Jump to content

Definition:Social engineering

From Insurer Brain

🎭 Social engineering in the insurance context refers to manipulative tactics — typically deception, impersonation, or psychological pressure — used to trick employees of an insured organization into transferring funds, divulging confidential information, or granting unauthorized system access. Unlike a brute-force cyberattack that exploits technical vulnerabilities, social engineering targets human behavior: a convincing email from a "CEO" requesting an urgent wire transfer, a phone call from a fraudulent "vendor" updating bank details, or a spoofed message directing an employee to a credential-harvesting website. The rise of these schemes has created a distinct risk category that underwriters must evaluate separately from traditional crime or cyber exposures.

⚙️ From an underwriting standpoint, social engineering straddles the boundary between computer fraud, funds transfer fraud, and employee dishonesty — none of which may explicitly cover voluntary transfers induced by deception under standard commercial crime policies. Courts have produced conflicting rulings on whether legacy fidelity bonds respond to social engineering losses, prompting insurers to develop dedicated endorsements or standalone social engineering coverage sub-limits. During the underwriting process, carriers assess the applicant's internal controls — dual-authorization for wire transfers, callback verification procedures, and employee training programs — to gauge exposure and set appropriate limits and pricing.

🧠 The insurance industry's response to social engineering reflects a broader shift toward evaluating human-factor risk alongside technological vulnerability. Loss control and risk management services now routinely include phishing simulations and awareness campaigns as part of the value proposition tied to a cyber or crime program. For brokers advising commercial clients, understanding the nuances of social engineering coverage — including how it interacts with cyber, crime, and D&O policies — is essential to closing the gaps that attackers exploit.

Related concepts