Phishing and software vulnerability exploitation are on the rise.
Globally, phishing is on our radar again. Though this social engineering trend is not new, the heightened frequency is notable – and speaks to the need for greater diligence on the part of organisations and individuals alike.
Claims data also shows that incidents that start with an exposed software vulnerability are rising in frequency in the US. As new critical vulnerabilities are exposed on hundreds of thousands of servers, there is growing likelihood that a hacker may gain access to an organisation’s systems.
The exploitation of previously unknown vulnerabilities (known as zero-day vulnerabilities) is a key tactic that hackers are using to gain entry into systems and networks. When these tactics are successful, others quickly jump to imitate, leaving millions of unpatched systems at risk.Monique ParrishBeazley Cyber Services Manager, Houston
The information set forth in this communication is intended as general risk management information. It is made available with the understanding that Beazley does not render legal services or advice. It should not be construed or relied upon as legal advice and is not intended as a substitute for consultation with counsel. Although reasonable care has been taken in preparing the information set forth in this communication, Beazley accepts no responsibility for any errors it may contain or for any losses allegedly attributable to this information. Non-insurance products and services are provided by non-insurance company Beazley affiliates and independent third parties. Separate terms and conditions may apply.