Claim Center
We're in the business of helping people, providing prompt and personal claims service when you need us the most.
Call 877-242-2544 anytime, day or night, to report claims. You may also contact your independent agent to report a claim.
Plan & Protect
Reduce risks and enjoy peace of mind with these tips and insights to protect what matters most.
Technology has improved efficiencies, added convenience and helped many companies grow at an incredible pace. Even with advancements in technology, human interaction and error-prevention still play a critical role in protecting our assets. A type of computer fraud called social engineering entails manipulating and deliberately deceiving a person and exploiting human weakness to obtain confidential information or assets such as cash.
An email appears to come from a bank, an associate, friend or family member, causing the victim to trust the source. This request could contain a hyperlink or an attachment with malware that allows the attacker to access the victim’s computer, email account, contacts or social network accounts so that attacks can expand to other computers. While phishing is an email sent out to hundreds or thousands of target recipients, spear phishing is an email sent to one specific recipient and is a common means of social engineering.
An email appears to come from a trusted source – usually a superior in the workplace – directing the recipient to issue a check or initiate a wire transfer of money to an overseas account. These scams work because the sender has created and uses an email address similar to that of the actual superior. For example, john@acmecorp.com may be presented with an extra “r” as in john@acmecorrp.com, tricking the recipient into believing the request is truly from a superior.
There are literally thousands of variations of social engineering attacks, and more are being developed daily. The weakest link in any security strategy is the employee who becomes complacent and fails to follow protocols put in place to protect your network and assets. Be vigilant and remind every employee with access to your systems to be aware of and alert for these techniques.
For more information on best practices to protect against phishing and identity theft, visit the Federal Trade Commission’s website.
This loss control information is advisory only. The author assumes no responsibility for management or control of loss control activities. Not all exposures are identified in this article. Contact your local, independent insurance agent for coverage advice and policy service.