{"id":53973,"date":"2023-10-05T00:06:00","date_gmt":"2023-10-05T00:06:00","guid":{"rendered":"https:\/\/www.darkreading.com\/edge\/insurance-companies-have-a-lot-to-lose-in-cyberattacks"},"modified":"2023-10-05T00:06:00","modified_gmt":"2023-10-05T00:06:00","slug":"insurance-companies-have-a-lot-to-lose-in-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\/","title":{"rendered":"Insurance Companies Have a Lot to Lose in Cyberattacks"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1433982ef5eca2a1\/651dfd7c6f5d5d8c9ea25cac\/insuranceload-Bordeianu_Andrei-alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Insurance companies have a huge target on their proverbial backs as cyber attackers increase their focus on an industry ripe with personal, medical, corporate, and other confidential data that can be monetized after a data breach.<\/p>\n<p>In 2023 alone, <a href=\"https:\/\/www.insurancebusinessmag.com\/us\/guides\/the-insurance-industry-cyber-crime-report-recent-attacks-on-insurance-businesses-448429.aspx#:~:text=In%20a%20notification%20letter%20dated,personal%20information%20accessed%20by%20hackers.\" target=\"_blank\" rel=\"noopener\">multiple insurance companies have been targeted<\/a>, including Sun Life in June via an attack on its vendor Pension Benefits Information LLC; Prudential Insurance in May, in which more than 320,000 customer accounts were impacted; New York Life Insurance Company, which had 25,700 accounts affected during the same days period as the Prudential attack; and Genworth Financial, which had up to 2.7 million individuals affected. All of these insurance companies were victims of the <a href=\"https:\/\/www.darkreading.com\/endpoint\/moveit-transfer-another-critical-data-theft-bug\" target=\"_blank\" rel=\"noopener\">MOVEit file transfer cyberattack<\/a>.<\/p>\n<p>Aside from MOVEit, other common ransomware attacks also targeted the insurance industry. Point32Health, the parent company of Harvard Pilgrim Health Care and Tufts Health Plan, was hit by a <a href=\"https:\/\/www.darkreading.com\/endpoint\/harvard-pilgrim-health-care-notifies-individuals-of-privacy-incident\" target=\"_blank\" rel=\"noopener\">ransomware attack<\/a> in April, while NationsBenefits reported that it was a victim of the Cl0p ransomware gang. The <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/9-million-dental-patients-affected-lockbit-attack-mcna\" target=\"_blank\" rel=\"noopener\">largest US attack on an insurance company<\/a> compromised 9 million patients of Managed Care of North America (MCNA) Dental, a victim of the <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/lockbit-using-rmms-spread-ransomware\" target=\"_blank\" rel=\"noopener\">LockBit attack<\/a>.<\/p>\n<p>Consulting firm <a href=\"https:\/\/www2.deloitte.com\/tw\/en\/pages\/risk\/articles\/insurance.html\" target=\"_blank\" rel=\"noopener\">Deloitte noted<\/a>, &#8220;Cyber-attacks in the insurance sector are growing exponentially as insurance companies migrate toward digital channels in an effort to create tighter customer relationships, offer new products and expand their share of customers&#8217; financial portfolios. This shift is driving increased investment in traditional core IT systems (e.g., policy and claims systems) as well as in highly integrated enabling platforms such as agency portals, online policy applications and web- and mobile-based apps for filing claims.&#8221;<\/p>\n<p>The firm added, &#8220;As insurers find new and innovative ways to analyze data, they must also find ways to secure the data from cyber-attacks.&#8221;<\/p>\n<h2 class=\"regular-text\">Applications Reveal a Lot<\/h2>\n<p>The reasons insurance brokers and carriers are now in the hotseat are varied, as Deloitte noted, but several stand out as key motives. While the most mundane is the profitability of obtaining personally identifiable information and personal health information for resale, there are more nefarious inducements to attack insurers. For example, insurance applications.<\/p>\n<p>The amount of private, corporate data that appears on an insurance application could be a bonanza to cyber attackers, says Marc Schein, national co-chair of the Cyber Risk Practice and a risk management consultant at Marsh McLennan Agency, an insurance broker. Schein notes that applications include a vast array of potentially useful information, including the amount of insurance a company is purchasing (ransomware attackers do not want to leave money on the table when they demand a ransom) as well as some of the deficiencies a company might have in its network security.<\/p>\n<p>Schein points out that other insurance products, such as errors and omissions policies or directors and officers policies, could provide valuable information about trade secrets, private information of key company executives, and data about potential business transactions.<\/p>\n<p>Patricia Titus is chief privacy and information security officer at Markel Insurance, a carrier that underwrites its own assurance, specialty, and international policies. She agrees that applications can provide a deep understanding of a company&#8217;s technology profile.<\/p>\n<p>Insurance applications can identify technology debt, Titus says \u2014 unpatched software, outdated hardware that might be past the manufacturer&#8217;s security or software patches, legacy systems that could represent potential security vulnerabilities, and other deficiencies a company might have in its network security. These vulnerabilities could be exploited by attackers.<\/p>\n<h2 class=\"regular-text\">All Sides of Insurance Transactions Are Vulnerable<\/h2>\n<p>It is not only insurance clients that need to evaluate their cybersecurity infrastructure, Titus points out. Markel is looking at ways it can better protect its own data, as well as that of its clients.<\/p>\n<p>In Markel&#8217;s case, Titus says, the company is looking at technologies that could do a better job of <a href=\"https:\/\/www.darkreading.com\/risk\/digital-distancing-with-microsegmentation\" target=\"_blank\" rel=\"noopener\">microsegmenting its networks<\/a>, limiting the ability of attackers to move laterally through the network should they successfully breach the corporate defenses. Moving laterally, she notes, is the greatest advantage an attack can have if they can find a hole into a network.<\/p>\n<p>Human data always is interesting to cyber attackers, Titus adds. Should the attacker be able to access insurance applications or approved policies, they can learn a great deal about potential targets. Individuals and companies alike need to insure high-value luxury items, such as antiques. However, enterprises also insure trade secrets (think of the recipe of Coca-Cola, for example) that cannot be made public through patents, private data about executives and officers, and errors and omissions that might occur during business transactions. Ultimately, there is a vast array of data companies protect that can be identified and compromised should their insurance policies or applications be breached.<\/p>\n<p>Schein recommends that companies submitting an insurance application send encrypted files only so that anything intercepted during transmission cannot be read by the attacker.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/edge\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Not only do insurance companies collate sensitive information from their clients, but they also generate their own corporate data to protect.Read More <a href=\"https:\/\/www.darkreading.com\/edge\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-53973","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Insurance Companies Have a Lot to Lose in Cyberattacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Insurance Companies Have a Lot to Lose in Cyberattacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-05T00:06:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1433982ef5eca2a1\/651dfd7c6f5d5d8c9ea25cac\/insuranceload-Bordeianu_Andrei-alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Insurance Companies Have a Lot to Lose in Cyberattacks\",\"datePublished\":\"2023-10-05T00:06:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\\\/\"},\"wordCount\":805,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt1433982ef5eca2a1\\\/651dfd7c6f5d5d8c9ea25cac\\\/insuranceload-Bordeianu_Andrei-alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\\\/\",\"name\":\"Insurance Companies Have a Lot to Lose in Cyberattacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt1433982ef5eca2a1\\\/651dfd7c6f5d5d8c9ea25cac\\\/insuranceload-Bordeianu_Andrei-alamy.jpg\",\"datePublished\":\"2023-10-05T00:06:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt1433982ef5eca2a1\\\/651dfd7c6f5d5d8c9ea25cac\\\/insuranceload-Bordeianu_Andrei-alamy.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt1433982ef5eca2a1\\\/651dfd7c6f5d5d8c9ea25cac\\\/insuranceload-Bordeianu_Andrei-alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insurance Companies Have a Lot to Lose in Cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Insurance Companies Have a Lot to Lose in Cyberattacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"Insurance Companies Have a Lot to Lose in Cyberattacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-10-05T00:06:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1433982ef5eca2a1\/651dfd7c6f5d5d8c9ea25cac\/insuranceload-Bordeianu_Andrei-alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Insurance Companies Have a Lot to Lose in Cyberattacks","datePublished":"2023-10-05T00:06:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\/"},"wordCount":805,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1433982ef5eca2a1\/651dfd7c6f5d5d8c9ea25cac\/insuranceload-Bordeianu_Andrei-alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\/","url":"https:\/\/www.threatshub.org\/blog\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\/","name":"Insurance Companies Have a Lot to Lose in Cyberattacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1433982ef5eca2a1\/651dfd7c6f5d5d8c9ea25cac\/insuranceload-Bordeianu_Andrei-alamy.jpg","datePublished":"2023-10-05T00:06:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1433982ef5eca2a1\/651dfd7c6f5d5d8c9ea25cac\/insuranceload-Bordeianu_Andrei-alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1433982ef5eca2a1\/651dfd7c6f5d5d8c9ea25cac\/insuranceload-Bordeianu_Andrei-alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/insurance-companies-have-a-lot-to-lose-in-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Insurance Companies Have a Lot to Lose in Cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53973","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53973"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53973\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53973"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53973"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}