SlideShare a Scribd company logo
Security Features and
Securing Your Data
Kelly Grisham
Training Director
Are You Protecting Your
Agency?
Most ALL
agencies keep
sensitive
personal
information in
their files.
Customer
Information
Drivers License #s
Social Security #s
Credit Card #s
Dec Pages
Agency Financials
Business Plans
Data Protection
If sensitive data falls into the wrong hands, it
can lead to:
fraud, identity theft, or similar harms.
Given the cost of a security breach, losing
your clients’ trust and perhaps even
defending yourself against a lawsuit,
protecting personal information is just plain
good business!
Security Practices
*Do’s & Don’ts*
Hackers
Do NOT give out
your computer
username and
password to
anyone.
Be Cautious
…of using someone else’s computer. You
don’t know what they have on their
computer or if they have anything on there
that is not safe.
Data Breach
Don’t leave anything
lying around.
Put paperwork in a
locked drawer or
cabinet.
Scan paperwork into
your agency
management system,
and then shred it.
Lock It
If not, someone
can….
Access your email
See your
messages and
steal information
Send messages in
your name
See and send files
Passwords
Setting Up Your
Passwords
Always use hard-to-
guess Passwords
Make sure you use
unique Passwords
Protecting Yourself
with Passwords
Password protect any
confidential files on…
Computer
Mobile device
USB
Cyber Criminals
Do NOT open links in an email from someone you
don’t know or trust.
 Do you really think there is someone in Nigeria
that wants to give you $50 million?
 Do you really think you can purchase Oakley
sunglasses for $5?
 Do you really think they found a cure for cancer?
Cyber criminals send you these links to get you to
click on them and direct you to a website, where
they can automatically install a virus on your machine
and steal your information.
Don’t Plug It In
Do not plug your mobile device into
your computer without the okay
from IT.
The mobile device might have a virus
on it that you are uploading to the
computer.
Also, the mobile device can
download files from the computer to
the device, and you need to make
sure the files are encrypted
beforehand.
In case the device falls into the wrong
hands, no harm is done if everything
is safe and encrypted.
Be Careful What You Install
Don’t install unauthorized programs on to your
computer.
Malware and bugs can be installed with
applications you install. You and your computer
could potentially be at risk for the bad guys to
access your computer and steal your data.
IT wants to make sure that you install safe and
secure applications on your computer.
Have a Watchful Eye
• Be aware of suspicious activity
• Someone in or around your office that you
don’t know?
• Report anything you see
• Contact management or proper authorities
• Protect your agency
What is Your Security
Plan?
5 Key Principles
1. Take stock. Know what personal information
you have in your files and on your computers.
2. Scale down. Keep only what you need for
your business.
3. Lock it. Protect the information that you
keep.
4. Shred it. Properly dispose of what you no
longer need.
5. Plan ahead. Create a plan to respond to
security incidents.
Choose Business
Partners With Care!
Partner with companies that take equal or greater
care with data, as your agency does.
TurboRater’s Security
Features
TurboRater offers security features on the:
User level
Location level
Agency level
TurboRater’s Security Features
TurboRater
requires you set up
users with a login ID
and password
Create login ID and
password for each
user
Password is
encrypted
TurboRater’s Security
Features
Permission Levels: You choose what you
want your users having access to inside
TurboRater.
Additional Restrictions
IP Address Restrictions
YOU decide when they access TurboRater
Show Clients You Care
About Their Privacy
InsurancePro’s Security
Features
Activate Require Login feature
InsurancePro’s Security
Features
Create login ID
and password for
each user
Password is
encrypted
InsurancePro’s Security
Features
User Permissions
Restrict Users
from areas they
don’t need access
to
Everyone does
not need to be an
Administrator
Go Paperless
Scan everything
into a secured
agency
management
system
Shred
documents
afterwards
It’s cheaper in the long run to
invest in better data security…
…than to lose the goodwill of your clients, defend
yourself in legal actions, and face other possible
consequences of a data breach.
Thank You
Don’t forget to fill out your surveys!
Kelly Grisham
Training Director

More Related Content

What's hot

Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
Gian Gentile
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
NetWatcher
 
Protection against cyber threats
Protection against cyber threatsProtection against cyber threats
Protection against cyber threats
TIKAJ
 
Internet security
Internet securityInternet security
Internet security
Tapan Khilar
 
Digital Security
Digital Security Digital Security
Digital Security
MCMAUP01
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Innocent Korie
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber security
Tevfik Üret
 
Malicion software
Malicion softwareMalicion software
Malicion software
A. Shamel
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
harsh arora
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentationelihuwalker
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
jubke
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Jay Nagar
 
1 security goals
1   security goals1   security goals
1 security goalsdrewz lin
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Show
zed_o07
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Wapt course detail
Wapt course detailWapt course detail
Wapt course detail
hackersguru
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04Kyle Lai
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
Theko Moima
 

What's hot (20)

Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Protection against cyber threats
Protection against cyber threatsProtection against cyber threats
Protection against cyber threats
 
Internet security
Internet securityInternet security
Internet security
 
Digital Security
Digital Security Digital Security
Digital Security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber security
 
Malicion software
Malicion softwareMalicion software
Malicion software
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
1 security goals
1   security goals1   security goals
1 security goals
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Show
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Wapt course detail
Wapt course detailWapt course detail
Wapt course detail
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 

Viewers also liked

A SYNOPSIS OF THE REGISTRATION AND ENFORCEMENT OF FOREIGN JUDGMENTS IN NIGERIA
A SYNOPSIS OF THE REGISTRATION AND ENFORCEMENT OF FOREIGN JUDGMENTS IN NIGERIAA SYNOPSIS OF THE REGISTRATION AND ENFORCEMENT OF FOREIGN JUDGMENTS IN NIGERIA
A SYNOPSIS OF THE REGISTRATION AND ENFORCEMENT OF FOREIGN JUDGMENTS IN NIGERIANnagozie Azih
 
How to Improve Social Media Marketing - Becky Schroeder
How to Improve Social Media Marketing - Becky SchroederHow to Improve Social Media Marketing - Becky Schroeder
How to Improve Social Media Marketing - Becky Schroeder
Insurance Technologies Corporation (ITC)
 
ve4f5
ve4f5ve4f5
IFPRI- ASTI-NAARM Brief Background of ASTI- Dr PK Joshi
IFPRI- ASTI-NAARM Brief Background of ASTI- Dr PK JoshiIFPRI- ASTI-NAARM Brief Background of ASTI- Dr PK Joshi
IFPRI- ASTI-NAARM Brief Background of ASTI- Dr PK Joshi
International Food Policy Research Institute- South Asia Office
 
Anatomía muscular
Anatomía muscularAnatomía muscular
Anatomía muscular
Emagister
 
Signed, Sealed, Delivered: Getting Your Emails Into Inboxes
Signed, Sealed, Delivered: Getting Your Emails Into InboxesSigned, Sealed, Delivered: Getting Your Emails Into Inboxes
Signed, Sealed, Delivered: Getting Your Emails Into Inboxes
Insurance Technologies Corporation (ITC)
 
提 言 自治体データ及び医療データ連係と個人情報保護法制の問題点 個人情報保護法制2000個問題の立法的解決に向けて
提 言 自治体データ及び医療データ連係と個人情報保護法制の問題点 個人情報保護法制2000個問題の立法的解決に向けて提 言 自治体データ及び医療データ連係と個人情報保護法制の問題点 個人情報保護法制2000個問題の立法的解決に向けて
提 言 自治体データ及び医療データ連係と個人情報保護法制の問題点 個人情報保護法制2000個問題の立法的解決に向けて
jump-slide
 
Taller 1 grado 11
Taller 1 grado 11Taller 1 grado 11
Taller 1 grado 11
Lic. Oney Begambre
 
7 Penyakit Kelapa Sawit Eksotik
7 Penyakit Kelapa Sawit Eksotik7 Penyakit Kelapa Sawit Eksotik
7 Penyakit Kelapa Sawit Eksotik
sat rahayuwati
 
Lower limb bones-joints-muscles-Dr.B.B.Gosai
Lower limb bones-joints-muscles-Dr.B.B.GosaiLower limb bones-joints-muscles-Dr.B.B.Gosai
Lower limb bones-joints-muscles-Dr.B.B.Gosai
Dr.B.B. Gosai
 
Air Pollution (slide presentation)
Air Pollution (slide presentation)Air Pollution (slide presentation)
Air Pollution (slide presentation)
Jikrul Hasan Jack
 
Automated Plant Watering System
Automated Plant Watering SystemAutomated Plant Watering System
Automated Plant Watering System
Soumyadeep Kal
 
Administrative law pratik
Administrative law pratikAdministrative law pratik
Administrative law pratik
Pratik Gadekar
 
How to add FB post links for a FB campaign on Blogmint?
How to add FB post links for a FB campaign on Blogmint?How to add FB post links for a FB campaign on Blogmint?
How to add FB post links for a FB campaign on Blogmint?
Blogmint
 
Εγχειρίδιο Ηλεκτρονικών Τσιγάρων
Εγχειρίδιο Ηλεκτρονικών ΤσιγάρωνΕγχειρίδιο Ηλεκτρονικών Τσιγάρων
Εγχειρίδιο Ηλεκτρονικών Τσιγάρων
Panayotis Sofianopoulos
 

Viewers also liked (16)

A SYNOPSIS OF THE REGISTRATION AND ENFORCEMENT OF FOREIGN JUDGMENTS IN NIGERIA
A SYNOPSIS OF THE REGISTRATION AND ENFORCEMENT OF FOREIGN JUDGMENTS IN NIGERIAA SYNOPSIS OF THE REGISTRATION AND ENFORCEMENT OF FOREIGN JUDGMENTS IN NIGERIA
A SYNOPSIS OF THE REGISTRATION AND ENFORCEMENT OF FOREIGN JUDGMENTS IN NIGERIA
 
How to Improve Social Media Marketing - Becky Schroeder
How to Improve Social Media Marketing - Becky SchroederHow to Improve Social Media Marketing - Becky Schroeder
How to Improve Social Media Marketing - Becky Schroeder
 
ve4f5
ve4f5ve4f5
ve4f5
 
IFPRI- ASTI-NAARM Brief Background of ASTI- Dr PK Joshi
IFPRI- ASTI-NAARM Brief Background of ASTI- Dr PK JoshiIFPRI- ASTI-NAARM Brief Background of ASTI- Dr PK Joshi
IFPRI- ASTI-NAARM Brief Background of ASTI- Dr PK Joshi
 
Anatomía muscular
Anatomía muscularAnatomía muscular
Anatomía muscular
 
HFCL_Certificate
HFCL_CertificateHFCL_Certificate
HFCL_Certificate
 
Signed, Sealed, Delivered: Getting Your Emails Into Inboxes
Signed, Sealed, Delivered: Getting Your Emails Into InboxesSigned, Sealed, Delivered: Getting Your Emails Into Inboxes
Signed, Sealed, Delivered: Getting Your Emails Into Inboxes
 
提 言 自治体データ及び医療データ連係と個人情報保護法制の問題点 個人情報保護法制2000個問題の立法的解決に向けて
提 言 自治体データ及び医療データ連係と個人情報保護法制の問題点 個人情報保護法制2000個問題の立法的解決に向けて提 言 自治体データ及び医療データ連係と個人情報保護法制の問題点 個人情報保護法制2000個問題の立法的解決に向けて
提 言 自治体データ及び医療データ連係と個人情報保護法制の問題点 個人情報保護法制2000個問題の立法的解決に向けて
 
Taller 1 grado 11
Taller 1 grado 11Taller 1 grado 11
Taller 1 grado 11
 
7 Penyakit Kelapa Sawit Eksotik
7 Penyakit Kelapa Sawit Eksotik7 Penyakit Kelapa Sawit Eksotik
7 Penyakit Kelapa Sawit Eksotik
 
Lower limb bones-joints-muscles-Dr.B.B.Gosai
Lower limb bones-joints-muscles-Dr.B.B.GosaiLower limb bones-joints-muscles-Dr.B.B.Gosai
Lower limb bones-joints-muscles-Dr.B.B.Gosai
 
Air Pollution (slide presentation)
Air Pollution (slide presentation)Air Pollution (slide presentation)
Air Pollution (slide presentation)
 
Automated Plant Watering System
Automated Plant Watering SystemAutomated Plant Watering System
Automated Plant Watering System
 
Administrative law pratik
Administrative law pratikAdministrative law pratik
Administrative law pratik
 
How to add FB post links for a FB campaign on Blogmint?
How to add FB post links for a FB campaign on Blogmint?How to add FB post links for a FB campaign on Blogmint?
How to add FB post links for a FB campaign on Blogmint?
 
Εγχειρίδιο Ηλεκτρονικών Τσιγάρων
Εγχειρίδιο Ηλεκτρονικών ΤσιγάρωνΕγχειρίδιο Ηλεκτρονικών Τσιγάρων
Εγχειρίδιο Ηλεκτρονικών Τσιγάρων
 

Similar to Security Features and Securing Your Data in TurboRater and InsurancePro - Kelly Grisham, ITC

Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
Courion Corporation
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101HaroldCo
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Adeel Younas
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ncell
 
Secure End User
Secure End UserSecure End User
Secure End User
Muhammad Salahuddien
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
Rahul Nayan
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
MohammedYaseen638128
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
Identity theft
Identity theftIdentity theft
Identity theft
SARASWATHI S
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
Nordic Backup
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
jayceewong1
 
Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!
Craig Rispin
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
Brian Pichman
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
Ben Rothke
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
BarakaMuyengi
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
Deepak John
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
WeSecureApp
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
QuiMo3
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
Kevin Fream
 

Similar to Security Features and Securing Your Data in TurboRater and InsurancePro - Kelly Grisham, ITC (20)

Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 

More from Insurance Technologies Corporation (ITC)

Emerling Agency Case Study
Emerling Agency Case StudyEmerling Agency Case Study
Emerling Agency Case Study
Insurance Technologies Corporation (ITC)
 
How to Get Started with a New Website Redesign
How to Get Started with a New Website RedesignHow to Get Started with a New Website Redesign
How to Get Started with a New Website Redesign
Insurance Technologies Corporation (ITC)
 
Test Your Way to Success: Optimize Your Agency's Email Marketing
Test Your Way to Success: Optimize Your Agency's Email MarketingTest Your Way to Success: Optimize Your Agency's Email Marketing
Test Your Way to Success: Optimize Your Agency's Email Marketing
Insurance Technologies Corporation (ITC)
 
Stay on Track: Strategic Benchmarking For Digital Marketing
Stay on Track: Strategic Benchmarking For Digital MarketingStay on Track: Strategic Benchmarking For Digital Marketing
Stay on Track: Strategic Benchmarking For Digital Marketing
Insurance Technologies Corporation (ITC)
 
Stay on Track: Strategic Benchmarking for Search Marketing
Stay on Track: Strategic Benchmarking for Search MarketingStay on Track: Strategic Benchmarking for Search Marketing
Stay on Track: Strategic Benchmarking for Search Marketing
Insurance Technologies Corporation (ITC)
 
Ready for Takeoff: How Landing Pages Can Boost your Insurance Website Leads
Ready for Takeoff: How Landing Pages Can Boost your Insurance Website LeadsReady for Takeoff: How Landing Pages Can Boost your Insurance Website Leads
Ready for Takeoff: How Landing Pages Can Boost your Insurance Website Leads
Insurance Technologies Corporation (ITC)
 
SEO in 2019...and Beyond!
SEO in 2019...and Beyond!SEO in 2019...and Beyond!
SEO in 2019...and Beyond!
Insurance Technologies Corporation (ITC)
 
Email Service Quirks and How to Get Around Them
Email Service Quirks and How to Get Around ThemEmail Service Quirks and How to Get Around Them
Email Service Quirks and How to Get Around Them
Insurance Technologies Corporation (ITC)
 
ITC AgencyBuzz
ITC AgencyBuzzITC AgencyBuzz
Answering Your Top 10 FAQs About Insurance Website Design
Answering Your Top 10 FAQs About Insurance Website DesignAnswering Your Top 10 FAQs About Insurance Website Design
Answering Your Top 10 FAQs About Insurance Website Design
Insurance Technologies Corporation (ITC)
 
How to Write the Perfect Insurance Email
How to Write the Perfect Insurance EmailHow to Write the Perfect Insurance Email
How to Write the Perfect Insurance Email
Insurance Technologies Corporation (ITC)
 
Blogging Your Way to Local SEO Success
Blogging Your Way to Local SEO SuccessBlogging Your Way to Local SEO Success
Blogging Your Way to Local SEO Success
Insurance Technologies Corporation (ITC)
 
Common Misconceptions About Email Marketing
Common Misconceptions About Email MarketingCommon Misconceptions About Email Marketing
Common Misconceptions About Email Marketing
Insurance Technologies Corporation (ITC)
 
Search Marketing For The Short And Long Term
Search Marketing For The Short And Long TermSearch Marketing For The Short And Long Term
Search Marketing For The Short And Long Term
Insurance Technologies Corporation (ITC)
 
Using the 5 Ws to Create a Successful Email Marketing Strategy
Using the 5 Ws to Create a Successful Email Marketing StrategyUsing the 5 Ws to Create a Successful Email Marketing Strategy
Using the 5 Ws to Create a Successful Email Marketing Strategy
Insurance Technologies Corporation (ITC)
 
Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects
Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects
Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects
Insurance Technologies Corporation (ITC)
 
All Sky, No Net: How Agencies Can Survive Automation
All Sky, No Net: How Agencies Can Survive AutomationAll Sky, No Net: How Agencies Can Survive Automation
All Sky, No Net: How Agencies Can Survive Automation
Insurance Technologies Corporation (ITC)
 
How to Turn Your Website into a Lead Generator
How to Turn Your Website into a Lead GeneratorHow to Turn Your Website into a Lead Generator
How to Turn Your Website into a Lead Generator
Insurance Technologies Corporation (ITC)
 
10 Email Marketing Feaux Pas You're Probably Making
10 Email Marketing Feaux Pas You're Probably Making10 Email Marketing Feaux Pas You're Probably Making
10 Email Marketing Feaux Pas You're Probably Making
Insurance Technologies Corporation (ITC)
 
Think Like a Marketer: Marketing Ideation for Insurance Agents
Think Like a Marketer: Marketing Ideation for Insurance AgentsThink Like a Marketer: Marketing Ideation for Insurance Agents
Think Like a Marketer: Marketing Ideation for Insurance Agents
Insurance Technologies Corporation (ITC)
 

More from Insurance Technologies Corporation (ITC) (20)

Emerling Agency Case Study
Emerling Agency Case StudyEmerling Agency Case Study
Emerling Agency Case Study
 
How to Get Started with a New Website Redesign
How to Get Started with a New Website RedesignHow to Get Started with a New Website Redesign
How to Get Started with a New Website Redesign
 
Test Your Way to Success: Optimize Your Agency's Email Marketing
Test Your Way to Success: Optimize Your Agency's Email MarketingTest Your Way to Success: Optimize Your Agency's Email Marketing
Test Your Way to Success: Optimize Your Agency's Email Marketing
 
Stay on Track: Strategic Benchmarking For Digital Marketing
Stay on Track: Strategic Benchmarking For Digital MarketingStay on Track: Strategic Benchmarking For Digital Marketing
Stay on Track: Strategic Benchmarking For Digital Marketing
 
Stay on Track: Strategic Benchmarking for Search Marketing
Stay on Track: Strategic Benchmarking for Search MarketingStay on Track: Strategic Benchmarking for Search Marketing
Stay on Track: Strategic Benchmarking for Search Marketing
 
Ready for Takeoff: How Landing Pages Can Boost your Insurance Website Leads
Ready for Takeoff: How Landing Pages Can Boost your Insurance Website LeadsReady for Takeoff: How Landing Pages Can Boost your Insurance Website Leads
Ready for Takeoff: How Landing Pages Can Boost your Insurance Website Leads
 
SEO in 2019...and Beyond!
SEO in 2019...and Beyond!SEO in 2019...and Beyond!
SEO in 2019...and Beyond!
 
Email Service Quirks and How to Get Around Them
Email Service Quirks and How to Get Around ThemEmail Service Quirks and How to Get Around Them
Email Service Quirks and How to Get Around Them
 
ITC AgencyBuzz
ITC AgencyBuzzITC AgencyBuzz
ITC AgencyBuzz
 
Answering Your Top 10 FAQs About Insurance Website Design
Answering Your Top 10 FAQs About Insurance Website DesignAnswering Your Top 10 FAQs About Insurance Website Design
Answering Your Top 10 FAQs About Insurance Website Design
 
How to Write the Perfect Insurance Email
How to Write the Perfect Insurance EmailHow to Write the Perfect Insurance Email
How to Write the Perfect Insurance Email
 
Blogging Your Way to Local SEO Success
Blogging Your Way to Local SEO SuccessBlogging Your Way to Local SEO Success
Blogging Your Way to Local SEO Success
 
Common Misconceptions About Email Marketing
Common Misconceptions About Email MarketingCommon Misconceptions About Email Marketing
Common Misconceptions About Email Marketing
 
Search Marketing For The Short And Long Term
Search Marketing For The Short And Long TermSearch Marketing For The Short And Long Term
Search Marketing For The Short And Long Term
 
Using the 5 Ws to Create a Successful Email Marketing Strategy
Using the 5 Ws to Create a Successful Email Marketing StrategyUsing the 5 Ws to Create a Successful Email Marketing Strategy
Using the 5 Ws to Create a Successful Email Marketing Strategy
 
Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects
Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects
Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects
 
All Sky, No Net: How Agencies Can Survive Automation
All Sky, No Net: How Agencies Can Survive AutomationAll Sky, No Net: How Agencies Can Survive Automation
All Sky, No Net: How Agencies Can Survive Automation
 
How to Turn Your Website into a Lead Generator
How to Turn Your Website into a Lead GeneratorHow to Turn Your Website into a Lead Generator
How to Turn Your Website into a Lead Generator
 
10 Email Marketing Feaux Pas You're Probably Making
10 Email Marketing Feaux Pas You're Probably Making10 Email Marketing Feaux Pas You're Probably Making
10 Email Marketing Feaux Pas You're Probably Making
 
Think Like a Marketer: Marketing Ideation for Insurance Agents
Think Like a Marketer: Marketing Ideation for Insurance AgentsThink Like a Marketer: Marketing Ideation for Insurance Agents
Think Like a Marketer: Marketing Ideation for Insurance Agents
 

Recently uploaded

Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
Jim Smith
 
Protected Workmen required today for growth
Protected Workmen required today for growthProtected Workmen required today for growth
Protected Workmen required today for growth
rivaraj2711
 
Founder-Game Director Workshop (Session 1)
Founder-Game Director  Workshop (Session 1)Founder-Game Director  Workshop (Session 1)
Founder-Game Director Workshop (Session 1)
Amir H. Fassihi
 
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish GermanCV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
EUS+ Management & Consulting Excellence
 
W.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest ExperienceW.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest Experience
William (Bill) H. Bender, FCSI
 
TCS AI for Business Study – Key Findings
TCS AI for Business Study – Key FindingsTCS AI for Business Study – Key Findings
TCS AI for Business Study – Key Findings
Tata Consultancy Services
 
Training- integrated management system (iso)
Training- integrated management system (iso)Training- integrated management system (iso)
Training- integrated management system (iso)
akaash13
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
Muhammad Adil Jamil
 
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
tdt5v4b
 
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
tdt5v4b
 
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
tdt5v4b
 
Case Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of ManagementCase Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of Management
A. F. M. Rubayat-Ul Jannat
 
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
William (Bill) H. Bender, FCSI
 
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
gcljeuzdu
 
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
tdt5v4b
 
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
juniourjohnstone
 

Recently uploaded (16)

Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
 
Protected Workmen required today for growth
Protected Workmen required today for growthProtected Workmen required today for growth
Protected Workmen required today for growth
 
Founder-Game Director Workshop (Session 1)
Founder-Game Director  Workshop (Session 1)Founder-Game Director  Workshop (Session 1)
Founder-Game Director Workshop (Session 1)
 
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish GermanCV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
 
W.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest ExperienceW.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest Experience
 
TCS AI for Business Study – Key Findings
TCS AI for Business Study – Key FindingsTCS AI for Business Study – Key Findings
TCS AI for Business Study – Key Findings
 
Training- integrated management system (iso)
Training- integrated management system (iso)Training- integrated management system (iso)
Training- integrated management system (iso)
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
 
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
 
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
 
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
 
Case Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of ManagementCase Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of Management
 
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
 
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
 
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
 
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
 

Security Features and Securing Your Data in TurboRater and InsurancePro - Kelly Grisham, ITC

  • 1. Security Features and Securing Your Data Kelly Grisham Training Director
  • 2. Are You Protecting Your Agency? Most ALL agencies keep sensitive personal information in their files. Customer Information Drivers License #s Social Security #s Credit Card #s Dec Pages Agency Financials Business Plans
  • 3. Data Protection If sensitive data falls into the wrong hands, it can lead to: fraud, identity theft, or similar harms. Given the cost of a security breach, losing your clients’ trust and perhaps even defending yourself against a lawsuit, protecting personal information is just plain good business!
  • 5. Hackers Do NOT give out your computer username and password to anyone.
  • 6. Be Cautious …of using someone else’s computer. You don’t know what they have on their computer or if they have anything on there that is not safe.
  • 7. Data Breach Don’t leave anything lying around. Put paperwork in a locked drawer or cabinet. Scan paperwork into your agency management system, and then shred it.
  • 8. Lock It If not, someone can…. Access your email See your messages and steal information Send messages in your name See and send files
  • 9. Passwords Setting Up Your Passwords Always use hard-to- guess Passwords Make sure you use unique Passwords Protecting Yourself with Passwords Password protect any confidential files on… Computer Mobile device USB
  • 10. Cyber Criminals Do NOT open links in an email from someone you don’t know or trust.  Do you really think there is someone in Nigeria that wants to give you $50 million?  Do you really think you can purchase Oakley sunglasses for $5?  Do you really think they found a cure for cancer? Cyber criminals send you these links to get you to click on them and direct you to a website, where they can automatically install a virus on your machine and steal your information.
  • 11. Don’t Plug It In Do not plug your mobile device into your computer without the okay from IT. The mobile device might have a virus on it that you are uploading to the computer. Also, the mobile device can download files from the computer to the device, and you need to make sure the files are encrypted beforehand. In case the device falls into the wrong hands, no harm is done if everything is safe and encrypted.
  • 12. Be Careful What You Install Don’t install unauthorized programs on to your computer. Malware and bugs can be installed with applications you install. You and your computer could potentially be at risk for the bad guys to access your computer and steal your data. IT wants to make sure that you install safe and secure applications on your computer.
  • 13. Have a Watchful Eye • Be aware of suspicious activity • Someone in or around your office that you don’t know? • Report anything you see • Contact management or proper authorities • Protect your agency
  • 14. What is Your Security Plan?
  • 15. 5 Key Principles 1. Take stock. Know what personal information you have in your files and on your computers. 2. Scale down. Keep only what you need for your business. 3. Lock it. Protect the information that you keep. 4. Shred it. Properly dispose of what you no longer need. 5. Plan ahead. Create a plan to respond to security incidents.
  • 16. Choose Business Partners With Care! Partner with companies that take equal or greater care with data, as your agency does.
  • 17. TurboRater’s Security Features TurboRater offers security features on the: User level Location level Agency level
  • 18. TurboRater’s Security Features TurboRater requires you set up users with a login ID and password Create login ID and password for each user Password is encrypted
  • 19. TurboRater’s Security Features Permission Levels: You choose what you want your users having access to inside TurboRater.
  • 21. IP Address Restrictions YOU decide when they access TurboRater
  • 22. Show Clients You Care About Their Privacy
  • 24. InsurancePro’s Security Features Create login ID and password for each user Password is encrypted
  • 25. InsurancePro’s Security Features User Permissions Restrict Users from areas they don’t need access to Everyone does not need to be an Administrator
  • 26. Go Paperless Scan everything into a secured agency management system Shred documents afterwards
  • 27. It’s cheaper in the long run to invest in better data security… …than to lose the goodwill of your clients, defend yourself in legal actions, and face other possible consequences of a data breach.
  • 28. Thank You Don’t forget to fill out your surveys! Kelly Grisham Training Director

Editor's Notes

  1. A lot of companies have lost sensitive personal information…and some of the biggest causes were internal errors and other things the company could potentially control
  2. If you ever get a phone call from someone, claiming to be your IT Dept, asking for your Computer UserName and Password, you are probably talking to a Hacker Same thing with email, do not ever give it out.
  3. Is it too good, to be true?