SlideShare a Scribd company logo
1 of 11
Download to read offline
1
Cyber Security
and Data Protection
2
Cyber Security
and
Data Protection
A recent Insurance Business America article reported 80 percent of businesses will
experience a data security breach within 12 months. A breach can cause a loss
of data, identity theft, and potential lawsuits that can hurt the business, its clients,
and employees. Like any company, your independent insurance agency is just as
vulnerable to such risks, meaning you must take steps to prevent and minimize the
effects of cyber threats.
This eGuide explores the common cyber security threats and how to protect your
business and customers. Throughout the guide, we’ll hear from some experienced
agency owners about their cyber security concerns and how they keep their
agencies and customers safe.
 
80%
of businesses will
experience a data
security breach
within 12 months
3
CONTENTS
Cyber Security Basics..............................................................................4
Protecting Your Agency...........................................................................5
First Steps...............................................................................................6
Protecting Your Customers......................................................................8
Staying Informed...................................................................................10
4
Cyber Security
Basics
Cyber security is becoming increasingly relevant within the insurance industry
to the degree, that the National Association of Insurance Commissioners (NAIC)
named it as the key initiative for 2015.
Cyber security is about protecting your agency from digital threats that may
harm your data, exposing you and your customers.
	 The largest threats to your agency deal with losing or 		
compromising data, including:
1. 	 Viruses infecting your computer system and destroying data
2. 	 Hackers accessing your systems and stealing personal records
3. 	 Employees negligence such as leaving systems open or losing laptops,
tablets, and other mobile devices
“We worry most about people
hacking into our system. Criminals
are at work day and night to access
personal data (for identity theft).”
Leslie Huesman,
Huesman Insurance Group
5
Protecting
Your Agency
There are a few initial steps you can take to ward against these
cyber threats.
n	 Keep your virus protection up to date
n	 Educate employees on good data security practices
n	 Employ multiple individuals to monitor threats
n	 Outsource data security management for constant vigilance
n	 Purchase liability coverage for your agency
n	 Keep up to date on the latest agency practices and trends
	 in cyber security
Steve Kramer,
Kramer Insurance
“Our biggest risk is our people. We need to educate our staff and
agents on how to handle (personal information). We worry about
anyone being lax when it comes to handling such data.”
6
First
Steps
Feeling overwhelmed already? Take a step back! Although it is important that your
agency address these issues of cyber security and data protection, you don’t need to do
everything all at once. Start out by focusing on these three key action items:
CREATE CHECKLISTS, GUIDELINES, AND
REGULATIONS FOR EMPLOYEES: Insist on
passwords for all devices used to access your system.
Don’t allow employees to download personal data
without encrypting files and limit who is allowed to
download. Have all emails containing sensitive data
encrypted as well. Finally, discourage staff from
accessing your agency’s system on public WiFi as this
increases vulnerability to hacking.
7
INVEST IN SECURE BACKUPS: Ensure all
your agency’s data is protected by backing up
your system frequently and storing it at an off-site
location. Use an outside vendor, ideally your agency
management system provider, to store your data.
They’ll have the infrastructure and heightened
security needed to keep such a large amount of
personal information safe.
PURCHASE CYBER INSURANCE: Cyber
insurance helps keep your agency protected
should a data breach occur, including covering
government-mandated notification and reparations
for those affected.
“(You) need to set up preventative items. We want everybody to
have security in place (in their agency), meaning encrypting data and using secure passwords. Our biggest asset
is our data, so that data needs to be backed up and protected against computer meltdowns, too.”
Larry Harb,
IT Risk Managers, Inc.
8
Protecting
Your Customers
Your agency has a responsibility to not only protect your digital assets, but to offer
protection to your customers as well. Cyber liability insurance coverage protects
your customers from such threats. As an independent insurance agency owner,
it’s in your best interest to provide such coverage for your commercial customers.
Coverage points for cyber liability insurance include:
n	 Regulatory Coverage – Focuses on costs associated with lawsuits or fines
against a business. This includes the cost of a defense lawyer and court fees.
n	 E & O Coverage – Pertains to a failure in preventing data breaches, including
storing unencrypted data or not using a firewall. Such coverage can also be a
part of general, non-cyber specific E & O coverage.
n	 Notification Coverage – Most states now require businesses to notify
customers of cyber breaches and this point of coverage identifies the number
of customers to be notified and the methods of notification.
9
n	 Data Restoration Coverage – Covers the cost of recovering
damaged or lost data. Points of coverage may include
replacing hardware or software, restoration, and replacement of
other electronic assets.
n	 Crisis Coverage – Addresses the PR aspects of data loss. It
covers everything from managing media relations to providing
affected customers with credit monitoring.
n	 Liability and Slander Converge – Pertains to online incidents
of slander, liable, copyright infringement, or other reputational
damage done by those representing a specific business.
“There are two important parts (in cyber liability coverage): first is the
money to pay for the damage to customers, second is providing our clients
with a quarterback to run the show. This person helps our clients through
the process of notification and meeting all requirements of a company that
has had a data breach.”
Leslie Huesman,
Huesman Insurance Group
10
Staying
Informed
As technology continues to grow and evolve, more vulnerabilities
will be uncovered. It’s important for you and your agency to stay
informed on new cyber security threats and methods to protect
your data. We at SIS know this growing need for cyber security
and are committed to keeping our clients prepared, which includes
attending industry conferences and hosting sessions on the topic.
Find out more about how SIS is staying ahead of the curve on our
website or by contacting us today at sales@sisware.com.
11
About SIS
Headquartered in Columbus, Ohio, Strategic Insurance Software
(SIS) is the team behind Partner XE—an innovative web-based
insurance agency management system that helps independent
agencies streamline workflow and grow their business. Built on
a foundation of strong technology and exceptional service, we’re
moving forward with a constant eye on innovation that will make
independent agents’ lives easier.
About Partner XE
Supporting downloads from nearly 300 carriers, real time interaction,
integrated agency accounting, and much more, Partner XE is a full-
featured agency management system at an affordable cost for the
independent insurance agency. For more information, please visit
www.sisware.com.
4181 Arlingate Plaza, Columbus, Ohio 43228
800.747.9273 | www.sisware.com

More Related Content

What's hot

Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationRitik Kumar
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyePrime Infoserv
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxAbimbolaFisher1
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness Net at Work
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsLearningwithRayYT
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Information security
Information securityInformation security
Information security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
NTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in DepthNTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in Depth
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 

Viewers also liked

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Holding private data: data protection regulation & insurance coverage issues
Holding private data: data protection regulation & insurance coverage issuesHolding private data: data protection regulation & insurance coverage issues
Holding private data: data protection regulation & insurance coverage issuesFERMA
 
Data security and cyber risks - In house lawyers forum 2013, Richard Nicholas
Data security and cyber risks - In house lawyers forum 2013, Richard NicholasData security and cyber risks - In house lawyers forum 2013, Richard Nicholas
Data security and cyber risks - In house lawyers forum 2013, Richard NicholasBrowne Jacobson LLP
 
Protect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/ReputationProtect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/ReputationPa Al
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistMatthew Rosenquist
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 

Viewers also liked (8)

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Holding private data: data protection regulation & insurance coverage issues
Holding private data: data protection regulation & insurance coverage issuesHolding private data: data protection regulation & insurance coverage issues
Holding private data: data protection regulation & insurance coverage issues
 
Data security and cyber risks - In house lawyers forum 2013, Richard Nicholas
Data security and cyber risks - In house lawyers forum 2013, Richard NicholasData security and cyber risks - In house lawyers forum 2013, Richard Nicholas
Data security and cyber risks - In house lawyers forum 2013, Richard Nicholas
 
Protect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/ReputationProtect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/Reputation
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Cyber Security and Data Protection

Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceNational Retail Federation
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!topseowebmaster
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals Richard Brzakala
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber InsuranceJohn Ryan
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessMeg Weber
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowShantam Goel
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guidelarry1401
 
The impact of a security breach on MSP's and their clients
The impact of a security breach on MSP's and their clientsThe impact of a security breach on MSP's and their clients
The impact of a security breach on MSP's and their clientsJose Lopez
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideInspiring Women
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustGrant Thornton LLP
 
Understanding Website Data Security And Its Importance.pdf
Understanding Website Data Security And Its Importance.pdfUnderstanding Website Data Security And Its Importance.pdf
Understanding Website Data Security And Its Importance.pdfEracom Technologies
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
How to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfHow to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfMr. Business Magazine
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingDanielle Bowers
 

Similar to Cyber Security and Data Protection (20)

Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber Insurance
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
 
The impact of a security breach on MSP's and their clients
The impact of a security breach on MSP's and their clientsThe impact of a security breach on MSP's and their clients
The impact of a security breach on MSP's and their clients
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
 
Understanding Website Data Security And Its Importance.pdf
Understanding Website Data Security And Its Importance.pdfUnderstanding Website Data Security And Its Importance.pdf
Understanding Website Data Security And Its Importance.pdf
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
How to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfHow to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdf
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
 

More from Strategic Insurance Software

9 Things to Look for in an Agency Management System
9 Things to Look for in an Agency Management System9 Things to Look for in an Agency Management System
9 Things to Look for in an Agency Management SystemStrategic Insurance Software
 
Key Strategies for Hiring & Retaining Top Talent for your Independent Insuran...
Key Strategies for Hiring & Retaining Top Talent for your Independent Insuran...Key Strategies for Hiring & Retaining Top Talent for your Independent Insuran...
Key Strategies for Hiring & Retaining Top Talent for your Independent Insuran...Strategic Insurance Software
 
Cracking the Productivity Guide: Habits to Increase Email Productivity
Cracking the Productivity Guide: Habits to Increase Email Productivity Cracking the Productivity Guide: Habits to Increase Email Productivity
Cracking the Productivity Guide: Habits to Increase Email Productivity Strategic Insurance Software
 
Getting Your Insurance Agency Finances in Order: Accounting Tips for Independ...
Getting Your Insurance Agency Finances in Order: Accounting Tips for Independ...Getting Your Insurance Agency Finances in Order: Accounting Tips for Independ...
Getting Your Insurance Agency Finances in Order: Accounting Tips for Independ...Strategic Insurance Software
 
How to Get the Most Out of Your Agency Management System
How to Get the Most Out of Your Agency Management System How to Get the Most Out of Your Agency Management System
How to Get the Most Out of Your Agency Management System Strategic Insurance Software
 
Cloud Apps Part II: Improving Insurance Agency Communications
Cloud Apps Part II: Improving Insurance Agency CommunicationsCloud Apps Part II: Improving Insurance Agency Communications
Cloud Apps Part II: Improving Insurance Agency CommunicationsStrategic Insurance Software
 
Independent Insurance Agencies- Making the Windows XP Switch
Independent Insurance Agencies- Making the Windows XP SwitchIndependent Insurance Agencies- Making the Windows XP Switch
Independent Insurance Agencies- Making the Windows XP SwitchStrategic Insurance Software
 

More from Strategic Insurance Software (13)

9 Things to Look for in an Agency Management System
9 Things to Look for in an Agency Management System9 Things to Look for in an Agency Management System
9 Things to Look for in an Agency Management System
 
How to Choose an Agency Management System
How to Choose an Agency Management SystemHow to Choose an Agency Management System
How to Choose an Agency Management System
 
Are you the next target?
Are you the next target?Are you the next target?
Are you the next target?
 
Quick Tips to Maximize Agency Efficiency
Quick Tips to Maximize Agency Efficiency Quick Tips to Maximize Agency Efficiency
Quick Tips to Maximize Agency Efficiency
 
Harnessing the Power of Community
Harnessing the Power of CommunityHarnessing the Power of Community
Harnessing the Power of Community
 
Change Mangement
Change MangementChange Mangement
Change Mangement
 
Key Strategies for Hiring & Retaining Top Talent for your Independent Insuran...
Key Strategies for Hiring & Retaining Top Talent for your Independent Insuran...Key Strategies for Hiring & Retaining Top Talent for your Independent Insuran...
Key Strategies for Hiring & Retaining Top Talent for your Independent Insuran...
 
Cracking the Productivity Guide: Habits to Increase Email Productivity
Cracking the Productivity Guide: Habits to Increase Email Productivity Cracking the Productivity Guide: Habits to Increase Email Productivity
Cracking the Productivity Guide: Habits to Increase Email Productivity
 
Getting Your Insurance Agency Finances in Order: Accounting Tips for Independ...
Getting Your Insurance Agency Finances in Order: Accounting Tips for Independ...Getting Your Insurance Agency Finances in Order: Accounting Tips for Independ...
Getting Your Insurance Agency Finances in Order: Accounting Tips for Independ...
 
How to Get the Most Out of Your Agency Management System
How to Get the Most Out of Your Agency Management System How to Get the Most Out of Your Agency Management System
How to Get the Most Out of Your Agency Management System
 
Cloud Apps Part II: Improving Insurance Agency Communications
Cloud Apps Part II: Improving Insurance Agency CommunicationsCloud Apps Part II: Improving Insurance Agency Communications
Cloud Apps Part II: Improving Insurance Agency Communications
 
Independent Insurance Agencies- Making the Windows XP Switch
Independent Insurance Agencies- Making the Windows XP SwitchIndependent Insurance Agencies- Making the Windows XP Switch
Independent Insurance Agencies- Making the Windows XP Switch
 
Effective Insurance Marketing on a Limited Budget
Effective Insurance Marketing on a Limited BudgetEffective Insurance Marketing on a Limited Budget
Effective Insurance Marketing on a Limited Budget
 

Recently uploaded

WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Bert Jan Schrijver
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2
 
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT  - Elevating Productivity in Today's Agile EnvironmentHarnessing ChatGPT  - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT - Elevating Productivity in Today's Agile EnvironmentVictorSzoltysek
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Hararemasabamasaba
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in sowetomasabamasaba
 

Recently uploaded (20)

WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT  - Elevating Productivity in Today's Agile EnvironmentHarnessing ChatGPT  - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 

Cyber Security and Data Protection

  • 2. 2 Cyber Security and Data Protection A recent Insurance Business America article reported 80 percent of businesses will experience a data security breach within 12 months. A breach can cause a loss of data, identity theft, and potential lawsuits that can hurt the business, its clients, and employees. Like any company, your independent insurance agency is just as vulnerable to such risks, meaning you must take steps to prevent and minimize the effects of cyber threats. This eGuide explores the common cyber security threats and how to protect your business and customers. Throughout the guide, we’ll hear from some experienced agency owners about their cyber security concerns and how they keep their agencies and customers safe.   80% of businesses will experience a data security breach within 12 months
  • 3. 3 CONTENTS Cyber Security Basics..............................................................................4 Protecting Your Agency...........................................................................5 First Steps...............................................................................................6 Protecting Your Customers......................................................................8 Staying Informed...................................................................................10
  • 4. 4 Cyber Security Basics Cyber security is becoming increasingly relevant within the insurance industry to the degree, that the National Association of Insurance Commissioners (NAIC) named it as the key initiative for 2015. Cyber security is about protecting your agency from digital threats that may harm your data, exposing you and your customers. The largest threats to your agency deal with losing or compromising data, including: 1. Viruses infecting your computer system and destroying data 2. Hackers accessing your systems and stealing personal records 3. Employees negligence such as leaving systems open or losing laptops, tablets, and other mobile devices “We worry most about people hacking into our system. Criminals are at work day and night to access personal data (for identity theft).” Leslie Huesman, Huesman Insurance Group
  • 5. 5 Protecting Your Agency There are a few initial steps you can take to ward against these cyber threats. n Keep your virus protection up to date n Educate employees on good data security practices n Employ multiple individuals to monitor threats n Outsource data security management for constant vigilance n Purchase liability coverage for your agency n Keep up to date on the latest agency practices and trends in cyber security Steve Kramer, Kramer Insurance “Our biggest risk is our people. We need to educate our staff and agents on how to handle (personal information). We worry about anyone being lax when it comes to handling such data.”
  • 6. 6 First Steps Feeling overwhelmed already? Take a step back! Although it is important that your agency address these issues of cyber security and data protection, you don’t need to do everything all at once. Start out by focusing on these three key action items: CREATE CHECKLISTS, GUIDELINES, AND REGULATIONS FOR EMPLOYEES: Insist on passwords for all devices used to access your system. Don’t allow employees to download personal data without encrypting files and limit who is allowed to download. Have all emails containing sensitive data encrypted as well. Finally, discourage staff from accessing your agency’s system on public WiFi as this increases vulnerability to hacking.
  • 7. 7 INVEST IN SECURE BACKUPS: Ensure all your agency’s data is protected by backing up your system frequently and storing it at an off-site location. Use an outside vendor, ideally your agency management system provider, to store your data. They’ll have the infrastructure and heightened security needed to keep such a large amount of personal information safe. PURCHASE CYBER INSURANCE: Cyber insurance helps keep your agency protected should a data breach occur, including covering government-mandated notification and reparations for those affected. “(You) need to set up preventative items. We want everybody to have security in place (in their agency), meaning encrypting data and using secure passwords. Our biggest asset is our data, so that data needs to be backed up and protected against computer meltdowns, too.” Larry Harb, IT Risk Managers, Inc.
  • 8. 8 Protecting Your Customers Your agency has a responsibility to not only protect your digital assets, but to offer protection to your customers as well. Cyber liability insurance coverage protects your customers from such threats. As an independent insurance agency owner, it’s in your best interest to provide such coverage for your commercial customers. Coverage points for cyber liability insurance include: n Regulatory Coverage – Focuses on costs associated with lawsuits or fines against a business. This includes the cost of a defense lawyer and court fees. n E & O Coverage – Pertains to a failure in preventing data breaches, including storing unencrypted data or not using a firewall. Such coverage can also be a part of general, non-cyber specific E & O coverage. n Notification Coverage – Most states now require businesses to notify customers of cyber breaches and this point of coverage identifies the number of customers to be notified and the methods of notification.
  • 9. 9 n Data Restoration Coverage – Covers the cost of recovering damaged or lost data. Points of coverage may include replacing hardware or software, restoration, and replacement of other electronic assets. n Crisis Coverage – Addresses the PR aspects of data loss. It covers everything from managing media relations to providing affected customers with credit monitoring. n Liability and Slander Converge – Pertains to online incidents of slander, liable, copyright infringement, or other reputational damage done by those representing a specific business. “There are two important parts (in cyber liability coverage): first is the money to pay for the damage to customers, second is providing our clients with a quarterback to run the show. This person helps our clients through the process of notification and meeting all requirements of a company that has had a data breach.” Leslie Huesman, Huesman Insurance Group
  • 10. 10 Staying Informed As technology continues to grow and evolve, more vulnerabilities will be uncovered. It’s important for you and your agency to stay informed on new cyber security threats and methods to protect your data. We at SIS know this growing need for cyber security and are committed to keeping our clients prepared, which includes attending industry conferences and hosting sessions on the topic. Find out more about how SIS is staying ahead of the curve on our website or by contacting us today at sales@sisware.com.
  • 11. 11 About SIS Headquartered in Columbus, Ohio, Strategic Insurance Software (SIS) is the team behind Partner XE—an innovative web-based insurance agency management system that helps independent agencies streamline workflow and grow their business. Built on a foundation of strong technology and exceptional service, we’re moving forward with a constant eye on innovation that will make independent agents’ lives easier. About Partner XE Supporting downloads from nearly 300 carriers, real time interaction, integrated agency accounting, and much more, Partner XE is a full- featured agency management system at an affordable cost for the independent insurance agency. For more information, please visit www.sisware.com. 4181 Arlingate Plaza, Columbus, Ohio 43228 800.747.9273 | www.sisware.com