google.com, pub-6007374308804254, DIRECT, f08c47fec0942fa0
More

    Third-Party Attack Vectors Responsible for 59% of Insurance Breaches

    Of the top 150 insurance companies involved in third-party attack vectors, 59% exposed critical vulnerabilities in the sector’s supply chain, more than double the global cross-industry average of 29%. Third-party software & IT caused 50% of these breaches.

    The findings underscore the systemic risks posed by cyber threats to an industry responsible for safeguarding sensitive financial and personal information.

    The insurance industry’s interconnected network of carriers and reinsurers to brokers, claims processors and specialized IT providers is essential for delivering services but introduces significant cyber risks.

    “Insurance companies’ reliance on technology to manage daily operations has outpaced their ability to secure it,” said Andrew Correll, senior director of cyber insurability. “Cyber risks don’t stop at the first layer of defense — they extend deep into the supply chain, where vulnerabilities are harder to detect and even harder to mitigate. Addressing these risks requires a shift in how the industry prioritizes third-party security.”

    Insurance carriers were disproportionately affected by third-party breaches, said SecurityScorecard.

    Although carriers made up about 27% of the total sample, they represented 50% of the companies hit by third-party incidents. More than half (56%) of companies had at least one compromised credential in the past two years, the report found.

    Malware infections and device compromises affected 17% of companies last year.

    The lowest-scoring cyber risk factors for the sector are application security, domain name system health, and network security. DNS health rarely ranks among these factors.

    Some actionable insights for the insurance sector to strengthen its supply chain:

    • Strengthen third-party risk management. Carriers face elevated third-party risks due to dependencies on low-scoring industry segments, including IT vendors and brokers. Focus on high-risk partners to reduce vulnerabilities and address frequent breaches and credential compromises.
    • Ensure vendors have their own effective TPRM programs. Fourth-party risks from vendors’ suppliers are critical but often missed. Ensure vendors have strong TPRM processes to close supply chain gaps and prevent breaches like the MOVEit campaign.
    • Avoid paying ransomware demands. Paying ransoms encourages attacks, risks legal issues and doesn’t ensure recovery. Avoiding payments helps deter criminals and protects the broader ecosystem.

    The most important insurance news,in your inbox every business day.

    Get the insurance industry’s trusted newsletter



    Source link

    Recent Articles

    Want to change? Consider your situation

    Imagine that a certain person — let’s call them Robin — is walking across a college campus when they pass a doorway and...

    Facts About Solar Panels You Should Know Before Buying

    Solar panels are becoming more common on roofs across the nation. They can save you money and reduce emissions, using an abundant source...

    Trump’s Economic Team and Tariff-fest 2025

    Years (or months) from now, if the economy goes into recession, remember this is the team that brought you that outcome. Notes:...

    Banking groups clash over state vs. federal escrow rules

    A coalition of national groups representing the financial industry and two organizations representing bank regulators have filed two opposing friend-of-the-court briefs in one...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox

    google.com, pub-6007374308804254, DIRECT, f08c47fec0942fa0
    google.com, pub-6007374308804254, DIRECT, f08c47fec0942fa0