SlideShare a Scribd company logo
1 of 28
Security Features and
Securing Your Data
Kelly Grisham
Training Director
Are You Protecting Your
Agency?
Most ALL
agencies keep
sensitive
personal
information in
their files.
Customer
Information
Drivers License #s
Social Security #s
Credit Card #s
Dec Pages
Agency Financials
Business Plans
Data Protection
If sensitive data falls into the wrong hands, it
can lead to:
fraud, identity theft, or similar harms.
Given the cost of a security breach, losing
your clients’ trust and perhaps even
defending yourself against a lawsuit,
protecting personal information is just plain
good business!
Security Practices
*Do’s & Don’ts*
Hackers
Do NOT give out
your computer
username and
password to
anyone.
Be Cautious
…of using someone else’s computer. You
don’t know what they have on their
computer or if they have anything on there
that is not safe.
Data Breach
Don’t leave anything
lying around.
Put paperwork in a
locked drawer or
cabinet.
Scan paperwork into
your agency
management system,
and then shred it.
Lock It
If not, someone
can….
Access your email
See your
messages and
steal information
Send messages in
your name
See and send files
Passwords
Setting Up Your
Passwords
Always use hard-to-
guess Passwords
Make sure you use
unique Passwords
Protecting Yourself
with Passwords
Password protect any
confidential files on…
Computer
Mobile device
USB
Cyber Criminals
Do NOT open links in an email from someone you
don’t know or trust.
 Do you really think there is someone in Nigeria
that wants to give you $50 million?
 Do you really think you can purchase Oakley
sunglasses for $5?
 Do you really think they found a cure for cancer?
Cyber criminals send you these links to get you to
click on them and direct you to a website, where
they can automatically install a virus on your machine
and steal your information.
Don’t Plug It In
Do not plug your mobile device into
your computer without the okay
from IT.
The mobile device might have a virus
on it that you are uploading to the
computer.
Also, the mobile device can
download files from the computer to
the device, and you need to make
sure the files are encrypted
beforehand.
In case the device falls into the wrong
hands, no harm is done if everything
is safe and encrypted.
Be Careful What You Install
Don’t install unauthorized programs on to your
computer.
Malware and bugs can be installed with
applications you install. You and your computer
could potentially be at risk for the bad guys to
access your computer and steal your data.
IT wants to make sure that you install safe and
secure applications on your computer.
Have a Watchful Eye
• Be aware of suspicious activity
• Someone in or around your office that you
don’t know?
• Report anything you see
• Contact management or proper authorities
• Protect your agency
What is Your Security
Plan?
5 Key Principles
1. Take stock. Know what personal information
you have in your files and on your computers.
2. Scale down. Keep only what you need for
your business.
3. Lock it. Protect the information that you
keep.
4. Shred it. Properly dispose of what you no
longer need.
5. Plan ahead. Create a plan to respond to
security incidents.
Choose Business
Partners With Care!
Partner with companies that take equal or greater
care with data, as your agency does.
TurboRater’s Security
Features
TurboRater offers security features on the:
User level
Location level
Agency level
TurboRater’s Security Features
TurboRater
requires you set up
users with a login ID
and password
Create login ID and
password for each
user
Password is
encrypted
TurboRater’s Security
Features
Permission Levels: You choose what you
want your users having access to inside
TurboRater.
Additional Restrictions
IP Address Restrictions
YOU decide when they access TurboRater
Show Clients You Care
About Their Privacy
InsurancePro’s Security
Features
Activate Require Login feature
InsurancePro’s Security
Features
Create login ID
and password for
each user
Password is
encrypted
InsurancePro’s Security
Features
User Permissions
Restrict Users
from areas they
don’t need access
to
Everyone does
not need to be an
Administrator
Go Paperless
Scan everything
into a secured
agency
management
system
Shred
documents
afterwards
It’s cheaper in the long run to
invest in better data security…
…than to lose the goodwill of your clients, defend
yourself in legal actions, and face other possible
consequences of a data breach.
Thank You
Don’t forget to fill out your surveys!
Kelly Grisham
Training Director

More Related Content

What's hot

Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Protection against cyber threats
Protection against cyber threatsProtection against cyber threats
Protection against cyber threatsTIKAJ
 
Digital Security
Digital Security Digital Security
Digital Security MCMAUP01
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber securityTevfik Üret
 
Malicion software
Malicion softwareMalicion software
Malicion softwareA. Shamel
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentationelihuwalker
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
1 security goals
1   security goals1   security goals
1 security goalsdrewz lin
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Showzed_o07
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Wapt course detail
Wapt course detailWapt course detail
Wapt course detailhackersguru
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04Kyle Lai
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaTheko Moima
 

What's hot (20)

Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Protection against cyber threats
Protection against cyber threatsProtection against cyber threats
Protection against cyber threats
 
Internet security
Internet securityInternet security
Internet security
 
Digital Security
Digital Security Digital Security
Digital Security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber security
 
Malicion software
Malicion softwareMalicion software
Malicion software
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
1 security goals
1   security goals1   security goals
1 security goals
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Show
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Wapt course detail
Wapt course detailWapt course detail
Wapt course detail
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 

Viewers also liked

A SYNOPSIS OF THE REGISTRATION AND ENFORCEMENT OF FOREIGN JUDGMENTS IN NIGERIA
A SYNOPSIS OF THE REGISTRATION AND ENFORCEMENT OF FOREIGN JUDGMENTS IN NIGERIAA SYNOPSIS OF THE REGISTRATION AND ENFORCEMENT OF FOREIGN JUDGMENTS IN NIGERIA
A SYNOPSIS OF THE REGISTRATION AND ENFORCEMENT OF FOREIGN JUDGMENTS IN NIGERIANnagozie Azih
 
Anatomía muscular
Anatomía muscularAnatomía muscular
Anatomía muscularEmagister
 
提 言 自治体データ及び医療データ連係と個人情報保護法制の問題点 個人情報保護法制2000個問題の立法的解決に向けて
提 言 自治体データ及び医療データ連係と個人情報保護法制の問題点 個人情報保護法制2000個問題の立法的解決に向けて提 言 自治体データ及び医療データ連係と個人情報保護法制の問題点 個人情報保護法制2000個問題の立法的解決に向けて
提 言 自治体データ及び医療データ連係と個人情報保護法制の問題点 個人情報保護法制2000個問題の立法的解決に向けてjump-slide
 
7 Penyakit Kelapa Sawit Eksotik
7 Penyakit Kelapa Sawit Eksotik7 Penyakit Kelapa Sawit Eksotik
7 Penyakit Kelapa Sawit Eksotiksat rahayuwati
 
Lower limb bones-joints-muscles-Dr.B.B.Gosai
Lower limb bones-joints-muscles-Dr.B.B.GosaiLower limb bones-joints-muscles-Dr.B.B.Gosai
Lower limb bones-joints-muscles-Dr.B.B.GosaiDr.B.B. Gosai
 
Air Pollution (slide presentation)
Air Pollution (slide presentation)Air Pollution (slide presentation)
Air Pollution (slide presentation)Jikrul Hasan Jack
 
Automated Plant Watering System
Automated Plant Watering SystemAutomated Plant Watering System
Automated Plant Watering SystemSoumyadeep Kal
 
Administrative law pratik
Administrative law pratikAdministrative law pratik
Administrative law pratikPratik Gadekar
 
How to add FB post links for a FB campaign on Blogmint?
How to add FB post links for a FB campaign on Blogmint?How to add FB post links for a FB campaign on Blogmint?
How to add FB post links for a FB campaign on Blogmint?Blogmint
 
Εγχειρίδιο Ηλεκτρονικών Τσιγάρων
Εγχειρίδιο Ηλεκτρονικών ΤσιγάρωνΕγχειρίδιο Ηλεκτρονικών Τσιγάρων
Εγχειρίδιο Ηλεκτρονικών ΤσιγάρωνPanayotis Sofianopoulos
 

Viewers also liked (16)

A SYNOPSIS OF THE REGISTRATION AND ENFORCEMENT OF FOREIGN JUDGMENTS IN NIGERIA
A SYNOPSIS OF THE REGISTRATION AND ENFORCEMENT OF FOREIGN JUDGMENTS IN NIGERIAA SYNOPSIS OF THE REGISTRATION AND ENFORCEMENT OF FOREIGN JUDGMENTS IN NIGERIA
A SYNOPSIS OF THE REGISTRATION AND ENFORCEMENT OF FOREIGN JUDGMENTS IN NIGERIA
 
How to Improve Social Media Marketing - Becky Schroeder
How to Improve Social Media Marketing - Becky SchroederHow to Improve Social Media Marketing - Becky Schroeder
How to Improve Social Media Marketing - Becky Schroeder
 
ve4f5
ve4f5ve4f5
ve4f5
 
IFPRI- ASTI-NAARM Brief Background of ASTI- Dr PK Joshi
IFPRI- ASTI-NAARM Brief Background of ASTI- Dr PK JoshiIFPRI- ASTI-NAARM Brief Background of ASTI- Dr PK Joshi
IFPRI- ASTI-NAARM Brief Background of ASTI- Dr PK Joshi
 
Anatomía muscular
Anatomía muscularAnatomía muscular
Anatomía muscular
 
HFCL_Certificate
HFCL_CertificateHFCL_Certificate
HFCL_Certificate
 
Signed, Sealed, Delivered: Getting Your Emails Into Inboxes
Signed, Sealed, Delivered: Getting Your Emails Into InboxesSigned, Sealed, Delivered: Getting Your Emails Into Inboxes
Signed, Sealed, Delivered: Getting Your Emails Into Inboxes
 
提 言 自治体データ及び医療データ連係と個人情報保護法制の問題点 個人情報保護法制2000個問題の立法的解決に向けて
提 言 自治体データ及び医療データ連係と個人情報保護法制の問題点 個人情報保護法制2000個問題の立法的解決に向けて提 言 自治体データ及び医療データ連係と個人情報保護法制の問題点 個人情報保護法制2000個問題の立法的解決に向けて
提 言 自治体データ及び医療データ連係と個人情報保護法制の問題点 個人情報保護法制2000個問題の立法的解決に向けて
 
Taller 1 grado 11
Taller 1 grado 11Taller 1 grado 11
Taller 1 grado 11
 
7 Penyakit Kelapa Sawit Eksotik
7 Penyakit Kelapa Sawit Eksotik7 Penyakit Kelapa Sawit Eksotik
7 Penyakit Kelapa Sawit Eksotik
 
Lower limb bones-joints-muscles-Dr.B.B.Gosai
Lower limb bones-joints-muscles-Dr.B.B.GosaiLower limb bones-joints-muscles-Dr.B.B.Gosai
Lower limb bones-joints-muscles-Dr.B.B.Gosai
 
Air Pollution (slide presentation)
Air Pollution (slide presentation)Air Pollution (slide presentation)
Air Pollution (slide presentation)
 
Automated Plant Watering System
Automated Plant Watering SystemAutomated Plant Watering System
Automated Plant Watering System
 
Administrative law pratik
Administrative law pratikAdministrative law pratik
Administrative law pratik
 
How to add FB post links for a FB campaign on Blogmint?
How to add FB post links for a FB campaign on Blogmint?How to add FB post links for a FB campaign on Blogmint?
How to add FB post links for a FB campaign on Blogmint?
 
Εγχειρίδιο Ηλεκτρονικών Τσιγάρων
Εγχειρίδιο Ηλεκτρονικών ΤσιγάρωνΕγχειρίδιο Ηλεκτρονικών Τσιγάρων
Εγχειρίδιο Ηλεκτρονικών Τσιγάρων
 

Similar to Security Features and Securing Your Data in TurboRater and InsurancePro - Kelly Grisham, ITC

Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101HaroldCo
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNcell
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.jayceewong1
 
Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Craig Rispin
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theftDeepak John
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxQuiMo3
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsKevin Fream
 

Similar to Security Features and Securing Your Data in TurboRater and InsurancePro - Kelly Grisham, ITC (20)

Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 

More from Insurance Technologies Corporation (ITC)

Ready for Takeoff: How Landing Pages Can Boost your Insurance Website Leads
Ready for Takeoff: How Landing Pages Can Boost your Insurance Website LeadsReady for Takeoff: How Landing Pages Can Boost your Insurance Website Leads
Ready for Takeoff: How Landing Pages Can Boost your Insurance Website LeadsInsurance Technologies Corporation (ITC)
 
Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects
Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects
Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects Insurance Technologies Corporation (ITC)
 

More from Insurance Technologies Corporation (ITC) (20)

Emerling Agency Case Study
Emerling Agency Case StudyEmerling Agency Case Study
Emerling Agency Case Study
 
How to Get Started with a New Website Redesign
How to Get Started with a New Website RedesignHow to Get Started with a New Website Redesign
How to Get Started with a New Website Redesign
 
Test Your Way to Success: Optimize Your Agency's Email Marketing
Test Your Way to Success: Optimize Your Agency's Email MarketingTest Your Way to Success: Optimize Your Agency's Email Marketing
Test Your Way to Success: Optimize Your Agency's Email Marketing
 
Stay on Track: Strategic Benchmarking For Digital Marketing
Stay on Track: Strategic Benchmarking For Digital MarketingStay on Track: Strategic Benchmarking For Digital Marketing
Stay on Track: Strategic Benchmarking For Digital Marketing
 
Stay on Track: Strategic Benchmarking for Search Marketing
Stay on Track: Strategic Benchmarking for Search MarketingStay on Track: Strategic Benchmarking for Search Marketing
Stay on Track: Strategic Benchmarking for Search Marketing
 
Ready for Takeoff: How Landing Pages Can Boost your Insurance Website Leads
Ready for Takeoff: How Landing Pages Can Boost your Insurance Website LeadsReady for Takeoff: How Landing Pages Can Boost your Insurance Website Leads
Ready for Takeoff: How Landing Pages Can Boost your Insurance Website Leads
 
SEO in 2019...and Beyond!
SEO in 2019...and Beyond!SEO in 2019...and Beyond!
SEO in 2019...and Beyond!
 
Email Service Quirks and How to Get Around Them
Email Service Quirks and How to Get Around ThemEmail Service Quirks and How to Get Around Them
Email Service Quirks and How to Get Around Them
 
ITC AgencyBuzz
ITC AgencyBuzzITC AgencyBuzz
ITC AgencyBuzz
 
Answering Your Top 10 FAQs About Insurance Website Design
Answering Your Top 10 FAQs About Insurance Website DesignAnswering Your Top 10 FAQs About Insurance Website Design
Answering Your Top 10 FAQs About Insurance Website Design
 
How to Write the Perfect Insurance Email
How to Write the Perfect Insurance EmailHow to Write the Perfect Insurance Email
How to Write the Perfect Insurance Email
 
Blogging Your Way to Local SEO Success
Blogging Your Way to Local SEO SuccessBlogging Your Way to Local SEO Success
Blogging Your Way to Local SEO Success
 
Common Misconceptions About Email Marketing
Common Misconceptions About Email MarketingCommon Misconceptions About Email Marketing
Common Misconceptions About Email Marketing
 
Search Marketing For The Short And Long Term
Search Marketing For The Short And Long TermSearch Marketing For The Short And Long Term
Search Marketing For The Short And Long Term
 
Using the 5 Ws to Create a Successful Email Marketing Strategy
Using the 5 Ws to Create a Successful Email Marketing StrategyUsing the 5 Ws to Create a Successful Email Marketing Strategy
Using the 5 Ws to Create a Successful Email Marketing Strategy
 
Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects
Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects
Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects
 
All Sky, No Net: How Agencies Can Survive Automation
All Sky, No Net: How Agencies Can Survive AutomationAll Sky, No Net: How Agencies Can Survive Automation
All Sky, No Net: How Agencies Can Survive Automation
 
How to Turn Your Website into a Lead Generator
How to Turn Your Website into a Lead GeneratorHow to Turn Your Website into a Lead Generator
How to Turn Your Website into a Lead Generator
 
10 Email Marketing Feaux Pas You're Probably Making
10 Email Marketing Feaux Pas You're Probably Making10 Email Marketing Feaux Pas You're Probably Making
10 Email Marketing Feaux Pas You're Probably Making
 
Think Like a Marketer: Marketing Ideation for Insurance Agents
Think Like a Marketer: Marketing Ideation for Insurance AgentsThink Like a Marketer: Marketing Ideation for Insurance Agents
Think Like a Marketer: Marketing Ideation for Insurance Agents
 

Recently uploaded

VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Roomdivyansh0kumar0
 
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingSimplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingCIToolkit
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineeringthomas851723
 
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...AgileNetwork
 
Reflecting, turning experience into insight
Reflecting, turning experience into insightReflecting, turning experience into insight
Reflecting, turning experience into insightWayne Abrahams
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sectorthomas851723
 
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixUnlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixCIToolkit
 
Board Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch PresentationBoard Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch Presentationcraig524401
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentationmintusiprd
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Nehwal
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Reviewthomas851723
 

Recently uploaded (13)

VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
 
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingSimplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineering
 
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
 
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Servicesauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
 
Reflecting, turning experience into insight
Reflecting, turning experience into insightReflecting, turning experience into insight
Reflecting, turning experience into insight
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sector
 
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixUnlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
 
Board Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch PresentationBoard Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch Presentation
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentation
 
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Review
 

Security Features and Securing Your Data in TurboRater and InsurancePro - Kelly Grisham, ITC

  • 1. Security Features and Securing Your Data Kelly Grisham Training Director
  • 2. Are You Protecting Your Agency? Most ALL agencies keep sensitive personal information in their files. Customer Information Drivers License #s Social Security #s Credit Card #s Dec Pages Agency Financials Business Plans
  • 3. Data Protection If sensitive data falls into the wrong hands, it can lead to: fraud, identity theft, or similar harms. Given the cost of a security breach, losing your clients’ trust and perhaps even defending yourself against a lawsuit, protecting personal information is just plain good business!
  • 5. Hackers Do NOT give out your computer username and password to anyone.
  • 6. Be Cautious …of using someone else’s computer. You don’t know what they have on their computer or if they have anything on there that is not safe.
  • 7. Data Breach Don’t leave anything lying around. Put paperwork in a locked drawer or cabinet. Scan paperwork into your agency management system, and then shred it.
  • 8. Lock It If not, someone can…. Access your email See your messages and steal information Send messages in your name See and send files
  • 9. Passwords Setting Up Your Passwords Always use hard-to- guess Passwords Make sure you use unique Passwords Protecting Yourself with Passwords Password protect any confidential files on… Computer Mobile device USB
  • 10. Cyber Criminals Do NOT open links in an email from someone you don’t know or trust.  Do you really think there is someone in Nigeria that wants to give you $50 million?  Do you really think you can purchase Oakley sunglasses for $5?  Do you really think they found a cure for cancer? Cyber criminals send you these links to get you to click on them and direct you to a website, where they can automatically install a virus on your machine and steal your information.
  • 11. Don’t Plug It In Do not plug your mobile device into your computer without the okay from IT. The mobile device might have a virus on it that you are uploading to the computer. Also, the mobile device can download files from the computer to the device, and you need to make sure the files are encrypted beforehand. In case the device falls into the wrong hands, no harm is done if everything is safe and encrypted.
  • 12. Be Careful What You Install Don’t install unauthorized programs on to your computer. Malware and bugs can be installed with applications you install. You and your computer could potentially be at risk for the bad guys to access your computer and steal your data. IT wants to make sure that you install safe and secure applications on your computer.
  • 13. Have a Watchful Eye • Be aware of suspicious activity • Someone in or around your office that you don’t know? • Report anything you see • Contact management or proper authorities • Protect your agency
  • 14. What is Your Security Plan?
  • 15. 5 Key Principles 1. Take stock. Know what personal information you have in your files and on your computers. 2. Scale down. Keep only what you need for your business. 3. Lock it. Protect the information that you keep. 4. Shred it. Properly dispose of what you no longer need. 5. Plan ahead. Create a plan to respond to security incidents.
  • 16. Choose Business Partners With Care! Partner with companies that take equal or greater care with data, as your agency does.
  • 17. TurboRater’s Security Features TurboRater offers security features on the: User level Location level Agency level
  • 18. TurboRater’s Security Features TurboRater requires you set up users with a login ID and password Create login ID and password for each user Password is encrypted
  • 19. TurboRater’s Security Features Permission Levels: You choose what you want your users having access to inside TurboRater.
  • 21. IP Address Restrictions YOU decide when they access TurboRater
  • 22. Show Clients You Care About Their Privacy
  • 24. InsurancePro’s Security Features Create login ID and password for each user Password is encrypted
  • 25. InsurancePro’s Security Features User Permissions Restrict Users from areas they don’t need access to Everyone does not need to be an Administrator
  • 26. Go Paperless Scan everything into a secured agency management system Shred documents afterwards
  • 27. It’s cheaper in the long run to invest in better data security… …than to lose the goodwill of your clients, defend yourself in legal actions, and face other possible consequences of a data breach.
  • 28. Thank You Don’t forget to fill out your surveys! Kelly Grisham Training Director

Editor's Notes

  1. A lot of companies have lost sensitive personal information…and some of the biggest causes were internal errors and other things the company could potentially control
  2. If you ever get a phone call from someone, claiming to be your IT Dept, asking for your Computer UserName and Password, you are probably talking to a Hacker Same thing with email, do not ever give it out.
  3. Is it too good, to be true?