Bitcoin, Crypto, and Virtual Currencies

Industry Maturity Index: ‘Now‘, ‘Short-term‘(1-2 years) Why this is important: Bitcoin and other crypto or virtual currencies have created alternative payment methods and alternative assets. As a purely digital asset,…

golden bitcoin over yellow background, cryptocurrency concept

IoT – the Internet of Things

?IoT (Internet of Things) – Why I Should Care! Industry Maturity Index: NowShort-term‘(1-2 years), ‘Long-term’(3-7years or more) Why this is important: Changing Nature of Risk What is it? Broad Implications…

GLB – Compliance is NOT an Option

American citizens are becoming increasingly concerned with the privacy of their health and other personal information that is used, transferred, and retained by a multitude of different businesses. As a…

Work From Home

Industry Maturity Index: ‘Now‘, ‘Short-term‘(1-2 years) Why this is important: The ACT Changing Nature of Risk work group feels that the culture of work is changing and how, when, and…

Empty white laptop with abstract tiny classroom desktops on grey background. Online education and webinar concept. Mock up, 3D Rendering

2016 Agency Universe Study – Technology Summary

The 2016 Agency Universe Study – also known as the ‘AUS’ – was recently released as a collaboration between the Big ‘I’ and leading independent agency companies. This biennial study…

Cyber Liability

Industry Maturity Index: ‘Now‘ Why this is important: In the past 4-5 years, the news of data breaches, hacks, ransomware, phishing have been pervasive. The potential impact of data breaches…

Security concept: Lock on digital screen, contrast, 3d render

Cyber Security Issues for Insurance Agents – Securing Your Agency Wireless Router

With the continued usage of wireless technology, most independent agencies have incorporated wireless routers within their agency. Wireless routers allow computers to connect to the agency network to access information…

Cyber security concept. Man using computer with system hacked alert due to cyber attack on computer network. Data Protection. Internet virus cyber security and cybercrime