{"id":1940,"date":"2021-01-25T12:00:32","date_gmt":"2021-01-25T12:00:32","guid":{"rendered":"https:\/\/www.insurancebee.com\/blog\/?p=1940"},"modified":"2023-02-08T09:56:33","modified_gmt":"2023-02-08T09:56:33","slug":"most-common-cyber-claims","status":"publish","type":"post","link":"https:\/\/www.insurancebee.com\/blog\/most-common-cyber-claims","title":{"rendered":"What are the most common cyber claims?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.insurancebee.com\/blog\/wp-content\/uploads\/2021\/01\/cyber-threat-examples.png\" alt=\"what are the most common cyber claims. Woman with magnifying glass next to screen showing cyber badges\" class=\"wp-image-1953\" srcset=\"https:\/\/www.insurancebee.com\/blog\/wp-content\/uploads\/2021\/01\/cyber-threat-examples.png 600w, https:\/\/www.insurancebee.com\/blog\/wp-content\/uploads\/2021\/01\/cyber-threat-examples-300x200.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<p>The most common cyber claims, currently, are for:<\/p>\n\n\n\n<p><br>\u2022 <a href=\"#stolen-funds\">Stolen funds<\/a> <br>\u2022 <a href=\"#stolen-data\">Stolen data <\/a><br>\u2022 <a href=\"#damaged-assets\">Damaged digital assets<\/a> <\/p>\n\n\n\n<p>In fact, over 95% of cyber claims fall into these three categories.<\/p>\n\n\n\n<p><br>Without cyber insurance, attacks like these can be a big problem for a small business. So, what sort of damage are we talking here? And how does your cyber liability insurance policy help?<\/p>\n\n\n\n<p><br>The best way to show you is with some real claims examples. (We\u2019ve changed the names of the companies and people involved, obviously.)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"stolen-funds\">Most common cyber claim #1 &#8212; stolen funds<\/h2>\n\n\n\n<p><br>These days nearly every business moves its money around electronically. Unfortunately, that makes it much easier for cybercriminals to steal. And one of the ways they do it is via <a href=\"https:\/\/www.insurancebee.com\/blog\/cyber-terms-and-meanings\" target=\"_blank\" rel=\"noreferrer noopener\">social engineering<\/a>. <br><\/p>\n\n\n\n<p>Here\u2019s what happened last year to a nursing home, which fell victim to what\u2019s called a <a href=\"https:\/\/www.mimecast.com\/content\/ceo-fraud\/\" target=\"_blank\" rel=\"noreferrer noopener\">CEO scam<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">CEO scam &#8212; wire transfer fraud<\/h3>\n\n\n\n<p><br><em>While the CEO was on a week\u2019s vacation, Karen got an email from her. It seemed legit. It came from the right email address. It even addressed Karen as \u2018K\u2019, like her boss always does.<\/em><\/p>\n\n\n\n<p><br><em>In the email, her boss said she\u2019d received a reminder about an outstanding invoice. She\u2019d forgotten all about it, apparently, and now payment of $46,564 had to be made today. Please could Karen transfer the funds right away?<\/em><\/p>\n\n\n\n<p><em>Now, Karen didn\u2019t want to bother her boss by double-checking. She was on vacation, after all. So, she made the payment. The next day, another email from her CEO arrived in her inbox. This one asked her to make a payment of $37,644 to another account. Karen quickly made that one too.<\/em><\/p>\n\n\n\n<p><em>They only discovered the scam a week later when the CEO was back in the office and Karen happened to mention the payments in passing.<\/em><\/p>\n\n\n\n<p><em>Of course, they reported the incident to law enforcement and one of the banks managed to get $600 back. But the rest of the money was gone. Leaving the nursing home around $83,000 down.<\/em><\/p>\n\n\n\n<p>Luckily, they had a cyber liability policy. They reported the theft of funds to our incident response team who were able to recover most of the money. The team also looked into how this scam had happened.<\/p>\n\n\n\n<p>Turns out the CEO had a weak password which the hackers managed to crack. Once they\u2019d gotten into her email account, they spent time looking through past emails and even checked her calendar.<\/p>\n\n\n\n<p>Using a computer program to make the spoof email look genuine, they tried the scam the week they knew the CEO was on vacation. And when their first email paid off, they did it again the next day.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"stolen-data\">Most common cyber claim #2 &#8212; stolen data<\/h2>\n\n\n\n<p><br>Names and addresses stored on a computer network are worth more money than you think. Data is valuable. And if something has value, then it\u2019s worth stealing.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Data theft<\/h3>\n\n\n\n<p><br><em>Hackers recently targeted one of our policyholders, a private healthcare clinic. They stole patient information and then threatened to post the data on a public website unless the clinic paid a ransom of $13,220 in Bitcoin.<\/em><\/p>\n\n\n\n<p><br><em>As the clinic\u2019s IT team wasn\u2019t sure how to help, the owner contacted our cyber incident response team<\/em>.<\/p>\n\n\n\n<p><br><em>The team was able to advise the clinic owner what to do to fix the immediate vulnerability. They then engaged a local IT forensics specialist who visited the clinic and started verifying the hackers\u2019 claim.<\/em><\/p>\n\n\n\n<p><br><em>It turned out that data relating to 3,000 patients had been compromised, but it was a database containing names and addresses only. <\/em> <em>The hackers hadn&#8217;t gained access to any sensitive medical information. <\/em><\/p>\n\n\n\n<p><br><em>Because of this, they decided not to pay the ransom demand. Instead, the team connected the clinic with a crisis communication consultant.<\/em><\/p>\n\n\n\n<p><br><em>Even though no sensitive data was stolen, to avoid any damage to its reputation, the consultant advised the clinic to notify affected patients. She helped them word the email correctly and made sure they sent it out quickly.<\/em><\/p>\n\n\n\n<p><br>The clinic&#8217;s cyber policy covered the cost of the IT forensics expert and the crisis consultant (around $20,000). The clinic paid nothing &#8212; aside from their deductible &#8212; for the service. And since then, they\u2019ve heard nothing more from the hackers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"damaged-assets\">Most common claim #3 &#8212; damaged digital assets<\/h2>\n\n\n\n<p>Any business which relies on its IT system to operate on a daily basis is likely to pay up if their system\u2019s held to ransom. Cyber criminals know this. And play on it.<\/p>\n\n\n\n<p><br>To make things worse, even after paying a ransom, businesses are often left with unusable systems that prove expensive to fix.<\/p>\n\n\n\n<p><br>Now you might think that if you don\u2019t use your computer system to carry out your day-to-day work, your business won\u2019t be a target for these kinds of attacks. Sadly, you\u2019d be wrong.<\/p>\n\n\n\n<p><br>One of our policyholders is a small electrical firm which installs and maintains electrical systems for private individuals and companies. Aside from the front line work their electricians do on a daily basis, they also have an office for admin and accounts.<\/p>\n\n\n\n<p><br><em>Six months back, one of their employees (we\u2019ll call him Kevin) got an email from someone looking for a job. They\u2019d attached a resume to the email.<br>Now, Kevin knew they weren\u2019t looking to take on any new hires at that time, but his curiosity got the better of him. He clicked on the attachment and opened it.<\/em><\/p>\n\n\n\n<p><br><em>Unfortunately for Kevin, the attachment contained a type of ransomware. As soon as he opened it, it encrypted all the firm\u2019s computer systems and demanded $5,000 to decrypt the data.<\/em><\/p>\n\n\n\n<p><br><em>Immediately they realized what had happened, the firm reported the incident to our response team. Now normally, the team would be able to help by recovering everything from a back-up. But because the company\u2019s back-ups hadn\u2019t been saved externally, these too were encrypted.<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Held to ransom<\/h3>\n\n\n\n<p><br><em>This left no option but to pay the ransom.<\/em><\/p>\n\n\n\n<p><em><br>The response team negotiated with the cybercriminals responsible for the attack and reimbursed the ransom.<\/em> <em>They got the decryption key and started decrypting the affected programs.<\/em><\/p>\n\n\n\n<p><em><br>The whole process, from demand to decryption, only took a few days. But during that time, running the business was tricky.<\/em><\/p>\n\n\n\n<p><br><em>Because they were locked out of the firm\u2019s system, staff had to do their jobs manually. That meant writing customer quotes and orders for equipment and supplies by hand.<\/em><\/p>\n\n\n\n<p><br><em>And because their invoicing and accounting system was down, the firm couldn\u2019t take credit card payments either. They had to tell customers they\u2019d come back to them for payment at a later date.<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Damaged system<\/h3>\n\n\n\n<p><br><em>Although the decryption process was successful<\/em> <em>not all the firm\u2019s computer programs emerged unscathed by the attack. Despite numerous attempts to restore it completely, it was still not performing correctly a month later.<\/em><\/p>\n\n\n\n<p><em><br>In the end, to get the business up and running properly again, the firm had to move over to a new system. Unfortunately, that meant paying employees to work overtime \u2013 some 1,572 hours in total \u2013 to manually re-enter data. They also had to hire temporary staff to help.<\/em><\/p>\n\n\n\n<p><br>The cost of this major data re-entry came to over $58,000. Which, on top of the $22,500 it cost to deal with the initial ransomware incident, brought the total claim costs to over $80,000.<\/p>\n\n\n\n<p><br>Dealing with a ransomware attack is rarely just a matter of paying up followed by business as usual. When ransomware damages your system irreparably, the cost to your business, as this claim shows, can be much, much more.<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How a cyber policy helps<\/h2>\n\n\n\n<p><br>But it\u2019s not just money a cyber-attack costs you, it\u2019s time. And if an incident\u2019s not handled correctly it can end up costing you more of both. Then there\u2019s the damage it can do to your reputation, too.<br><\/p>\n\n\n\n<p>A <a href=\"https:\/\/www.insurancebee.com\/cyber-liability-insurance\" target=\"_blank\" rel=\"noreferrer noopener\">cyber policy<\/a> doesn\u2019t just cover the costs of recovering from a cyber-attack. It helps you through one, providing you with the tools, the support and the technical know-how.<\/p>\n\n\n\n<p><br>Cyber insurance can\u2019t stop an attack. But it does mean you\u2019ll recover from one.<\/p>\n\n\n\n<p>Find out more about our cyber liability insurance policies <a href=\"https:\/\/www.insurancebee.com\/cyber-liability-insurance\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>. Or call us at 978.344.4215. We\u2019ll be happy to talk you through your options.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The most common cyber claims, currently, are for: \u2022 Stolen funds \u2022 Stolen data \u2022 Damaged digital assets In fact, over 95% of cyber claims fall into these three categories. Without cyber insurance, attacks like these can be a big &hellip; <a href=\"https:\/\/www.insurancebee.com\/blog\/most-common-cyber-claims\">Read more&#8230;<\/a><\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[79,81,82],"class_list":["post-1940","post","type-post","status-publish","format-standard","hentry","category-cyber-liability","tag-cyber-claims","tag-data-breach","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>What are the most common cyber claims? | Cyber claims examples<\/title>\r\n<meta name=\"description\" content=\"What are the most common cyber claims? How do they damage your business? InsuranceBee explains using real cyber insurance claims examples:\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.insurancebee.com\/blog\/most-common-cyber-claims\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"What are the most common cyber claims? | Cyber claims examples\" \/>\r\n<meta property=\"og:description\" content=\"What are the most common cyber claims? How do they damage your business? InsuranceBee explains using real cyber insurance claims examples:\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.insurancebee.com\/blog\/most-common-cyber-claims\" \/>\r\n<meta property=\"og:site_name\" content=\"InsuranceBee Blog\" \/>\r\n<meta property=\"article:published_time\" content=\"2021-01-25T12:00:32+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2023-02-08T09:56:33+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/www.insurancebee.com\/blog\/wp-content\/uploads\/2021\/01\/cyber-threat-examples.png\" \/>\r\n<meta name=\"author\" content=\"Kate Naqvi\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kate Naqvi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/most-common-cyber-claims#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/most-common-cyber-claims\"},\"author\":{\"name\":\"Kate Naqvi\",\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/#\\\/schema\\\/person\\\/25d21b56419ae3d58431b36966e079bf\"},\"headline\":\"What are the most common cyber claims?\",\"datePublished\":\"2021-01-25T12:00:32+00:00\",\"dateModified\":\"2023-02-08T09:56:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/most-common-cyber-claims\"},\"wordCount\":1378,\"image\":{\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/most-common-cyber-claims#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cyber-threat-examples.png\",\"keywords\":[\"cyber claims\",\"data breach\",\"ransomware\"],\"articleSection\":[\"Cyber liability\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/most-common-cyber-claims\",\"url\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/most-common-cyber-claims\",\"name\":\"What are the most common cyber claims? | Cyber claims examples\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/most-common-cyber-claims#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/most-common-cyber-claims#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cyber-threat-examples.png\",\"datePublished\":\"2021-01-25T12:00:32+00:00\",\"dateModified\":\"2023-02-08T09:56:33+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/#\\\/schema\\\/person\\\/25d21b56419ae3d58431b36966e079bf\"},\"description\":\"What are the most common cyber claims? How do they damage your business? InsuranceBee explains using real cyber insurance claims examples:\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/most-common-cyber-claims#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/most-common-cyber-claims\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/most-common-cyber-claims#primaryimage\",\"url\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cyber-threat-examples.png\",\"contentUrl\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cyber-threat-examples.png\",\"width\":600,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/most-common-cyber-claims#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What are the most common cyber claims?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/\",\"name\":\"InsuranceBee Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/#\\\/schema\\\/person\\\/25d21b56419ae3d58431b36966e079bf\",\"name\":\"Kate Naqvi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2df945b683e8ace226a95eaee740a2d6c6f5b81854bbc81200f437e4e55344ce?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2df945b683e8ace226a95eaee740a2d6c6f5b81854bbc81200f437e4e55344ce?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2df945b683e8ace226a95eaee740a2d6c6f5b81854bbc81200f437e4e55344ce?s=96&d=mm&r=g\",\"caption\":\"Kate Naqvi\"},\"url\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/author\\\/kate-naqvi\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What are the most common cyber claims? | Cyber claims examples","description":"What are the most common cyber claims? How do they damage your business? InsuranceBee explains using real cyber insurance claims examples:","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.insurancebee.com\/blog\/most-common-cyber-claims","og_locale":"en_US","og_type":"article","og_title":"What are the most common cyber claims? | Cyber claims examples","og_description":"What are the most common cyber claims? How do they damage your business? InsuranceBee explains using real cyber insurance claims examples:","og_url":"https:\/\/www.insurancebee.com\/blog\/most-common-cyber-claims","og_site_name":"InsuranceBee Blog","article_published_time":"2021-01-25T12:00:32+00:00","article_modified_time":"2023-02-08T09:56:33+00:00","og_image":[{"url":"https:\/\/www.insurancebee.com\/blog\/wp-content\/uploads\/2021\/01\/cyber-threat-examples.png","type":"","width":"","height":""}],"author":"Kate Naqvi","twitter_misc":{"Written by":"Kate Naqvi","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.insurancebee.com\/blog\/most-common-cyber-claims#article","isPartOf":{"@id":"https:\/\/www.insurancebee.com\/blog\/most-common-cyber-claims"},"author":{"name":"Kate Naqvi","@id":"https:\/\/www.insurancebee.com\/blog\/#\/schema\/person\/25d21b56419ae3d58431b36966e079bf"},"headline":"What are the most common cyber claims?","datePublished":"2021-01-25T12:00:32+00:00","dateModified":"2023-02-08T09:56:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.insurancebee.com\/blog\/most-common-cyber-claims"},"wordCount":1378,"image":{"@id":"https:\/\/www.insurancebee.com\/blog\/most-common-cyber-claims#primaryimage"},"thumbnailUrl":"https:\/\/www.insurancebee.com\/blog\/wp-content\/uploads\/2021\/01\/cyber-threat-examples.png","keywords":["cyber claims","data breach","ransomware"],"articleSection":["Cyber liability"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.insurancebee.com\/blog\/most-common-cyber-claims","url":"https:\/\/www.insurancebee.com\/blog\/most-common-cyber-claims","name":"What are the most common cyber claims? | Cyber claims examples","isPartOf":{"@id":"https:\/\/www.insurancebee.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.insurancebee.com\/blog\/most-common-cyber-claims#primaryimage"},"image":{"@id":"https:\/\/www.insurancebee.com\/blog\/most-common-cyber-claims#primaryimage"},"thumbnailUrl":"https:\/\/www.insurancebee.com\/blog\/wp-content\/uploads\/2021\/01\/cyber-threat-examples.png","datePublished":"2021-01-25T12:00:32+00:00","dateModified":"2023-02-08T09:56:33+00:00","author":{"@id":"https:\/\/www.insurancebee.com\/blog\/#\/schema\/person\/25d21b56419ae3d58431b36966e079bf"},"description":"What are the most common cyber claims? How do they damage your business? InsuranceBee explains using real cyber insurance claims examples:","breadcrumb":{"@id":"https:\/\/www.insurancebee.com\/blog\/most-common-cyber-claims#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.insurancebee.com\/blog\/most-common-cyber-claims"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.insurancebee.com\/blog\/most-common-cyber-claims#primaryimage","url":"https:\/\/www.insurancebee.com\/blog\/wp-content\/uploads\/2021\/01\/cyber-threat-examples.png","contentUrl":"https:\/\/www.insurancebee.com\/blog\/wp-content\/uploads\/2021\/01\/cyber-threat-examples.png","width":600,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.insurancebee.com\/blog\/most-common-cyber-claims#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.insurancebee.com\/blog"},{"@type":"ListItem","position":2,"name":"What are the most common cyber claims?"}]},{"@type":"WebSite","@id":"https:\/\/www.insurancebee.com\/blog\/#website","url":"https:\/\/www.insurancebee.com\/blog\/","name":"InsuranceBee Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.insurancebee.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.insurancebee.com\/blog\/#\/schema\/person\/25d21b56419ae3d58431b36966e079bf","name":"Kate Naqvi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2df945b683e8ace226a95eaee740a2d6c6f5b81854bbc81200f437e4e55344ce?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2df945b683e8ace226a95eaee740a2d6c6f5b81854bbc81200f437e4e55344ce?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2df945b683e8ace226a95eaee740a2d6c6f5b81854bbc81200f437e4e55344ce?s=96&d=mm&r=g","caption":"Kate Naqvi"},"url":"https:\/\/www.insurancebee.com\/blog\/author\/kate-naqvi"}]}},"_links":{"self":[{"href":"https:\/\/www.insurancebee.com\/blog\/wp-json\/wp\/v2\/posts\/1940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insurancebee.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insurancebee.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insurancebee.com\/blog\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insurancebee.com\/blog\/wp-json\/wp\/v2\/comments?post=1940"}],"version-history":[{"count":17,"href":"https:\/\/www.insurancebee.com\/blog\/wp-json\/wp\/v2\/posts\/1940\/revisions"}],"predecessor-version":[{"id":2397,"href":"https:\/\/www.insurancebee.com\/blog\/wp-json\/wp\/v2\/posts\/1940\/revisions\/2397"}],"wp:attachment":[{"href":"https:\/\/www.insurancebee.com\/blog\/wp-json\/wp\/v2\/media?parent=1940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insurancebee.com\/blog\/wp-json\/wp\/v2\/categories?post=1940"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insurancebee.com\/blog\/wp-json\/wp\/v2\/tags?post=1940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}