Technology ❯ Cybersecurity ❯ Cyber Attacks ❯ Social Engineering
Third-party cybersecurity teams have been engaged to determine the full extent of a breach that may have exposed sensitive policyholder records.