{"id":23443,"date":"2025-05-22T11:46:49","date_gmt":"2025-05-22T10:46:49","guid":{"rendered":"https:\/\/www.policybee.co.uk\/blog\/?p=23443"},"modified":"2025-12-31T11:00:00","modified_gmt":"2025-12-31T11:00:00","slug":"a-guide-to-social-engineering-insurance","status":"publish","type":"post","link":"https:\/\/www.policybee.co.uk\/blog\/a-guide-to-social-engineering-insurance","title":{"rendered":"A simple guide to social engineering insurance"},"content":{"rendered":"\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"300\" src=\"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2023\/07\/social-engineering-concept-istock.png\" alt=\"A victim is being targeted by a social engineering attack\" class=\"wp-image-23444\" style=\"width:300px;height:150px\" srcset=\"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2023\/07\/social-engineering-concept-istock.png 600w, https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2023\/07\/social-engineering-concept-istock-300x150.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n\n\n<p>Cybercrime is a big problem in the UK. It costs our economy an <a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2023\/cyber-security-breaches-survey-2023\" target=\"_blank\" rel=\"noreferrer noopener\">estimated \u00a321 billion a year<\/a>.<\/p>\n\n\n\n<p>And there\u2019s no bigger and more devious culprit in cybercrime than social engineering.<\/p>\n\n\n\n<p>It affects everyone. Whether they\u2019re a business owner or a private citizen.<\/p>\n\n\n\n<p>Ever received a dodgy-looking email from &#8216;your bank&#8217;? Or won a &#8216;competition&#8217; where you just need to give some details to claim a grand prize?<\/p>\n\n\n\n<p>Yeah? Then chances are that someone was trying to catch you out using social engineering.<\/p>\n\n\n\n<p>In fact, it\u2019s such an effective technique that it\u2019s used in <a href=\"https:\/\/firewalltimes.com\/social-engineering-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener\">up to 90% of all data breaches<\/a>.<\/p>\n\n\n\n<p>Cybercriminals love messing with your head. Why? Because it works.<\/p>\n\n\n\n<p>The government know this. And they\u2019re trying to combat the problem.<\/p>\n\n\n\n<p>In 2022, they published an 84-page, <a href=\"https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/1049825\/government-cyber-security-strategy.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">eight-year cyber security plan<\/a>. If you\u2019re struggling to sleep, then this page-turner is for you.<\/p>\n\n\n\n<p>It is important, though. And combating social engineering attacks is one of their priorities.<\/p>\n\n\n\n<p>But it\u2019s not just up to them. We all have to do our part. And a lot of it comes down to training yourself to spot these attacks before they affect you.<\/p>\n\n\n\n<p>So let\u2019s delve into the world of social engineering and find out a few ways that you can protect your business against it.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is social engineering?<\/h2>\n\n\n\n<p>Social engineering isn\u2019t specific to cybercrime.<\/p>\n\n\n\n<p>People have used it for thousands of years. In its most basic form, it\u2019s using deception and manipulation to get someone to reveal information or do something.<\/p>\n\n\n\n<p>A good example of this in modern times is con artists. The movie \u2018Catch Me If You Can\u2019, anyone?<\/p>\n\n\n\n<p>It just so happens that it\u2019s really effective online as well.<\/p>\n\n\n\n<p>But why does social engineering work on us?<\/p>\n\n\n\n<p>Well, a lot of the time it comes down to simply not expecting it. Our minds aren\u2019t prepared to be deceived so we don\u2019t look for the warning signs.<\/p>\n\n\n\n<p>Sometimes it also targets our willingness to see what we want to see. Getting a perfectly timed email with just the sort of message you were waiting for makes it more likely you&#8217;ll fall for it.<\/p>\n\n\n\n<p>It\u2019s a devious tactic. But how does it work in the world of cybercrime?<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are the different types of social engineering attack?<\/h2>\n\n\n\n<p>There are loads of different types of social engineering attack. More than we could ever list here.<\/p>\n\n\n\n<p>But knowing about the most common ones can save you a lot of trouble. So we\u2019ll focus on three that you can look out for.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Baiting<\/h3>\n\n\n\n<p>First, we have baiting. This uses a false promise to convince someone to buy in to it. Like a fake competition win or an inheritance.<\/p>\n\n\n\n<p>There\u2019s even a physical form of baiting. A great example of this is a cybercriminal leaving a USB drive in a public area. They\u2019ll label it something enticing, like company payroll. When the unfortunate target puts it into their computer to check it, they\u2019re infected with <a href=\"https:\/\/www.malwarebytes.com\/malware\" target=\"_blank\" rel=\"noreferrer noopener\">malware<\/a>.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Pretexting<\/h3>\n\n\n\n<p>Next, there\u2019s<strong> <\/strong>pretexting. Here, the attacker will gradually obtain information from someone by impersonating someone they know. Like a coworker, their bank, or even a family member.<\/p>\n\n\n\n<p>Let\u2019s say they\u2019ve managed to hack your boss\u2019 email. They see that you\u2019re discussing payment transfers for a client. So they jump into the email chain, impersonating your boss. They then ask you to transfer money to a new bank account.<\/p>\n\n\n\n<p>The critical thing here is that they\u2019ll copy your boss\u2019 email style. Like their sign-off and certain words they use.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Phishing<\/h3>\n\n\n\n<p>Finally, we have the crown jewel of social engineering: phishing.<\/p>\n\n\n\n<p>Phishing is the most common form of social engineering and involves an attacker creating a version of a website. Common examples might be your bank or package delivery service.<\/p>\n\n\n\n<p>In 2022, it was estimated that <a href=\"https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q4_2022.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">over 1.3 million<\/a> of these fake phishing websites were active on the web. And that a new one was popping up <a href=\"https:\/\/dataprot.net\/statistics\/phishing-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener\">every 20 seconds<\/a>.<\/p>\n\n\n\n<p>They then carefully craft an email or text that points to this website.<\/p>\n\n\n\n<p>It might, for example, tell you that there\u2019s a problem with a recent payment. And then ask you to log in to sort it out.<\/p>\n\n\n\n<p>Then, when you click on the link in the email you\u2019re taken to the fake website. Once you log in, the attacker has your password and they\u2019re off to the races.<\/p>\n\n\n\n<p>Once they\u2019ve got your details, you might be in for a bit of trouble\u2026<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tilting the scales<\/h2>\n\n\n\n<p>So, what happens after you\u2019ve fallen for a social engineering attack? Or one of your employees has?<\/p>\n\n\n\n<p>Well, it depends on what information the attacker has gotten their hands on. The first thing you must do is report to the <a href=\"https:\/\/ico.org.uk\/\" target=\"_blank\" rel=\"noreferrer noopener\">Information Commissioner\u2019s Office (ICO)<\/a> that you\u2019ve been breached.<\/p>\n\n\n\n<p>You\u2019ll then need to speak to your <a href=\"https:\/\/ico.org.uk\/for-organisations\/uk-gdpr-guidance-and-resources\/accountability-and-governance\/guide-to-accountability-and-governance\/accountability-and-governance\/data-protection-officers\/\" target=\"_blank\" rel=\"noreferrer noopener\">data protection officer<\/a>, if you have one. They can help guide you through the process.<\/p>\n\n\n\n<p>The long and short of it is, speak to an expert. Even if you think the breach was contained or nothing was stolen.<\/p>\n\n\n\n<p>You\u2019re probably also wondering: \u2018how much is a successful social engineering attack going to cost my business\u2019?<\/p>\n\n\n\n<p>It\u2019s difficult to pinpoint exactly how much. Average amounts vary wildly. It depends on a few things:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>How large your business is<\/li>\n\n\n\n<li>The nature of your business<\/li>\n\n\n\n<li>How much data you store<\/li>\n\n\n\n<li>The kind of data you store<\/li>\n\n\n\n<li>How bad the breach is.<\/li>\n<\/ul>\n\n\n\n<p>For smaller businesses, it could cost hundreds or even thousands of pounds to clear up the mess. Larger businesses face much higher costs, potentially hundreds of thousands or millions of pounds.<\/p>\n\n\n\n<p>Rather than worrying about a successful attack, let\u2019s talk about prevention.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Education, education, education<\/h2>\n\n\n\n<p>Preventing social engineering attacks comes down to one thing: education and training.<\/p>\n\n\n\n<p>At the end of the day, these kinds of attacks succeed or fail based on whether someone falls for them.<\/p>\n\n\n\n<p>If you can educate and train yourself and your team, you\u2019ll lower your chance of falling victim to them.<\/p>\n\n\n\n<p>One way to do this is by finding <a href=\"https:\/\/www.ncsc.gov.uk\/information\/certified-training\" target=\"_blank\" rel=\"noreferrer noopener\">a good training provider<\/a>. They can help you get everyone up to speed.<\/p>\n\n\n\n<p>Once everyone is trained, they can also run regular tests for you. This is where they\u2019ll send around a phishing email that they\u2019ve created. They\u2019ll then monitor how many people fall for it, so that extra training can be given to those who need it.<\/p>\n\n\n\n<p>And if you are breached at some point, there\u2019s always cyber insurance\u2026<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">If all else fails\u2026<\/h2>\n\n\n\n<p>At some point, you\u2019ll probably fall victim to a social engineering attack.<\/p>\n\n\n\n<p>Mistakes happen. We\u2019re all human.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.policybee.co.uk\/cyber-insurance\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber insurance<\/a> is the last line of defence. It helps to protect your business from the repercussions and financial problems you might experience after a breach.<\/p>\n\n\n\n<p>It also:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Pays legal costs and any compensation you might owe<\/li>\n\n\n\n<li>Covers a PR expert to help you manage your reputation<\/li>\n\n\n\n<li>Provides technical expertise to help you recover.<\/li>\n<\/ul>\n\n\n\n<p>For most policies, you&#8217;ll need to add on social engineering insurance (and financial cybercrime) as an extra. The same goes for business interruption, if you&#8217;d like some financial assistance while you&#8217;re recovering from a cyber-attack.<\/p>\n\n\n\n<p>If you\u2019re unsure, read your policy wording carefully. Or ask your insurer or broker if you\u2019re covered for social engineering attacks.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Stay ahead of the game<\/h2>\n\n\n\n<p>Social engineering attacks are tricky. Without the right training and support, it\u2019s easy to fall victim to these carefully crafted traps.<\/p>\n\n\n\n<p>The way to combat them is to stay ahead of the game. As well as making sure your team are social engineering boffins, a <a href=\"https:\/\/www.policybee.co.uk\/cyber-insurance\" target=\"_blank\" rel=\"noreferrer noopener\">cyber insurance<\/a> policy can save you when a mistake does happen.<\/p>\n\n\n\n<p>Read more about <a href=\"https:\/\/www.policybee.co.uk\/blog\/what-is-cyber-insurance-and-what-does-it-cover\" target=\"_blank\" rel=\"noreferrer noopener\">cyber insurance and what it covers<\/a>. Or give us a ring at <strong>0345 222 5391<\/strong> to chat with one of our expert advisers.<\/p>\n\n\n\n<p><em>Image used under license from iStock.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercrime is a big problem in the UK. It costs our economy an estimated \u00a321 billion a year. And there\u2019s no bigger and more devious culprit in cybercrime than social engineering. It affects everyone. Whether they\u2019re a business owner or &hellip; <a href=\"https:\/\/www.policybee.co.uk\/blog\/a-guide-to-social-engineering-insurance\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":15,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[288],"tags":[300,158,150,140,281],"class_list":["post-23443","post","type-post","status-publish","format-standard","hentry","category-cyber-insurance","tag-cyber-insurance-2","tag-cyber-insurance","tag-managing-risk","tag-running-a-business","tag-social-engineering-insurance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>social engineering insurance<\/title>\r\n<meta name=\"description\" content=\"Find out the key info you need to know about social engineering insurance. Plus, how you can avoid an attack in the first place.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.policybee.co.uk\/blog\/a-guide-to-social-engineering-insurance\" \/>\r\n<meta property=\"og:locale\" content=\"en_GB\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"social engineering insurance\" \/>\r\n<meta property=\"og:description\" content=\"Find out the key info you need to know about social engineering insurance. Plus, how you can avoid an attack in the first place.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.policybee.co.uk\/blog\/a-guide-to-social-engineering-insurance\" \/>\r\n<meta property=\"og:site_name\" content=\"PolicyBee news and risk advice\" \/>\r\n<meta property=\"article:published_time\" content=\"2025-05-22T10:46:49+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2025-12-31T11:00:00+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2023\/07\/social-engineering-concept-istock.png\" \/>\r\n\t<meta property=\"og:image:width\" content=\"600\" \/>\r\n\t<meta property=\"og:image:height\" content=\"300\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\r\n<meta name=\"author\" content=\"Pete Warner\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@PolicyBee\" \/>\r\n<meta name=\"twitter:site\" content=\"@PolicyBee\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pete Warner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/a-guide-to-social-engineering-insurance#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/a-guide-to-social-engineering-insurance\"},\"author\":{\"name\":\"Pete Warner\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/8503cbee1e5b3842c795256a0c5e53d0\"},\"headline\":\"A simple guide to social engineering insurance\",\"datePublished\":\"2025-05-22T10:46:49+00:00\",\"dateModified\":\"2025-12-31T11:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/a-guide-to-social-engineering-insurance\"},\"wordCount\":1332,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/a-guide-to-social-engineering-insurance#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/social-engineering-concept-istock.png\",\"keywords\":[\"cyber insurance\",\"cyber liability insurance\",\"managing risk\",\"running a business\",\"social engineering insurance\"],\"articleSection\":[\"Cyber insurance\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/a-guide-to-social-engineering-insurance#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/a-guide-to-social-engineering-insurance\",\"url\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/a-guide-to-social-engineering-insurance\",\"name\":\"social engineering insurance\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/a-guide-to-social-engineering-insurance#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/a-guide-to-social-engineering-insurance#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/social-engineering-concept-istock.png\",\"datePublished\":\"2025-05-22T10:46:49+00:00\",\"dateModified\":\"2025-12-31T11:00:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/8503cbee1e5b3842c795256a0c5e53d0\"},\"description\":\"Find out the key info you need to know about social engineering insurance. Plus, how you can avoid an attack in the first place.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/a-guide-to-social-engineering-insurance#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/a-guide-to-social-engineering-insurance\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/a-guide-to-social-engineering-insurance#primaryimage\",\"url\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/social-engineering-concept-istock.png\",\"contentUrl\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/social-engineering-concept-istock.png\",\"width\":600,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/a-guide-to-social-engineering-insurance#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A simple guide to social engineering insurance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/\",\"name\":\"PolicyBee news and risk advice\",\"description\":\"Articles and information on professional indemnity insurance, small business news and risk management\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/8503cbee1e5b3842c795256a0c5e53d0\",\"name\":\"Pete Warner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f564969b62f9e2ddcd7857451a5fea06c6db345efc498dac09620887b63e2a89?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f564969b62f9e2ddcd7857451a5fea06c6db345efc498dac09620887b63e2a89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f564969b62f9e2ddcd7857451a5fea06c6db345efc498dac09620887b63e2a89?s=96&d=mm&r=g\",\"caption\":\"Pete Warner\"}}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"social engineering insurance","description":"Find out the key info you need to know about social engineering insurance. Plus, how you can avoid an attack in the first place.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.policybee.co.uk\/blog\/a-guide-to-social-engineering-insurance","og_locale":"en_GB","og_type":"article","og_title":"social engineering insurance","og_description":"Find out the key info you need to know about social engineering insurance. Plus, how you can avoid an attack in the first place.","og_url":"https:\/\/www.policybee.co.uk\/blog\/a-guide-to-social-engineering-insurance","og_site_name":"PolicyBee news and risk advice","article_published_time":"2025-05-22T10:46:49+00:00","article_modified_time":"2025-12-31T11:00:00+00:00","og_image":[{"width":600,"height":300,"url":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2023\/07\/social-engineering-concept-istock.png","type":"image\/png"}],"author":"Pete Warner","twitter_card":"summary_large_image","twitter_creator":"@PolicyBee","twitter_site":"@PolicyBee","twitter_misc":{"Written by":"Pete Warner","Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.policybee.co.uk\/blog\/a-guide-to-social-engineering-insurance#article","isPartOf":{"@id":"https:\/\/www.policybee.co.uk\/blog\/a-guide-to-social-engineering-insurance"},"author":{"name":"Pete Warner","@id":"https:\/\/www.policybee.co.uk\/blog\/#\/schema\/person\/8503cbee1e5b3842c795256a0c5e53d0"},"headline":"A simple guide to social engineering insurance","datePublished":"2025-05-22T10:46:49+00:00","dateModified":"2025-12-31T11:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.policybee.co.uk\/blog\/a-guide-to-social-engineering-insurance"},"wordCount":1332,"commentCount":0,"image":{"@id":"https:\/\/www.policybee.co.uk\/blog\/a-guide-to-social-engineering-insurance#primaryimage"},"thumbnailUrl":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2023\/07\/social-engineering-concept-istock.png","keywords":["cyber insurance","cyber liability insurance","managing risk","running a business","social engineering insurance"],"articleSection":["Cyber insurance"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.policybee.co.uk\/blog\/a-guide-to-social-engineering-insurance#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.policybee.co.uk\/blog\/a-guide-to-social-engineering-insurance","url":"https:\/\/www.policybee.co.uk\/blog\/a-guide-to-social-engineering-insurance","name":"social engineering insurance","isPartOf":{"@id":"https:\/\/www.policybee.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.policybee.co.uk\/blog\/a-guide-to-social-engineering-insurance#primaryimage"},"image":{"@id":"https:\/\/www.policybee.co.uk\/blog\/a-guide-to-social-engineering-insurance#primaryimage"},"thumbnailUrl":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2023\/07\/social-engineering-concept-istock.png","datePublished":"2025-05-22T10:46:49+00:00","dateModified":"2025-12-31T11:00:00+00:00","author":{"@id":"https:\/\/www.policybee.co.uk\/blog\/#\/schema\/person\/8503cbee1e5b3842c795256a0c5e53d0"},"description":"Find out the key info you need to know about social engineering insurance. Plus, how you can avoid an attack in the first place.","breadcrumb":{"@id":"https:\/\/www.policybee.co.uk\/blog\/a-guide-to-social-engineering-insurance#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.policybee.co.uk\/blog\/a-guide-to-social-engineering-insurance"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.policybee.co.uk\/blog\/a-guide-to-social-engineering-insurance#primaryimage","url":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2023\/07\/social-engineering-concept-istock.png","contentUrl":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2023\/07\/social-engineering-concept-istock.png","width":600,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.policybee.co.uk\/blog\/a-guide-to-social-engineering-insurance#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.policybee.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"A simple guide to social engineering insurance"}]},{"@type":"WebSite","@id":"https:\/\/www.policybee.co.uk\/blog\/#website","url":"https:\/\/www.policybee.co.uk\/blog\/","name":"PolicyBee news and risk advice","description":"Articles and information on professional indemnity insurance, small business news and risk management","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.policybee.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.policybee.co.uk\/blog\/#\/schema\/person\/8503cbee1e5b3842c795256a0c5e53d0","name":"Pete Warner","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/f564969b62f9e2ddcd7857451a5fea06c6db345efc498dac09620887b63e2a89?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f564969b62f9e2ddcd7857451a5fea06c6db345efc498dac09620887b63e2a89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f564969b62f9e2ddcd7857451a5fea06c6db345efc498dac09620887b63e2a89?s=96&d=mm&r=g","caption":"Pete Warner"}}]}},"_links":{"self":[{"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/posts\/23443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=23443"}],"version-history":[{"count":17,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/posts\/23443\/revisions"}],"predecessor-version":[{"id":27352,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/posts\/23443\/revisions\/27352"}],"wp:attachment":[{"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=23443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=23443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=23443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}