Gallagher has issued a cautionary note to businesses regarding the increasing cyber risk linked to password reuse, noting that inadequate authentication protocols continue to create exposures for Australian firms, including those in the insurance industry.
The firm underscored that credential stuffing – where malicious actors exploit reused credentials from previous data breaches – is a frequent method used to infiltrate business systems. These attacks are automated, using tools that attempt thousands of logins with known passwords until access is gained. The practice exploits individuals’ tendency to recycle passwords across multiple online services.
The tactic is suspected in a recent breach involving superannuation funds in Australia.
Attackers reportedly accessed user accounts using login details likely purchased on the dark web. Once logged in, they modified account details, such as SMS verification numbers, enabling unauthorised transactions. These updates often occurred late at night when users were less likely to respond to system-generated alerts.
Gallagher’s analysis suggested that this breach illustrates how the absence of unique multifactor authentication (MFA) can leave businesses and their customers exposed to significant financial and reputational harm.
To counter such threats, Gallagher recommended businesses implement a structured approach to strengthen digital security:
Gallagher noted that while cyber insurance offerings vary, most policies generally cover:
The warning comes alongside findings from the latest Reputational Risk Readiness Survey by Willis, part of WTW.
According to the report, 65% of global executives now identify cyber attacks as the most significant reputational risk, compared to 52% the previous year.
Supporting these trends, a survey by Arctic Wolf covering over 1,200 cybersecurity professionals found that Australia and New Zealand (ANZ) organisations reported higher-than-average incident rates.
About 85% of businesses in the region experienced at least one cyber incident in the past 12 months, compared to a 76% global average.
The study also found that ANZ companies were more likely to pay ransoms to avoid the fallout from data exposure. Approximately 91% of those affected relied on third-party negotiators, although less than half successfully reduced the payment amount.