverage\/","name":"The Ins and Outs of Social Engineering Coverage - Brown &amp; Brown","isPartOf":{"@id":"https:\/\/www.bbrown.com\/us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bbrown.com\/us\/insight\/the-ins-and-outs-of-social-engineering-coverage\/#primaryimage"},"image":{"@id":"https:\/\/www.bbrown.com\/us\/insight\/the-ins-and-outs-of-social-engineering-coverage\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2024\/10\/The-Ins-and-Outs-of-Social-Engineering-Coverage-Brown-Brown-External_web-image.jpg","datePublished":"2024-10-07T15:11:51+00:00","dateModified":"2024-10-11T17:25:42+00:00","breadcrumb":{"@id":"https:\/\/www.bbrown.com\/us\/insight\/the-ins-and-outs-of-social-engineering-coverage\/#breadcrumb"},"inLanguage":"us","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bbrown.com\/us\/insight\/the-ins-and-outs-of-social-engineering-coverage\/"]}]},{"@type":"ImageObject","inLanguage":"us","@id":"https:\/\/www.bbrown.com\/us\/insight\/the-ins-and-outs-of-social-engineering-coverage\/#primaryimage","url":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2024\/10\/The-Ins-and-Outs-of-Social-Engineering-Coverage-Brown-Brown-External_web-image.jpg","contentUrl":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2024\/10\/The-Ins-and-Outs-of-Social-Engineering-Coverage-Brown-Brown-External_web-image.jpg","width":1000,"height":527},{"@type":"BreadcrumbList","@id":"https:\/\/www.bbrown.com\/us\/insight\/the-ins-and-outs-of-social-engineering-coverage\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.bbrown.com\/us\/"},{"@type":"ListItem","position":2,"name":"Insights","item":"https:\/\/www.bbrown.com\/us\/news-events\/"},{"@type":"ListItem","position":3,"name":"The Ins and Outs of Social Engineering Coverage"}]},{"@type":"WebSite","@id":"https:\/\/www.bbrown.com\/us\/#website","url":"https:\/\/www.bbrown.com\/us\/","name":"Brown &amp; Brown","description":"","publisher":{"@id":"https:\/\/www.bbrown.com\/us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bbrown.com\/us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"us"},{"@type":"Organization","@id":"https:\/\/www.bbrown.com\/us\/#organization","name":"Brown &amp; Brown","url":"https:\/\/www.bbrown.com\/us\/","logo":{"@type":"ImageObject","inLanguage":"us","@id":"https:\/\/www.bbrown.com\/us\/#\/schema\/logo\/image\/","url":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/12\/cropped-BBRetail002-RGBrevs.png","contentUrl":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/12\/cropped-BBRetail002-RGBrevs.png","width":1000,"height":136,"caption":"Brown &amp; Brown"},"image":{"@id":"https:\/\/www.bbrown.com\/us\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/insight\/10968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/insight"}],"about":[{"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/types\/insight"}],"author":[{"embeddable":true,"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":0,"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/insight\/10968\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/media\/10969"}],"wp:attachment":[{"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/media?parent=10968"}],"wp:term":[{"taxonomy":"insight_category","embeddable":true,"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/insight_category?post=10968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}