How cybercriminals target insurance companies
Let’s take a brief dive into how cybercriminals target insurance companies.
Business Email Compromise (BEC) on shared mailboxes
BEC and social engineering don’t require breaking into your system. All it takes is for an attacker to convincingly pretend to be someone else on your staff. The shared inbox that’s accessible to more than one person is a BEC fraudster’s dream.
Credential stuffing attacks
When an unrelated website suffers a data breach, attackers collect those stolen usernames and passwords and then test them across other platforms. This tactic is known as credential stuffing. If you use the same password for both your work email and a random shopping site, attackers can slip into your network and exploit that access for weeks before anyone notices.
Legacy Remote Desktop Protocol (RDP) access
The only good RDP is the one you no longer use, especially in public-facing ways. Remote Desktop Protocol is the security equivalent of leaving a laptop unlocked with a neon blinking “RANSOM HERE” sign. In insurance cybersecurity, outdated RDP access is a common entry point for attackers, giving them easy access to sensitive policyholder data and critical systems.
Third-party portals
TPAs, independent agents, and other vendors who need access to your systems are an entirely different flavor of the same problem. You’re inviting these third parties into your environment, giving them access to your system, and hoping they’re all security experts who will keep their sensitive access details safe. According to Security Magazine, 59% of breaches affecting the insurance sector stem from third-party attack vectors.