
Pekin Insurance Company Cyber Security Posture
pekininsurance.comWe help our customers build their dreams. Or rebuild their lives. At Pekin Insurance,ยฎ we provide peace of mind and long-term security for our policyholders, shareholders, agents, and employees. Through wars. Peace. Economic downturns and upswings. Weโve remained undaunted. Flexible. Innovative. Weโve always managed to find ways to get the job done. Since 1921. Today, weโre one of the nationโs most successful insurance providers, with combined assets of $2 billion, more than 900 employees, 1,200 agencies, and 7,500 independent agents.
Pekin Insurance Company Details
pekin-insurance
717 employees
10089.0
524
Insurance
pekininsurance.com
Scan still pending
PEK_1301578
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Pekin Insurance Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Pekin Insurance Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Pekin Insurance | Breach | 90 | 5 | 02/2022 | PEK14429522 | Link | |
Rankiteo Explanation : Attack threatening the organization's existenceDescription: An insurance agentโs login credentials of Pekin Insurance were stolen that allowed an unauthorized party to access the companyโs insurance agent website and view sensitive consumer data. The incident compromised the name, address, driverโs license number and date of birth of more than 10,872 individuals. The insurance company immediately terminated the stolen user credentials and worked to investigated the extent of the breach and sent notifications to the impacted individuals. |
Pekin Insurance Company Subsidiaries

We help our customers build their dreams. Or rebuild their lives. At Pekin Insurance,ยฎ we provide peace of mind and long-term security for our policyholders, shareholders, agents, and employees. Through wars. Peace. Economic downturns and upswings. Weโve remained undaunted. Flexible. Innovative. Weโve always managed to find ways to get the job done. Since 1921. Today, weโre one of the nationโs most successful insurance providers, with combined assets of $2 billion, more than 900 employees, 1,200 agencies, and 7,500 independent agents.
Access Data Using Our API

Get company history
.png)
Pekin Insurance Cyber Security News
Richmond & Richmond Insurance of Madison Township receives four awards from Pekin Insurance
Richmond & Richmond, which is located at 2461 Hubbard Road, is an independent insurance agency that offers coverage for different purposes fromย ...

Pekin Insurance Similar Companies

ไธญๅฝไบบๆฐไฟ้ฉ PICC
Founded in October 1949, The Peopleโs Insurance Company (Group) of China is the first nation-wide insurance company in the Peopleโs Republic of China and has developed into a leading large-scale integrated insurance financial group in the PRC, ranking 208th on the Global 500 (2014) published by the

State Farm Agent
At State Farmยฎ, our mission is to help people manage the risks of everyday life, recover from the unexpected, and realize their dreams. A career as a State Farmยฎ agent offers an incredible opportunity for motivated people to align themselves with a company that has earned the respect of its custome

Zurich Insurance
Zurich Insurance Group (Zurich) is a leading global multi-line insurer founded more than 150 years ago, which has grown into a business serving more than 75 million customers in more than 200 countries and territories, while delivering industry-leading total shareholder returns. Our customers includ

Life Insurance Corporation of India
The Life Insurance Corporation of India (LIC) is a state-owned Life Insurance Company of India. Founded in 1956, it operates as a Government-Owned Corporation, headquartered in Mumbai, Maharashtra, and is a key player in the life insurance sector in India. LIC offers a wide range of insurance produ

JLT Specialty
As of April 1, 2019, JLT Specialty is now a part of Marsh & McLennan. This account will now be managed by Marsh. We believe clients will benefit from access to broader talent, deeper risk expertise and specialty capabilities, broader geographic reach, and more capacity in digital, data, and analytic

Anthem National Accounts
Anthem National Accounts serves enterprise companies, including dozens in the Fortune 500. Our retention rate of 98% confirms our commitment to delivering the best value and service to our clients. Anthem National Accounts is solving the health benefit challenges of the countryโs leading organiza

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
Pekin Insurance CyberSecurity History Information
How many cyber incidents has Pekin Insurance faced?
Total Incidents: According to Rankiteo, Pekin Insurance has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at Pekin Insurance?
Incident Types: The types of cybersecurity incidents that have occurred incident Breach.
How does Pekin Insurance detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through containment measures with Terminated stolen user credentials and remediation measures with Investigated extent of the breach and recovery measures with Sent notifications to impacted individuals.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: Pekin Insurance Data Breach
Description: An insurance agentโs login credentials of Pekin Insurance were stolen that allowed an unauthorized party to access the companyโs insurance agent website and view sensitive consumer data.
Type: Data Breach
Attack Vector: Stolen Credentials
Vulnerability Exploited: Weak or Stolen Login Credentials
Threat Actor: Unauthorized Party
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach PEK14429522
Data Compromised: Name, Address, Driver's License Number, Date of Birth
Systems Affected: Insurance Agent Website
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Name, Address, Driver's License Number and Date of Birth.
Which entities were affected by each incident?

Incident : Data Breach PEK14429522
Entity Type: Insurance Company
Industry: Insurance
Customers Affected: 10,872 individuals
Response to the Incidents
What measures were taken in response to each incident?

Incident : Data Breach PEK14429522
Containment Measures: Terminated stolen user credentials
Remediation Measures: Investigated extent of the breach
Recovery Measures: Sent notifications to impacted individuals
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach PEK14429522
Type of Data Compromised: Name, Address, Driver's License Number, Date of Birth
Number of Records Exposed: 10,872
Sensitivity of Data: High
Personally Identifiable Information: Yes
What measures does the company take to prevent data exfiltration?
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Investigated extent of the breach.
How does the company handle incidents involving personally identifiable information (PII)?
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through was Terminated stolen user credentials.
Ransomware Information
How does the company recover data encrypted by ransomware?
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Sent notifications to impacted individuals.
Additional Questions
General Information
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident was an Unauthorized Party.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were Name, Address, Driver's License Number and Date of Birth.
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident was Insurance Agent Website.
Response to the Incidents
What containment measures were taken in the most recent incident?
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Terminated stolen user credentials.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Name, Address, Driver's License Number and Date of Birth.
What was the number of records exposed in the most significant breach?
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 10.9K.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
