Don’t Get Hooked: What Housing Organizations Need to Know About Social Engineering Attacks

  • May 27, 2025

Social engineering is one of the most effective and difficult-to-detect cyber threats facing organizations today. These attacks don’t rely on technical weaknesses; they exploit human behavior. A well-crafted email, phone call, or text message can trick even cautious employees into giving up sensitive data or authorizing a fraudulent transaction. 

But what exactly is it? And what can housing authorities do to protect themselves? 

What is social engineering? 

Social engineering is a cyberattack that relies on human interaction to gain access to sensitive systems or information. Instead of breaking through a firewall, attackers manipulate people, posing as coworkers, vendors, trusted partners, or another familiar person, to trick them into handing over data, passwords, or funds. 

“Social engineering has a human element,” said Mike Konopka, HAI Group’s manager of information security. “Humans are the vulnerability. It’s often the gateway to other attacks.” 

While many organizations assume their cyber insurance covers these kinds of attacks, social engineering coverage is often separate, and without it, financial losses may not be reimbursed. 

New to cybersecurity? Get familiar with 15 essential terms every housing leader should know. 

How these attacks unfold 

The most common scenario HAI Group sees is business email compromise (BEC), where an attacker gains access to or imitates a legitimate email account. 

Imagine this: 

  • A staff member receives a request from a vendor to update payment information. 
  • The email looks familiar. It matches previous conversations and comes from a domain with just one letter off. 
  • The employee follows the instructions, and thousands of dollars are wired to a criminal’s account. 

By the time anyone realizes what’s happened, it’s too late. 

“Attackers sit in inboxes, learn communication styles, and strike when the timing is right,” Konopka explained. “We’ve seen them impersonate executives, vendors, or even IT staff—anyone who might plausibly request a financial transaction.” 

Why housing organizations are at risk 

Public and affordable housing providers may assume they’re too small to be targeted, but that’s exactly what makes them vulnerable. 

“Cybercriminals aren’t just after money—they’re often looking for sensitive data they can exploit,” said Angel Fear, assistant director of account services at HAI Group. “Housing agencies manage a great deal of valuable information, which can make them a target.” 

 
Additionally, the public-facing nature of housing authorities, paired with limited IT staffing or reliance on outsourced support, can create ideal conditions for exploitation. 

Warning signs to watch for 

Social engineering attempts often look almost legitimate, but a few red flags can give them away: 

  • Unexpected requests, especially involving money or sensitive data 
  • Poor grammar or odd phrasing 
  • Emails received at strange hours 
  • Slightly off email addresses (e.g., @ha1group.com instead of @haigroup.com) 
  • Pressure to act quickly or skip verification steps 

Konopka recommends that housing staff follow one simple rule: “Be suspicious at all times.” 

Building a Human Firewall 

Even with strong technology, people are still the first line of defense. 

Konopka suggests: 

  • Establishing a “no shame” policy for reporting potential breaches 
  • Encouraging staff to verify unusual requests by phone or in person 
  • Training employees regularly on spotting phishing, invoice fraud, and deepfakes 

“You can invest in the best cybersecurity tools,” said Konopka “but all it takes is tricking one person to get in.” 

The cost of inaction 

According to the Cybersecurity and Infrastructure Security Agency, the average cost for a business to recover from a ransomware attack is $1.85 million. This figure encompasses expenses related to downtime, recovery efforts, reputational damage, and potential ransom payments. 

“We work closely with members to help them understand their exposure and identify potential gaps in coverage,” said Fear. “Social engineering attacks can be financially and operationally devastating, but the good news is, with the right protections and awareness, they’re largely preventable.” 

Case in point:

One housing agency received an urgent email from a vendor requesting a payment update and invoice. It looked legitimate, but it wasn’t. They unknowingly wired funds to a fraudulent account, and without social engineering coverage, they suffered a full financial loss. It only took one email. 

How HAI Group’s Account Services Team can help 

If your organization is concerned about social engineering, or just unsure what coverage you have, start with a conversation. 

Is your organization protected? 

Social engineering coverage is not always included in standard cyber insurance. While cyber insurance provides broad protection against digital threats, it may exclude losses caused by deception-based attacks like phishing or fraudulent wire transfers. This type of coverage is sometimes offered as a standalone policy or endorsement. 

Here’s how to make sure your organization is covered: 

Step 1: Confirm that your organization has a cyber insurance policy in place. 

Step 2: Review the policy closely to see whether social engineering attacks are covered. Understand the limitations and any conditions that may apply. 

Step 3: If you’re unsure or need guidance, reach out to HAI Group’s account services team. We can help you assess your current policy, identify any gaps, and explore coverage options that fit your needs.

Not sure if you should reach out? Ask yourself: 

  • Do we know what our cyber insurance covers? 
  • Could our staff recognize a phishing attempt? 
  • Do we verify financial requests—even internal ones? 
  • Have we tested our response plan? 

If you hesitate on any of these, now is the time to connect with us. 

HAI Group’s account services team can: 

  • Help you understand existing cyber or crime coverage 
  • Work with our partners to obtain indication for coverage 
  • Offer educational support to strengthen your internal policies 

Even if you’re not ready to buy coverage, the conversation is worth having. 

“Open conversation and education is the best defense” Fear said. “Get protected by asking questions and staying informed.” 

 

Need help reviewing your cyber risk? 
Connect with our account services team to start the conversation. 


This article is for general information only. HAI Group® makes no representation or warranty about the accuracy or applicability of this information for any particular use or circumstance. Your use of this information is at your own discretion and risk. HAI Group® and any author or contributor identified herein assume no responsibility for your use of this information. You should consult with your attorney or subject matter advisor before adopting any risk management strategy or policy. 

HAI Group® is a marketing name used to refer to insurers, a producer, and related service providers affiliated through a common mission, management, and governance. Property-casualty insurance and related services are written or provided by Housing Authority Property Insurance, A Mutual Company; Housing Enterprise Insurance Company, Inc.; Housing Specialty Insurance Company, Inc.; Housing Investment Group, Inc.; and Housing Insurance Services (DBA Housing Insurance Agency Services in NY and MI).

Don't Miss This

Related Content

Case Study: Enfield Housing Authority Onboards KnowBe4 Cybersecurity Training Program

February 28, 2024
When Enfield (CT) Housing Authority Executive Director Scott Bertrand heard about the KnowBe4 cybersecurity awareness...

Data-Driven Fire Prevention: How Opportunity Home is Using Tech to Keep Residents Safe

April 9, 2025
After a devastating fire in a neighboring city required multiple fire departments to respond, the San Antonio Fire...

Housing Risk Guide: Bounce House Safety

May 16, 2025
Bounce houses and trampolines are a popular way to bring fun and energy to resident events, but they also come with...