Home > Business Insurance > Social Engineering Fraud Coverage

Social Engineering Fraud Coverage
Social engineering fraud (SEF) is a type of fraud that's become increasingly common over the past several years. Unfortunately, it's a type of fraud that can expose a business, even if they have both crime and cyber policies. In this article, learn about SEF, why your existing policies might not cover it, and what endorsements could shore up gaps in existing coverage.

Home > Business Insurance > Social Engineering Fraud Coverage

Social Engineering Fraud Coverage

Social engineering fraud (SEF) is a type of fraud that's become increasingly common over the past several years. Unfortunately, it's a type of fraud that can expose a business, even if they have both crime and cyber policies. In this article, learn about SEF, why your existing policies might not cover it, and what endorsements could shore up gaps in existing coverage.
Social engineering fraud (SEF) is a type of fraud that’s become increasingly common over the last several years. However, even though many instances of this fraud transpire over email communications, it’s a company’s crime policy—not a cyber policy—that would often provide coverage in the event of a SEF loss.

That’s why it’s essential to understand your crime policy, how it might cover SEF, why it might not, and what endorsements you want to obtain to ensure SEF doesn’t expose your company.

 

Cyber Policy vs. Crime Policy

It may seem counterintuitive, but SEF is usually not covered by a cyber policy. Even though this fraud often involves emails and wire transfers, cyber policies are not designed to cover them:

 

  • Cyber policies cover losses that result from unauthorized data breaches or system failures. SEF depends on these systems working correctly to communicate with an organization’s employees and transfer information or funds.
  • Crime policies cover losses that result from theft, fraud, or deception. Because the underlying cause of a loss in SEF is fraud, a company would claim a loss under its crime policy rather than its cyber policy.

 

How Social Engineering Fraud Works

There are several variations on the theme, but most instances of SEF involve the following elements:

 

  • A targeted approach. Criminals will research their targets, purchase authentic-looking domains, manufacture email chains and even resort to making phone calls, all to make their requests seem authentic.
  • A request. The preparation is in service of obtaining something from the target, either money (usually in the form of a wire transfer) or information (such as a list of vendors, W-2 information, routing numbers, etc.).
  • The application of social pressure. To bypass in-house safeguards and redundancies, the criminals apply pressure by imposing a time constraint, demanding secrecy, or simply flattering the ego of the target by including them “in” an important business transaction.
  • The disappearance of the hacker. Once the criminals obtain what they want, they disappear with the information or money—things the company won’t miss until it’s too late.

 

Areas of Cover

A typical crime or fidelity policy contains a few provisions under which a SEF claim might be filed:

 

  • Computer fraud. This refers to losses stemming from the unlawful theft of money due to a “computer violation”— the unauthorized entry into or deletion of data from a computer system by a third party.
  • Funds transfer fraud. This refers to losses from fraudulent instructions to transfer funds made without the insured’s knowledge or consent.

 

Potential Vulnerabilities

Depending upon the specific language and definitions laid out in the crime or fidelity policy, the insurer might argue that SEF is excluded from coverage for several reasons:

 

  • There was no “computer violation.” Often, SEF doesn’t involve compromising network security to steal data. Instead, criminals “hack” human vulnerabilities to gain access. Because the system functioned as it was supposed to, and the criminal gained access due to human failure, an insurer might try to deny the claim.
  • The insured knew about and consented to the transfer. Again, it depends on the policy’s specific language, but an insurer might argue that a SEF isn’t covered under “funds transfer fraud.” That’s because, in most social engineering scenarios, some agent of the insured willingly and knowingly authorized the transfer of funds to the intended account. Again, in SEF, the systems in place to transfer funds worked as intended; it was a human failure that resulted in the loss.
  • The voluntary parting exclusion. Most crime policies have a voluntary parting exclusion that excludes coverage for losses that result from anyone acting on the insured’s authority to part with title to or possession of the property. In other words, it wouldn’t be covered because the employee knowingly and willingly authorized the transfer.

 

Social Engineering Fraud Endorsements

Because of this potential coverage gap, some carriers have started offering SEF endorsements for crime and fidelity policies. The insurance agreements might go by different names, but they’re all intended to make limits and liabilities explicit for both the insured and the policy issuer. A handful of carriers only offer these endorsements, but with the increasing prevalence of SEF, more are likely to follow. To learn more about SEF, and how to protect yourself from it, review the article “Best Defense Against Social Engineering Attacks“.

Social engineering fraud (SEF) is a type of fraud that’s become increasingly common over the last several years. However, even though many instances of this fraud transpire over email communications, it’s a company’s crime policy—not a cyber policy—that would often provide coverage in the event of a SEF loss.

That’s why it’s essential to understand your crime policy, how it might cover SEF, why it might not, and what endorsements you want to obtain to ensure SEF doesn’t expose your company.

 

Cyber Policy vs. Crime Policy

It may seem counterintuitive, but SEF is usually not covered by a cyber policy. Even though this fraud often involves emails and wire transfers, cyber policies are not designed to cover them:

 

  • Cyber policies cover losses that result from unauthorized data breaches or system failures. SEF depends on these systems working correctly to communicate with an organization’s employees and transfer information or funds.
  • Crime policies cover losses that result from theft, fraud, or deception. Because the underlying cause of a loss in SEF is fraud, a company would claim a loss under its crime policy rather than its cyber policy.

 

How Social Engineering Fraud Works

There are several variations on the theme, but most instances of SEF involve the following elements:

 

  • A targeted approach. Criminals will research their targets, purchase authentic-looking domains, manufacture email chains and even resort to making phone calls, all to make their requests seem authentic.
  • A request. The preparation is in service of obtaining something from the target, either money (usually in the form of a wire transfer) or information (such as a list of vendors, W-2 information, routing numbers, etc.).
  • The application of social pressure. To bypass in-house safeguards and redundancies, the criminals apply pressure by imposing a time constraint, demanding secrecy, or simply flattering the ego of the target by including them “in” an important business transaction.
  • The disappearance of the hacker. Once the criminals obtain what they want, they disappear with the information or money—things the company won’t miss until it’s too late.

 

Areas of Cover

A typical crime or fidelity policy contains a few provisions under which a SEF claim might be filed:

 

  • Computer fraud. This refers to losses stemming from the unlawful theft of money due to a “computer violation”— the unauthorized entry into or deletion of data from a computer system by a third party.
  • Funds transfer fraud. This refers to losses from fraudulent instructions to transfer funds made without the insured’s knowledge or consent.

 

Potential Vulnerabilities

Depending upon the specific language and definitions laid out in the crime or fidelity policy, the insurer might argue that SEF is excluded from coverage for several reasons:

 

  • There was no “computer violation.” Often, SEF doesn’t involve compromising network security to steal data. Instead, criminals “hack” human vulnerabilities to gain access. Because the system functioned as it was supposed to, and the criminal gained access due to human failure, an insurer might try to deny the claim.
  • The insured knew about and consented to the transfer. Again, it depends on the policy’s specific language, but an insurer might argue that a SEF isn’t covered under “funds transfer fraud.” That’s because, in most social engineering scenarios, some agent of the insured willingly and knowingly authorized the transfer of funds to the intended account. Again, in SEF, the systems in place to transfer funds worked as intended; it was a human failure that resulted in the loss.
  • The voluntary parting exclusion. Most crime policies have a voluntary parting exclusion that excludes coverage for losses that result from anyone acting on the insured’s authority to part with title to or possession of the property. In other words, it wouldn’t be covered because the employee knowingly and willingly authorized the transfer.

 

Social Engineering Fraud Endorsements

Because of this potential coverage gap, some carriers have started offering SEF endorsements for crime and fidelity policies. The insurance agreements might go by different names, but they’re all intended to make limits and liabilities explicit for both the insured and the policy issuer. A handful of carriers only offer these endorsements, but with the increasing prevalence of SEF, more are likely to follow. To learn more about SEF, and how to protect yourself from it, review the article “Best Defense Against Social Engineering Attacks“.

The Last Word

Contact an InsureGood Advisor today for more information on protecting your business and helping you ensure that coverage gaps don’t exist in your current insurance program.

Additional Resources

a real estate woman putting up a for sale sign for a commercial property with inflation guard

What is Inflation Guard Endorsement?

This article explains the risk of property undervaluation and how an inflation guard can help insureds mitigate the potentially costly effects of underinsuring property due to inflation.

Read More

Loading...

Discover more from InsureGood

Subscribe now to keep reading and get access to the full archive.

Continue reading