Pekin Insurance Company Cyber Security Posture

pekininsurance.com

We help our customers build their dreams. Or rebuild their lives. At Pekin Insurance,ยฎ we provide peace of mind and long-term security for our policyholders, shareholders, agents, and employees. Through wars. Peace. Economic downturns and upswings. Weโ€™ve remained undaunted. Flexible. Innovative. Weโ€™ve always managed to find ways to get the job done. Since 1921. Today, weโ€™re one of the nationโ€™s most successful insurance providers, with combined assets of $2 billion, more than 900 employees, 1,200 agencies, and 7,500 independent agents.

Pekin Insurance Company Details

Linkedin ID:

pekin-insurance

Employees number:

717 employees

Number of followers:

10089.0

NAICS:

524

Industry Type:

Insurance

Homepage:

pekininsurance.com

IP Addresses:

Scan still pending

Company ID:

PEK_1301578

Scan Status:

In-progress

AI scorePekin Insurance Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscorePekin Insurance Global Score
blurone
Ailogo

Pekin Insurance Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Pekin Insurance Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
Pekin InsuranceBreach90502/2022PEK14429522Link
Rankiteo Explanation :
Attack threatening the organization's existence

Description: An insurance agentโ€™s login credentials of Pekin Insurance were stolen that allowed an unauthorized party to access the companyโ€™s insurance agent website and view sensitive consumer data. The incident compromised the name, address, driverโ€™s license number and date of birth of more than 10,872 individuals. The insurance company immediately terminated the stolen user credentials and worked to investigated the extent of the breach and sent notifications to the impacted individuals.

Pekin Insurance Company Subsidiaries

SubsidiaryImage

We help our customers build their dreams. Or rebuild their lives. At Pekin Insurance,ยฎ we provide peace of mind and long-term security for our policyholders, shareholders, agents, and employees. Through wars. Peace. Economic downturns and upswings. Weโ€™ve remained undaunted. Flexible. Innovative. Weโ€™ve always managed to find ways to get the job done. Since 1921. Today, weโ€™re one of the nationโ€™s most successful insurance providers, with combined assets of $2 billion, more than 900 employees, 1,200 agencies, and 7,500 independent agents.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=pekin-insurance' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Pekin Insurance Cyber Security News

2022-07-06T07:00:00.000Z
Richmond & Richmond Insurance of Madison Township receives four awards from Pekin Insurance

Richmond & Richmond, which is located at 2461 Hubbard Road, is an independent insurance agency that offers coverage for different purposes fromย ...

similarCompanies

Pekin Insurance Similar Companies

ไธญๅ›ฝไบบๆฐ‘ไฟ้™ฉ PICC

Founded in October 1949, The Peopleโ€™s Insurance Company (Group) of China is the first nation-wide insurance company in the Peopleโ€™s Republic of China and has developed into a leading large-scale integrated insurance financial group in the PRC, ranking 208th on the Global 500 (2014) published by the

State Farm Agent

At State Farmยฎ, our mission is to help people manage the risks of everyday life, recover from the unexpected, and realize their dreams. A career as a State Farmยฎ agent offers an incredible opportunity for motivated people to align themselves with a company that has earned the respect of its custome

Zurich Insurance

Zurich Insurance Group (Zurich) is a leading global multi-line insurer founded more than 150 years ago, which has grown into a business serving more than 75 million customers in more than 200 countries and territories, while delivering industry-leading total shareholder returns. Our customers includ

Life Insurance Corporation of India

The Life Insurance Corporation of India (LIC) is a state-owned Life Insurance Company of India. Founded in 1956, it operates as a Government-Owned Corporation, headquartered in Mumbai, Maharashtra, and is a key player in the life insurance sector in India. LIC offers a wide range of insurance produ

JLT Specialty

As of April 1, 2019, JLT Specialty is now a part of Marsh & McLennan. This account will now be managed by Marsh. We believe clients will benefit from access to broader talent, deeper risk expertise and specialty capabilities, broader geographic reach, and more capacity in digital, data, and analytic

Anthem National Accounts

Anthem National Accounts serves enterprise companies, including dozens in the Fortune 500. Our retention rate of 98% confirms our commitment to delivering the best value and service to our clients. Anthem National Accounts is solving the health benefit challenges of the countryโ€™s leading organiza

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Pekin Insurance CyberSecurity History Information

How many cyber incidents has Pekin Insurance faced?

Total Incidents: According to Rankiteo, Pekin Insurance has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at Pekin Insurance?

Incident Types: The types of cybersecurity incidents that have occurred incident Breach.

How does Pekin Insurance detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through containment measures with Terminated stolen user credentials and remediation measures with Investigated extent of the breach and recovery measures with Sent notifications to impacted individuals.

Incident Details

Can you provide details on each incident?

Incident : Data Breach

Title: Pekin Insurance Data Breach

Description: An insurance agentโ€™s login credentials of Pekin Insurance were stolen that allowed an unauthorized party to access the companyโ€™s insurance agent website and view sensitive consumer data.

Type: Data Breach

Attack Vector: Stolen Credentials

Vulnerability Exploited: Weak or Stolen Login Credentials

Threat Actor: Unauthorized Party

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach PEK14429522

Data Compromised: Name, Address, Driver's License Number, Date of Birth

Systems Affected: Insurance Agent Website

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Name, Address, Driver's License Number and Date of Birth.

Which entities were affected by each incident?

Incident : Data Breach PEK14429522

Entity Type: Insurance Company

Industry: Insurance

Customers Affected: 10,872 individuals

Response to the Incidents

What measures were taken in response to each incident?

Incident : Data Breach PEK14429522

Containment Measures: Terminated stolen user credentials

Remediation Measures: Investigated extent of the breach

Recovery Measures: Sent notifications to impacted individuals

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach PEK14429522

Type of Data Compromised: Name, Address, Driver's License Number, Date of Birth

Number of Records Exposed: 10,872

Sensitivity of Data: High

Personally Identifiable Information: Yes

What measures does the company take to prevent data exfiltration?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Investigated extent of the breach.

How does the company handle incidents involving personally identifiable information (PII)?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through was Terminated stolen user credentials.

Ransomware Information

How does the company recover data encrypted by ransomware?

Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Sent notifications to impacted individuals.

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident was an Unauthorized Party.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were Name, Address, Driver's License Number and Date of Birth.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident was Insurance Agent Website.

Response to the Incidents

What containment measures were taken in the most recent incident?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Terminated stolen user credentials.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Name, Address, Driver's License Number and Date of Birth.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 10.9K.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge