Insurance sector urged to sharpen up third-party risk management as attacks surge
The industry has a worse security record than most, with third-party attacks a particular weakness


Most breaches affecting the insurance industry come about through third-party attacks, with third-party software and IT behind half of them, according to new research.
More than a quarter of companies reported breaches last year, SecurityScorecard found, higher than the S&P 500 average and twice as many as the US energy industry.
Notably, third-party attack vectors were behind 59% of these incidents, the highest proportion companies operating in the industry have seen so far and double the global cross-industry average.
More than half the companies had at least one compromised credential in the past two years, and 17% had malware infections and device compromises.
"Insurance companies’ reliance on technology to manage daily operations has outpaced their ability to secure it," said Andrew Correll, SecurityScorecard's senior director of cyber insurability.
"Cyber risks don’t stop at the first layer of defense — they extend deep into the supply chain, where vulnerabilities are harder to detect and even harder to mitigate. Addressing these risks requires a shift in how the industry prioritizes third-party security."
In terms of overall security posture, the top cyber risk factor was application security at 40%, followed by DNS health at 29% and network security at 20%. All three involve weak or missing encryption: weak SSL/TLS protocols, unencrypted redirect chains and unencrypted cookies.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Meanwhile, ransomware was the top threat to the insurance industry - more so than in most other sectors - with every attack tied to a known threat actor involving ransomware.
The study noted that ransomware and third-party breaches frequently overlap, allowing attackers to infect multiple targets at once via supply chain vulnerabilities.
Interestingly, 30 companies - a fifth of the total sample - experienced at least one third-party breach - and these companies actually had slightly higher mean or median security scores than average.
A possible explanation for this lies in the fact that these scores reflect only the organizations' in-house security postures, and not those of vendors, researchers said.
“This suggests that threat actors deliberately targeted strong organizations through weaker third-party links," they wrote.
"An otherwise robust security program can still falter if partners in its supply chain have weaker security postures, creating opportunities for attackers."
SecurityScorecard urged insurance carriers in particular to strengthen third-party risk management.
"Carriers face elevated third-party risks due to dependencies on low-scoring industry segments, including IT vendors and brokers," said the firm, adding that they should focus on their higher-risk partners to reduce vulnerabilities and address frequent breaches and credential compromises.
RELATED WHITEPAPER
Similarly, firms should make sure vendors have their own effective third-party risk management (TPRM) programs. SecurityScorecard said this is a critical risk, but one that’s often overlooked.
This means ensuring vendors have strong TPRM processes to close supply chain gaps and prevent breaches like the MOVEit campaign.
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
A ‘significant increase’ in infostealer malware attacks left 3.9 billion credentials exposed to cyber criminals last year – and experts worry this is a ticking time bomb for enterprises
News The threat of infostealer malware is on the rise, with 4.3 million machines infected last year alone
By Solomon Klappholz Published
-
Compliant security with CDW
whitepaper Maximising the value of technology in an evolving defence sector
By ITPro Published
-
Protect your organization with Microsoft 365
whitepaper Maximising the value of technology in an evolving defence sector
By ITPro Published
-
Integrating Copilot With CDW
whitepaper Maximising the value of technology in an evolving defence sector
By ITPro Published
-
Ten ways Microsoft Copilot will change the way you work
whitepaper Maximising the value of technology in an evolving defence sector
By ITPro Published
-
How to enable M365 Copilot for your organisation
whitepaper Maximising the value of technology in an evolving defence sector
By ITPro Published
-
2024 was a record year for commercial cyber attacks
News China-backed attacks on IoT systems helped keep numbers high
By Emma Woollacott Published
-
Cloud security fears, rising costs, privacy concerns?
Whitepaper The factors driving the demand for on-premises infrastructure
By ITPro Published