Cybercriminals know employees lack knowledge about network breaches. That’s why more than 99% of emails that distribute malware entice employees to follow links, open documents, and accept security warnings*—enabling hackers to infiltrate organizations. Let AXIS help you and your clients prepare, prevent and recover from social engineering incidents.

*Source: The Human Factor Report, 2019
TAKE A QUIZ
While only 3% of cyberattacks involve malware, what percent use Social Engineering?
97% – Correct!
Incorrect! It’s 97%.
CHOOSE AN ANSWER
TAKE A QUIZ
What percent of Social Engineering attacks are successful?
79% – Correct!
Incorrect! It’s 79%.
CHOOSE AN ANSWER
TAKE A QUIZ
What percent of all companies experienced phishing attacks last year?
83% – Correct!
Incorrect! It’s 83%.
CHOOSE AN ANSWER
Thanks you for taking our quiz. Please explore the rest of the page to learn more about social engineering.
Do you know how prevalent Social Engineering actually is?
While only 3% of cyberattacks involve malware, 97% use Social Engineering.
79% of Social Engineering attacks are successful.
83% of all companies experienced phishing attacks last year.
What are the threats?
Cybercrimes today are more technologically advanced and less likely to be detected. Help educate your clients about potential cyberattacks. Find out about the many different types of Social Engineering attacks that could impact your clients’ businesses. Select a term to learn more.
Tailgating
Business Email Attacks (BEA)
Phishing
Fraud
Malware
Spoofing
Pretexting
Vishing
Baiting / Quid Pro Quo
Ransomware
Smishing
TAILGATING
When someone who is not authorized, accesses a restricted area by following an employee who is authorized and enters a restricted zone
BUSINESS EMAIL ATTACKS (BEA)
Carefully planned emails to trick recipients into transferring funds to a fraudulent account.
Phishing
Attemps to persuade users to open what turns out to be unsafe attachments or clicking on dangerous URLs
FRAUD
Fraudulent emails appear to originate from an executive asking a recipient to wire money or disclose sensitive information.
MALWARE
Disruptive or damaging software specifically designed to achieve unauthorized access to a computer system.
SPOOFING
Tricking employees and customers into thinking a web address is real by making it look like it came from a trusted brand.
PRETEXTING
When an individual lies to receive privileged data.
BAITING / QUID PRO GUO
Asks for information with a promise in exchange for that information, typically a form of service.
RANSOMWARE
Malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid.
SMISHING
Security attacks that trick users into downloading a Trojan horse, virus or other malware onto a cellular phone or other mobile device.
VISHING
When someone tries to trick you into giving them your private information via a text, SMS or voice message.
Tailgating
When someone who is not authorized, accesses a restricted area by following an employee who is authorized and enters a restricted zone.
Are your clients prepared for Social Engineering?
Contact Us

You would think tech-savvy millennials know all about Social Engineering threats. In fact, they don’t.
Studies show Baby Boomers and Gen-Xers are much more knowledgeable about Social Engineering. In fact, they outperform all others in fundamental understanding of phishing and ransomware.
ANSWERED INCORRECTLY
DID NOT KNOW
ANSWERED CORRECTLY
Source: State of the Phish Report

What industries are most vulnerable to cyberattacks?
AVERAGE NUMBER OF EMAIL FRAUD ATTACKS
Engineering is 90%
more likely to be
attacked than
other industries
Source: The Human Factor Report, 2019
Less than what percent of cyberattacks use system vulnerabilities?
The rest exploit human interaction.
Source: The Human Factor Report, 2019
“Training employees about Social Engineering creates a human firewall — making companies less vulnerable.”
Lisa Block
Vice President, AXIS
National Commercial Crime Product Manager

Risks associated with Social Engineering require thinking in new and dynamic ways, which is exactly what we deliver for you and your clients.

Contact Us
Contact Us
Lisa Block
Vice President - National Commercial Crime Product Manager
AXIS Insurance
Princeton, NJ
Lisa Block
lisa.block@axiscapital.comlisa.block@axiscapital.com
Tel +1-212-500-7689Tel +1-212-500-7689
Lisa Block
Vice President - National Commercial Crime Product Manager
AXIS Insurance
Princeton, NJ
Dominick Zenzola
lisa.block@axiscapital.com
+1-212-500-7689
Scan code with your smartphone camera
Tap to add to your contacts
qr code

Source: AXIS Capital Holdings Limited

Solutions
more results
People
more results
Resources
more results
News & More
more results
(0) results

Please try another search term our browse our insurance and reinsurance solutions.

contact
AXIS Contact Us
Let’s start the conversation
Please select the topic of your inquiry
Select a topic for your claim
Please select the topic of your inquiry
Tell us a bit about you.
We'll keep it short.
ALL FIELDS REQUIRED
First & Last
Company
Phone number
Work email
Confirm email
Continue
We serve 200+ countries.
Where are you located?
Please select a country
Country
Continue
What are you interested in? An AXIS representative will reach out soon.
Enter your message
Submit
Thank you {{name}}.
We'll get back to you soon.
A confirmation email has been sent to {{email}}
Learn more about AXIS
Scan code with your smartphone camera
Tap to add to your contacts
qr code

Meet the team

Scan code with your smartphone camera
Tap to add to your contacts
qr code