As professional and financial risks evolve, you’ll be prepared with Amwins. Through our expertise, market access and proprietary products, Amwins' professional lines insurance specialists find solutions for accounts of all sizes and complexities.
As professional and financial risks evolve, you’ll be prepared with Amwins. Through our expertise, market access and proprietary products, Amwins' professional lines insurance specialists find solutions for accounts of all sizes and complexities.
annual premium placements
submissions received annually
dedicated professionals
Amwins offers our clients discounts with industry-leading cyber security service providers who can help insureds improve their risk profile.
Our proprietary cyber benchmarking tool analyzes data from thousands of cyber liability placements, then determines a reasonable policy limit and premium relative to those in similar industries and revenue ranges.
From designing a proactive claims management plan to engaging on difficult and complex claims, Amwins supports our clients when they need us most.
Stay up to date on emerging liability insurance trends and topics
In recent years, hackers and cyber-thieves have been developing new techniques to infiltrate insureds’ bank accounts. Early phishing scams were fairly easy to spot: a request from a Nigerian prince or a link purported to take you to your bank’s customer service center were tell-tale signs of suspicious email traffic. It was recommended to never click on the link and delete the email immediately. In response to the masses becoming more aware of these red flags, thieves have countered with more sophisticated attacks, such as CEO Fraud, also known as Social Engineering Fraud. Social engineering is defined as “psychological manipulation of people into performing actions or divulging confidential information.” 1
Here are some examples of what CEO Fraud or Social Engineering Fraud might look like:
Example #1
An email, purportedly from the CEO, is sent to the firm’s accounting department authorizing an urgent payment to a new vendor with a bogus bank account number. Not wanting to disappoint the CEO, the amount is transferred only to find out the CEO never requested any new vendor payments. Hackers might follow a CEO or CFO’s social media posts to see when they are traveling to make verbal confirmation more difficult for the target.
Example #2
After months of monitoring transactions from accounts payable to a foreign vendor, hackers create a fake email address that is similar to that of the foreign vendor. They then use the fake email address to inform an accounts payable representative that the bank account number has changed and to please send payment to the new account number. Often, the company will only be aware of these fraudulent payments when the real vendor follows up for payment. By then the money is unrecoverable.
CEO Fraud is now a $5.3 billion dollar business, up from $2.3 billion in 2016 according to the FBI. Twenty five percent of U.S. victims respond by wiring money to fraudulent accounts. In an effort to recoup these losses, insureds are looking to their crime policies for reimbursement for their losses. Specifically, they are looking to the Funds Transfer Fraud (“The company shall pay the parent organization for direct loss of money sustained by an insured resulting from funds transfer fraud committed by a third party”) and Computer Fraud (“The company shall pay the parent organization for direct loss of money sustained by an insured resulting from computer fraud committed by a third party”) insuring agreements.
Unfortunately, under the CEO Fraud scenario, funds are transferred willingly, with the insured’s knowledge; therefore, claims are declined under the Funds Transfer Fraud insuring agreement. Similarly, under the Computer Fraud insuring agreement, the carrier can argue that coverage has not been triggered as the fraudulent payment instructions came into the company via email, and email by its nature is an authorized entry. Another method used is the Voluntary Parting Exclusion, which excludes coverage when an insured willfully parts with title to, or possession of, any property.
Cyber carriers are beginning to offer policy enhancement endorsements that affirm sublimited coverage for CEO Fraud or Social Engineering Fraud. The wording to look for which confirms coverage may look similar to this:
“The Insurer will pay the Insured Entity for Social Engineering Fraud Loss resulting directly from a Social Engineering Fraud Event, in excess of the applicable retention and within the applicable Limits of Insurance.
It is a condition precedent to coverage under the Social Engineering Fraud Coverage that the Insured attempted to Authenticate the Fraudulent Instruction prior to transferring any Money or Securities.”
How we do we address this increasing risk as an industry? Traction is gaining and more carriers are beginning to extend coverage by endorsement, albeit under sublimits, in both Crime and Cyber lines. Even these small improvements show signs of progress in the industry. By discussing this issue with insureds, retail agents and brokers can provide added value by urging them to educate their employees and set protocols for verifying large or frequent transfers.
_______________________________
This article was co-authored by Brandyn Surprenant and Mikkel Vogele of AmWINS Brokerage in Chicago, Illinois.
1 https://en.wikipedia.org/wiki/Social_engineering_(security)
In recent years, unintended coverage for cyber events has bled into other lines of insurance – prompting insurers to adopt various exclusions and changes to non-cyber policies. This phenomenon is creating a new class of coverage gaps known as silent cyber.
In response, Amwins created CyberUP, the market's first insurance product designed to counteract silent cyber. This cyber umbrella policy provides retailers and insureds peace of mind for whatever type of losses are triggered from a cyber event.
Read more about the Amwins' product innovation and CyberUP.