Protecting Organizational Vulnerabilities from Cyber Crime
Dec 1, 2025
While the periodic multi-million ransomware attacks get viral headlines, a far more pervasive cyber threat quietly drains millions from organizations every day. Social engineering attacks鈥攑articularly those targeting emails鈥攈ave become the favored tool of threat actors. According to a recent survey, 79% of organizations were victims of cyber-attack attempts and events in 2024, down a mere one percent from 2023.1 Attacks are happening globally every day, costing $10.5 trillion, and it鈥檚 taking a toll on organizations, whether they are a global corporation or a 100-person organization.
Social engineering is manipulating emotions. The goal of a social engineering attack is to trick people into sharing information they shouldn鈥檛 share, downloading software they shouldn鈥檛 download, visiting websites they shouldn鈥檛 visit, sending money to criminals, or making other mistakes that compromise their personal or organizational security.2 Threat actors prey on an employees鈥 natural tendencies to please their bosses, meet deadlines, and maintain good business relationships.
Phishing is one of the more common scams that threat actors use when engaging in a social engineering scheme. These scams are digital text or voice messages crafted to look or sound like they come from a trusted individual or a credible organization, one the recipient has a familiar relationship with.3 There are several variations of phishing attacks, including:
Email has evolved into a central hub for modern business operations, a gateway to banking portals, vendor management systems, customer databases, and countless other critical platforms. Threat actors combine phishing scams with social engineering techniques with the hope of snaring an unsuspecting employee into tapping a link that gives them access to an organization鈥檚 digital systems. Insurers refer to successful phishing attacks committed through email as business email compromise (BEC), which, along with funds transfer fraud (FTF), are the top two cyber claims filed, according to Anne Juntunen, claims specialist with Coalition Insurance.
Business email compromise aims to lead to a funds transfer fraud,鈥 Juntunen said on a recent 国产福利在线精品 and Coalition cyber webinar. 鈥淓ven when a threat actor isn鈥檛 able to achieve this goal of the illegal funds transfer, they can still do a lot of damage with a person鈥檚 email.鈥
When threat actors gain control of legitimate employee email accounts, they use this access to perpetrate fraud against their victims鈥 colleagues or third-party vendors or clients, even inducing them into sending money to the threat actor, according to Bret Ommodt, 国产福利在线精品 Cyber Claims Specialist.
Threat actors are particularly interested in employees with privileged access to financial systems, but even compromising a low-level account can provide the intelligence needed for a devastating attack. Suppose an attacker successfully gains a foothold in their victim鈥檚 email. In that case, they can observe communication patterns, understand payment schedules, and wait for opportunities鈥攑erhaps when key personnel are traveling or during busy periods when routine procedures might be relaxed. BEC allows threat actors to access a system, and FTF is when an employee or vendor is tricked into sending money to a fake account.
鈥The more access that a threat actor has to the system, the more likely and more quickly they鈥檙e able to perpetrate this kind of fraud,鈥 Ommodt said on the 国产福利在线精品-Coalition webinar.4 鈥It goes back to the added element of what a BEC is, that it鈥檚 a legitimate email address people have grown accustomed to working with and they鈥檙e more likely to accept change of account details via email without verifying them, if it鈥檚 from an email address that they work with on a weekly or daily basis.鈥
The statistics paint a sobering picture. According to Juntunen, Coalition receives roughly 5 BEC and 5 FTF claims a day, 鈥渁nd we鈥檙e just one carrier,鈥 she cautions. A standalone BEC claim averages $35,000, but the average loss increases up to $185,000 when an email compromise leads to a funds transfer claim.
A restaurant chain鈥檚 recent experience illustrates how seamlessly criminals exploit trusted relationships. The company was remodeling one of its locations and had established a payment schedule with its equipment vendor鈥攆our installments for the project. The first payment, a check sent overnight, proceeded normally.
When the second payment came due, the restaurant鈥檚 accounting team received an email with an invoice. Initially planning to send another check, they received a follow-up message requesting a wire transfer instead, citing urgency. The request came from what appeared to be the vendor鈥檚 email address, continuing an existing conversation thread. The accounting team, maintaining good vendor relations and seeing no red flags, complied with the wire transfer request for $97,000.
Two weeks later, the vendor called asking about the missing payment.
Investigation revealed both the restaurant鈥檚 email environment and the vendor鈥檚 personal email had been compromised. The threat actors had been monitoring communications, understood the payment schedule, and struck at the perfect moment. They didn鈥檛 need to create an elaborate false identity鈥攖hey simply inserted themselves into an existing, trusted business relationship.
When these attacks succeed鈥攁nd they do with alarming frequency鈥攑roper insurance coverage becomes critical. According to Ommodt, cyber and crime insurance are the most applicable coverages to these types of events and provide the best avenues for recovery. These policies typically address social engineering fraud, funds transfer fraud, and phishing-related losses, covering both direct losses and third-party impacts.
These two coverages are not the only opportunities for insureds to recover losses through their insurance. Liability coverages such as management, D&O, employment practices, and errors and omissions can provide sublimits that are applicable to social engineering or funds transfer fraud. According to Ommodt, tapping into these coverages can provide relief from $25,000 up to $100,000, depending on policy and carrier, but when the fraud is in the hundreds of thousands of dollars, 鈥測ou want to explore every opportunity for recovery.鈥
Ommodt cautions that insureds need to review what their cyber policy covers, as cyber insurance is non-standard across providers of cyber insurance. He said organizations must understand how their cyber and P&C coverages apply to a cyber event before an incident occurs. This is also an important consideration when considering a carrier change. What one carrier covers regarding BEC or social engineering, for example, another may not 鈥 both will likely have different limits. Policies are also likely to differ in the risk management protocols they require.
Beyond financial recovery, a comprehensive cyber policy often provides access to forensic experts who can determine the breach鈥檚 extent, legal counsel to navigate notification requirements, and IT resources to prevent future incidents. This support proves invaluable when dealing with compromised vendor relationships and potential regulatory obligations.
While insurance provides essential protection, prevention remains the best strategy.5 Multi-factor authentication has evolved from recommendation to requirement鈥攁ny system that supports it must have it enabled. For financial transactions, implement additional verification layers: always confirm payment changes through previously verified channels, never through email. Consider prohibiting financial updates via email entirely.
Create and enforce callback procedures for all payment changes, using predetermined contacts and phone numbers established during vendor onboarding. Ensure multiple employees verify significant transactions, especially when normal approvers are unavailable. Conduct regular security awareness training that includes simulated attacks鈥攂etter to fail a test than fall for the real thing.
As artificial intelligence makes these attacks more sophisticated and harder to detect, the irony is that our best defenses often involve decidedly analog solutions. Pick up the phone. Verify through separate channels. Trust but verify. In an age of deepfakes and AI-generated communications, human connection becomes a necessary layer of protection.
Building a cyber defense is about instilling organizational resiliency that protects not only the organization but also its personnel, vendors, and clients. From client relationships to privacy issues, the ripples of one cyber event can create waves of damage, especially if threat actors鈥 activities remain undetected.
The threat landscape will continue evolving, and a cyber-attack can debilitate an organization. Resiliency is key, and it starts with understanding current and future risks while implementing the necessary protocols, including the right insurance for your situation. Working with an experienced cyber carrier or broker is an investment with a trusted partner who can help navigate an ever-changing risk landscape.
Learn more about cyber crime trends, mitigation, and insurance solutions in our latest webinar.