Preventing social engineering fraud: policies, procedures and insurance considerations

Although not everyone may be familiar with the term, it has become exceeding difficult to find an individual or organization that hasn’t been targeted by ‘social engineering’. More than 84% of U.S. citizens have experienced social engineering attacks, according to a recent study by NordVPN (opens a new window) , with nearly half receiving manipulative emails with deceptive links and more than a third falling victim to these scams. Organizations, meanwhile, typically receive two to three attempts from threat actors every business day, according to cybersecurity firm Barracuda (opens a new window) .

Social engineering, however, is not a uniquely American phenomenon. In 2021, social engineering was a factor on 60% of data breaches across Europe, the Middle East and Africa, according to Verizon (opens a new window) .

These numbers highlight how critical education, policies, and procedures to prevent social engineering fraud are to the integrity and financial health of all organizations.

Social engineering fraud attack methods

Social engineering is defined in the Oxford English Dictionary as “the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.”

Social engineering threat actors typically investigate and monitor potential victims, learning their contacts and daily activity, before starting their attack. They do this by obtaining access to victims’ computer systems and then looking for information that will help attacks be successful. After gathering information, threat actors will then proceed to deceive and attack.

Some of the methods used to get into a victim’s system include:

These attempts mimic mundane, typical business activities — but if acted upon, they can lead to sizable financial losses and reputational harm.

Avoiding social engineering fraud

Social engineering attacks occur frequently, with the number of incidents continuing to grow as threat actors become more knowledgeable and creative. Being fully aware of the risk and enacting best-in-class protocols and controls can alleviate much of the potential risk of an organization falling victim to social engineering fraud.

Organizations should train employees:

Organizations should also create and enforce strict policies and procedures regarding banking information changes. Such policies should:

Internally, organizations should determine the best way to communicate any potential banking changes. They should also consider the use of effective spam filters and seek to secure devices by enabling multi-factor authentication (MFA) to ensure protection of overall systems, providing security awareness training more than annually and continually updating antivirus software.

Potential insurance coverage

Insurance coverage for funds stolen through social engineering fraud is fairly limited. Coverage is typically available under crime insurance policies, but is often subject to a small sublimit.

In the past, crime policies were silent about social engineering fraud. As the number of attacks and resulting losses have grown, however, insurers have responded by revising crime policies to cover social engineering fraud affirmatively, but only to the extent of their low sublimits.

Some cyber policies also provide this coverage today, but with comparable sublimits. Higher social engineering limits can be obtained from select markets, subject to additional underwriting. Some carriers, however, will require proof that proper verification/authorization procedures exist and were followed as a condition of providing this coverage.

For more on social engineering fraud, contact your Lockton advisor or email cyber@lockton.com (opens a new window) .