SlideShare a Scribd company logo
1 of 11
Download to read offline
1
Cyber Security
and Data Protection
2
Cyber Security
and
Data Protection
A recent Insurance Business America article reported 80 percent of businesses will
experience a data security breach within 12 months. A breach can cause a loss
of data, identity theft, and potential lawsuits that can hurt the business, its clients,
and employees. Like any company, your independent insurance agency is just as
vulnerable to such risks, meaning you must take steps to prevent and minimize the
effects of cyber threats.
This eGuide explores the common cyber security threats and how to protect your
business and customers. Throughout the guide, we’ll hear from some experienced
agency owners about their cyber security concerns and how they keep their
agencies and customers safe.
 
80%
of businesses will
experience a data
security breach
within 12 months
3
CONTENTS
Cyber Security Basics..............................................................................4
Protecting Your Agency...........................................................................5
First Steps...............................................................................................6
Protecting Your Customers......................................................................8
Staying Informed...................................................................................10
4
Cyber Security
Basics
Cyber security is becoming increasingly relevant within the insurance industry
to the degree, that the National Association of Insurance Commissioners (NAIC)
named it as the key initiative for 2015.
Cyber security is about protecting your agency from digital threats that may
harm your data, exposing you and your customers.
	 The largest threats to your agency deal with losing or 		
compromising data, including:
1. 	 Viruses infecting your computer system and destroying data
2. 	 Hackers accessing your systems and stealing personal records
3. 	 Employees negligence such as leaving systems open or losing laptops,
tablets, and other mobile devices
“We worry most about people
hacking into our system. Criminals
are at work day and night to access
personal data (for identity theft).”
Leslie Huesman,
Huesman Insurance Group
5
Protecting
Your Agency
There are a few initial steps you can take to ward against these
cyber threats.
n	 Keep your virus protection up to date
n	 Educate employees on good data security practices
n	 Employ multiple individuals to monitor threats
n	 Outsource data security management for constant vigilance
n	 Purchase liability coverage for your agency
n	 Keep up to date on the latest agency practices and trends
	 in cyber security
Steve Kramer,
Kramer Insurance
“Our biggest risk is our people. We need to educate our staff and
agents on how to handle (personal information). We worry about
anyone being lax when it comes to handling such data.”
6
First
Steps
Feeling overwhelmed already? Take a step back! Although it is important that your
agency address these issues of cyber security and data protection, you don’t need to do
everything all at once. Start out by focusing on these three key action items:
CREATE CHECKLISTS, GUIDELINES, AND
REGULATIONS FOR EMPLOYEES: Insist on
passwords for all devices used to access your system.
Don’t allow employees to download personal data
without encrypting files and limit who is allowed to
download. Have all emails containing sensitive data
encrypted as well. Finally, discourage staff from
accessing your agency’s system on public WiFi as this
increases vulnerability to hacking.
7
INVEST IN SECURE BACKUPS: Ensure all
your agency’s data is protected by backing up
your system frequently and storing it at an off-site
location. Use an outside vendor, ideally your agency
management system provider, to store your data.
They’ll have the infrastructure and heightened
security needed to keep such a large amount of
personal information safe.
PURCHASE CYBER INSURANCE: Cyber
insurance helps keep your agency protected
should a data breach occur, including covering
government-mandated notification and reparations
for those affected.
“(You) need to set up preventative items. We want everybody to
have security in place (in their agency), meaning encrypting data and using secure passwords. Our biggest asset
is our data, so that data needs to be backed up and protected against computer meltdowns, too.”
Larry Harb,
IT Risk Managers, Inc.
8
Protecting
Your Customers
Your agency has a responsibility to not only protect your digital assets, but to offer
protection to your customers as well. Cyber liability insurance coverage protects
your customers from such threats. As an independent insurance agency owner,
it’s in your best interest to provide such coverage for your commercial customers.
Coverage points for cyber liability insurance include:
n	 Regulatory Coverage – Focuses on costs associated with lawsuits or fines
against a business. This includes the cost of a defense lawyer and court fees.
n	 E & O Coverage – Pertains to a failure in preventing data breaches, including
storing unencrypted data or not using a firewall. Such coverage can also be a
part of general, non-cyber specific E & O coverage.
n	 Notification Coverage – Most states now require businesses to notify
customers of cyber breaches and this point of coverage identifies the number
of customers to be notified and the methods of notification.
9
n	 Data Restoration Coverage – Covers the cost of recovering
damaged or lost data. Points of coverage may include
replacing hardware or software, restoration, and replacement of
other electronic assets.
n	 Crisis Coverage – Addresses the PR aspects of data loss. It
covers everything from managing media relations to providing
affected customers with credit monitoring.
n	 Liability and Slander Converge – Pertains to online incidents
of slander, liable, copyright infringement, or other reputational
damage done by those representing a specific business.
“There are two important parts (in cyber liability coverage): first is the
money to pay for the damage to customers, second is providing our clients
with a quarterback to run the show. This person helps our clients through
the process of notification and meeting all requirements of a company that
has had a data breach.”
Leslie Huesman,
Huesman Insurance Group
10
Staying
Informed
As technology continues to grow and evolve, more vulnerabilities
will be uncovered. It’s important for you and your agency to stay
informed on new cyber security threats and methods to protect
your data. We at SIS know this growing need for cyber security
and are committed to keeping our clients prepared, which includes
attending industry conferences and hosting sessions on the topic.
Find out more about how SIS is staying ahead of the curve on our
website or by contacting us today at sales@sisware.com.
11
About SIS
Headquartered in Columbus, Ohio, Strategic Insurance Software
(SIS) is the team behind Partner XE—an innovative web-based
insurance agency management system that helps independent
agencies streamline workflow and grow their business. Built on
a foundation of strong technology and exceptional service, we’re
moving forward with a constant eye on innovation that will make
independent agents’ lives easier.
About Partner XE
Supporting downloads from nearly 300 carriers, real time interaction,
integrated agency accounting, and much more, Partner XE is a full-
featured agency management system at an affordable cost for the
independent insurance agency. For more information, please visit
www.sisware.com.
4181 Arlingate Plaza, Columbus, Ohio 43228
800.747.9273 | www.sisware.com

More Related Content

What's hot

Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityHome
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 

What's hot (20)

Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 

Viewers also liked

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Holding private data: data protection regulation & insurance coverage issues
Holding private data: data protection regulation & insurance coverage issuesHolding private data: data protection regulation & insurance coverage issues
Holding private data: data protection regulation & insurance coverage issuesFERMA
 
Data security and cyber risks - In house lawyers forum 2013, Richard Nicholas
Data security and cyber risks - In house lawyers forum 2013, Richard NicholasData security and cyber risks - In house lawyers forum 2013, Richard Nicholas
Data security and cyber risks - In house lawyers forum 2013, Richard NicholasBrowne Jacobson LLP
 
Protect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/ReputationProtect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/ReputationPa Al
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistMatthew Rosenquist
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 

Viewers also liked (8)

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Holding private data: data protection regulation & insurance coverage issues
Holding private data: data protection regulation & insurance coverage issuesHolding private data: data protection regulation & insurance coverage issues
Holding private data: data protection regulation & insurance coverage issues
 
Data security and cyber risks - In house lawyers forum 2013, Richard Nicholas
Data security and cyber risks - In house lawyers forum 2013, Richard NicholasData security and cyber risks - In house lawyers forum 2013, Richard Nicholas
Data security and cyber risks - In house lawyers forum 2013, Richard Nicholas
 
Protect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/ReputationProtect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/Reputation
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Cyber Security and Data Protection

Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceNational Retail Federation
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!topseowebmaster
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals Richard Brzakala
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber InsuranceJohn Ryan
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessMeg Weber
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowShantam Goel
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guidelarry1401
 
The impact of a security breach on MSP's and their clients
The impact of a security breach on MSP's and their clientsThe impact of a security breach on MSP's and their clients
The impact of a security breach on MSP's and their clientsJose Lopez
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideInspiring Women
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustGrant Thornton LLP
 
Understanding Website Data Security And Its Importance.pdf
Understanding Website Data Security And Its Importance.pdfUnderstanding Website Data Security And Its Importance.pdf
Understanding Website Data Security And Its Importance.pdfEracom Technologies
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
How to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfHow to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfMr. Business Magazine
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingDanielle Bowers
 

Similar to Cyber Security and Data Protection (20)

Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber Insurance
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
 
The impact of a security breach on MSP's and their clients
The impact of a security breach on MSP's and their clientsThe impact of a security breach on MSP's and their clients
The impact of a security breach on MSP's and their clients
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
 
Understanding Website Data Security And Its Importance.pdf
Understanding Website Data Security And Its Importance.pdfUnderstanding Website Data Security And Its Importance.pdf
Understanding Website Data Security And Its Importance.pdf
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
How to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfHow to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdf
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
 

More from Strategic Insurance Software

9 Things to Look for in an Agency Management System
9 Things to Look for in an Agency Management System9 Things to Look for in an Agency Management System
9 Things to Look for in an Agency Management SystemStrategic Insurance Software
 
Key Strategies for Hiring & Retaining Top Talent for your Independent Insuran...
Key Strategies for Hiring & Retaining Top Talent for your Independent Insuran...Key Strategies for Hiring & Retaining Top Talent for your Independent Insuran...
Key Strategies for Hiring & Retaining Top Talent for your Independent Insuran...Strategic Insurance Software
 
Cracking the Productivity Guide: Habits to Increase Email Productivity
Cracking the Productivity Guide: Habits to Increase Email Productivity Cracking the Productivity Guide: Habits to Increase Email Productivity
Cracking the Productivity Guide: Habits to Increase Email Productivity Strategic Insurance Software
 
Getting Your Insurance Agency Finances in Order: Accounting Tips for Independ...
Getting Your Insurance Agency Finances in Order: Accounting Tips for Independ...Getting Your Insurance Agency Finances in Order: Accounting Tips for Independ...
Getting Your Insurance Agency Finances in Order: Accounting Tips for Independ...Strategic Insurance Software
 
How to Get the Most Out of Your Agency Management System
How to Get the Most Out of Your Agency Management System How to Get the Most Out of Your Agency Management System
How to Get the Most Out of Your Agency Management System Strategic Insurance Software
 
Cloud Apps Part II: Improving Insurance Agency Communications
Cloud Apps Part II: Improving Insurance Agency CommunicationsCloud Apps Part II: Improving Insurance Agency Communications
Cloud Apps Part II: Improving Insurance Agency CommunicationsStrategic Insurance Software
 
Independent Insurance Agencies- Making the Windows XP Switch
Independent Insurance Agencies- Making the Windows XP SwitchIndependent Insurance Agencies- Making the Windows XP Switch
Independent Insurance Agencies- Making the Windows XP SwitchStrategic Insurance Software
 

More from Strategic Insurance Software (13)

9 Things to Look for in an Agency Management System
9 Things to Look for in an Agency Management System9 Things to Look for in an Agency Management System
9 Things to Look for in an Agency Management System
 
How to Choose an Agency Management System
How to Choose an Agency Management SystemHow to Choose an Agency Management System
How to Choose an Agency Management System
 
Are you the next target?
Are you the next target?Are you the next target?
Are you the next target?
 
Quick Tips to Maximize Agency Efficiency
Quick Tips to Maximize Agency Efficiency Quick Tips to Maximize Agency Efficiency
Quick Tips to Maximize Agency Efficiency
 
Harnessing the Power of Community
Harnessing the Power of CommunityHarnessing the Power of Community
Harnessing the Power of Community
 
Change Mangement
Change MangementChange Mangement
Change Mangement
 
Key Strategies for Hiring & Retaining Top Talent for your Independent Insuran...
Key Strategies for Hiring & Retaining Top Talent for your Independent Insuran...Key Strategies for Hiring & Retaining Top Talent for your Independent Insuran...
Key Strategies for Hiring & Retaining Top Talent for your Independent Insuran...
 
Cracking the Productivity Guide: Habits to Increase Email Productivity
Cracking the Productivity Guide: Habits to Increase Email Productivity Cracking the Productivity Guide: Habits to Increase Email Productivity
Cracking the Productivity Guide: Habits to Increase Email Productivity
 
Getting Your Insurance Agency Finances in Order: Accounting Tips for Independ...
Getting Your Insurance Agency Finances in Order: Accounting Tips for Independ...Getting Your Insurance Agency Finances in Order: Accounting Tips for Independ...
Getting Your Insurance Agency Finances in Order: Accounting Tips for Independ...
 
How to Get the Most Out of Your Agency Management System
How to Get the Most Out of Your Agency Management System How to Get the Most Out of Your Agency Management System
How to Get the Most Out of Your Agency Management System
 
Cloud Apps Part II: Improving Insurance Agency Communications
Cloud Apps Part II: Improving Insurance Agency CommunicationsCloud Apps Part II: Improving Insurance Agency Communications
Cloud Apps Part II: Improving Insurance Agency Communications
 
Independent Insurance Agencies- Making the Windows XP Switch
Independent Insurance Agencies- Making the Windows XP SwitchIndependent Insurance Agencies- Making the Windows XP Switch
Independent Insurance Agencies- Making the Windows XP Switch
 
Effective Insurance Marketing on a Limited Budget
Effective Insurance Marketing on a Limited BudgetEffective Insurance Marketing on a Limited Budget
Effective Insurance Marketing on a Limited Budget
 

Recently uploaded

Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfLivetecs LLC
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 

Recently uploaded (20)

Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdf
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 

Cyber Security and Data Protection

  • 2. 2 Cyber Security and Data Protection A recent Insurance Business America article reported 80 percent of businesses will experience a data security breach within 12 months. A breach can cause a loss of data, identity theft, and potential lawsuits that can hurt the business, its clients, and employees. Like any company, your independent insurance agency is just as vulnerable to such risks, meaning you must take steps to prevent and minimize the effects of cyber threats. This eGuide explores the common cyber security threats and how to protect your business and customers. Throughout the guide, we’ll hear from some experienced agency owners about their cyber security concerns and how they keep their agencies and customers safe.   80% of businesses will experience a data security breach within 12 months
  • 3. 3 CONTENTS Cyber Security Basics..............................................................................4 Protecting Your Agency...........................................................................5 First Steps...............................................................................................6 Protecting Your Customers......................................................................8 Staying Informed...................................................................................10
  • 4. 4 Cyber Security Basics Cyber security is becoming increasingly relevant within the insurance industry to the degree, that the National Association of Insurance Commissioners (NAIC) named it as the key initiative for 2015. Cyber security is about protecting your agency from digital threats that may harm your data, exposing you and your customers. The largest threats to your agency deal with losing or compromising data, including: 1. Viruses infecting your computer system and destroying data 2. Hackers accessing your systems and stealing personal records 3. Employees negligence such as leaving systems open or losing laptops, tablets, and other mobile devices “We worry most about people hacking into our system. Criminals are at work day and night to access personal data (for identity theft).” Leslie Huesman, Huesman Insurance Group
  • 5. 5 Protecting Your Agency There are a few initial steps you can take to ward against these cyber threats. n Keep your virus protection up to date n Educate employees on good data security practices n Employ multiple individuals to monitor threats n Outsource data security management for constant vigilance n Purchase liability coverage for your agency n Keep up to date on the latest agency practices and trends in cyber security Steve Kramer, Kramer Insurance “Our biggest risk is our people. We need to educate our staff and agents on how to handle (personal information). We worry about anyone being lax when it comes to handling such data.”
  • 6. 6 First Steps Feeling overwhelmed already? Take a step back! Although it is important that your agency address these issues of cyber security and data protection, you don’t need to do everything all at once. Start out by focusing on these three key action items: CREATE CHECKLISTS, GUIDELINES, AND REGULATIONS FOR EMPLOYEES: Insist on passwords for all devices used to access your system. Don’t allow employees to download personal data without encrypting files and limit who is allowed to download. Have all emails containing sensitive data encrypted as well. Finally, discourage staff from accessing your agency’s system on public WiFi as this increases vulnerability to hacking.
  • 7. 7 INVEST IN SECURE BACKUPS: Ensure all your agency’s data is protected by backing up your system frequently and storing it at an off-site location. Use an outside vendor, ideally your agency management system provider, to store your data. They’ll have the infrastructure and heightened security needed to keep such a large amount of personal information safe. PURCHASE CYBER INSURANCE: Cyber insurance helps keep your agency protected should a data breach occur, including covering government-mandated notification and reparations for those affected. “(You) need to set up preventative items. We want everybody to have security in place (in their agency), meaning encrypting data and using secure passwords. Our biggest asset is our data, so that data needs to be backed up and protected against computer meltdowns, too.” Larry Harb, IT Risk Managers, Inc.
  • 8. 8 Protecting Your Customers Your agency has a responsibility to not only protect your digital assets, but to offer protection to your customers as well. Cyber liability insurance coverage protects your customers from such threats. As an independent insurance agency owner, it’s in your best interest to provide such coverage for your commercial customers. Coverage points for cyber liability insurance include: n Regulatory Coverage – Focuses on costs associated with lawsuits or fines against a business. This includes the cost of a defense lawyer and court fees. n E & O Coverage – Pertains to a failure in preventing data breaches, including storing unencrypted data or not using a firewall. Such coverage can also be a part of general, non-cyber specific E & O coverage. n Notification Coverage – Most states now require businesses to notify customers of cyber breaches and this point of coverage identifies the number of customers to be notified and the methods of notification.
  • 9. 9 n Data Restoration Coverage – Covers the cost of recovering damaged or lost data. Points of coverage may include replacing hardware or software, restoration, and replacement of other electronic assets. n Crisis Coverage – Addresses the PR aspects of data loss. It covers everything from managing media relations to providing affected customers with credit monitoring. n Liability and Slander Converge – Pertains to online incidents of slander, liable, copyright infringement, or other reputational damage done by those representing a specific business. “There are two important parts (in cyber liability coverage): first is the money to pay for the damage to customers, second is providing our clients with a quarterback to run the show. This person helps our clients through the process of notification and meeting all requirements of a company that has had a data breach.” Leslie Huesman, Huesman Insurance Group
  • 10. 10 Staying Informed As technology continues to grow and evolve, more vulnerabilities will be uncovered. It’s important for you and your agency to stay informed on new cyber security threats and methods to protect your data. We at SIS know this growing need for cyber security and are committed to keeping our clients prepared, which includes attending industry conferences and hosting sessions on the topic. Find out more about how SIS is staying ahead of the curve on our website or by contacting us today at sales@sisware.com.
  • 11. 11 About SIS Headquartered in Columbus, Ohio, Strategic Insurance Software (SIS) is the team behind Partner XE—an innovative web-based insurance agency management system that helps independent agencies streamline workflow and grow their business. Built on a foundation of strong technology and exceptional service, we’re moving forward with a constant eye on innovation that will make independent agents’ lives easier. About Partner XE Supporting downloads from nearly 300 carriers, real time interaction, integrated agency accounting, and much more, Partner XE is a full- featured agency management system at an affordable cost for the independent insurance agency. For more information, please visit www.sisware.com. 4181 Arlingate Plaza, Columbus, Ohio 43228 800.747.9273 | www.sisware.com