{"id":351095,"date":"2025-02-08T00:12:41","date_gmt":"2025-02-07T18:42:41","guid":{"rendered":"https:\/\/www.technologyforyou.org\/?p=351095"},"modified":"2025-02-08T00:12:41","modified_gmt":"2025-02-07T18:42:41","slug":"59-of-breaches-impacting-insurance-sector-caused-by-third-party-attack-vectors","status":"publish","type":"post","link":"https:\/\/www.technologyforyou.org\/59-of-breaches-impacting-insurance-sector-caused-by-third-party-attack-vectors\/","title":{"rendered":"59% of Breaches Impacting Insurance Sector Caused by Third-Party Attack Vectors"},"content":{"rendered":"<header>\n<p class=\"epi-fontLg bwalignc\"><strong><span style=\"font-size: 12pt;\"><i style=\"color: #222222; font-family: Verdana, BlinkMacSystemFont, -apple-system, 'Segoe UI', Roboto, Oxygen, Ubuntu, Cantarell, 'Open Sans', 'Helvetica Neue', sans-serif;\">Report highlights need to address third-party risks as cybersecurity gaps threaten critical services and policyholder trust<\/i><\/span><\/strong><\/p>\n<\/header>\n<div class=\"bw-release-body  \">\n<p class=\"bw-release-timestamp\"><strong>NEW YORK&#8211;(BUSINESS WIRE)&#8211;<\/strong>SecurityScorecard\u00a0today released\u00a0new research showing that 59% of breaches among the top 150 insurance companies involved third-party attack vectors, exposing critical vulnerabilities in the sector\u2019s supply chain. These findings underscore the systemic risks posed by cyber threats to an industry responsible for safeguarding sensitive financial and personal information.<\/p>\n<div class=\"bw-release-story\">\n<p>The insurance industry&#8217;s interconnected network of carriers and reinsurers to brokers, claims processors, and specialized IT providers is essential for delivering services to hundreds of millions but also introduces significant cyber risks.<\/p>\n<p><b>Andrew Correll, Senior Director of Cyber Insurability, said:\u00a0<\/b>\u201cInsurance companies\u2019 reliance on technology to manage daily operations has outpaced their ability to secure it. Cyber risks don\u2019t stop at the first layer of defense \u2014 they extend deep into the supply chain, where vulnerabilities are harder to detect and even harder to mitigate. Addressing these risks requires a shift in how the industry prioritizes third-party security.\u201d<\/p>\n<p><b>Key findings<\/b><\/p>\n<ul class=\"bwlistdisc\">\n<li><b>28%<\/b>\u00a0of companies reported breaches \u2014 higher than the S&amp;P 500 (21%) and double the U.S. energy industry (14%).<\/li>\n<li><b>59%<\/b>\u00a0of breaches involved third-party attack vectors, the highest rate observed so far and more than double the global cross-industry average of<b>\u00a029%.<\/b>\u00a0Third-party software &amp; IT caused\u00a0<b>50%<\/b>\u00a0of these breaches.<\/li>\n<li>Insurance carriers were disproportionately affected by third-party breaches. Although carriers made up about 27% of the total sample, they represented\u00a0<b>50%<\/b>\u00a0of the companies hit by third-party incidents.<\/li>\n<li>More than half (<b>56%<\/b>) of companies had at least one compromised credential in the past two years.<\/li>\n<li>Malware infections and device compromises affected\u00a0<b>17%<\/b>\u00a0of companies last year.<\/li>\n<li>The lowest-scoring cyber risk factors for the sector are application security, DNS health and network security. DNS health rarely ranks among these factors.<\/li>\n<\/ul>\n<p><b>Cybersecurity recommendations for the insurance industry<\/b><\/p>\n<p>Based on this analysis, the SecurityScorecard STRIKE team offers actionable insights for the insurance sector to strengthen its supply chain:<\/p>\n<ul class=\"bwlistdisc\">\n<li><b>Strengthen third-party risk management for insurance carriers:\u00a0<\/b>Carriers face elevated third-party risks due to dependencies on low-scoring industry segments, including IT vendors and brokers. Focus on high-risk partners to reduce vulnerabilities and address frequent breaches and credential compromises.<\/li>\n<li><b>Ensure vendors have their own effective TPRM programs:<\/b>\u00a0Fourth-party risks from vendors\u2019 suppliers are critical but often missed. Ensure vendors have strong TPRM processes to close supply chain gaps and prevent breaches like the MOVEit campaign.<\/li>\n<li><b>Avoid paying ransomware demands:\u00a0<\/b>Paying ransoms encourages attacks, risks legal issues, and doesn\u2019t ensure recovery. Avoiding payments helps deter criminals and protects the broader ecosystem.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Report highlights need to address third-party risks as cybersecurity gaps threaten critical services and policyholder trust NEW YORK&#8211;(BUSINESS WIRE)&#8211;SecurityScorecard\u00a0today released\u00a0new research showing that 59% of breaches among the top 150 insurance companies involved third-party attack vectors, exposing critical vulnerabilities in the sector\u2019s supply chain. These findings underscore the systemic risks posed by cyber threats to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14083],"tags":[],"class_list":{"0":"post-351095","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-technology-industry-news"},"_links":{"self":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/351095","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/comments?post=351095"}],"version-history":[{"count":0,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/351095\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media?parent=351095"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/categories?post=351095"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/tags?post=351095"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}