SignOn Once

In this June 2014 ACT article, the authors Teresa Addy and Jim Rogers share more background on SignOn Once; as an industry standard, the benefits, and guidance for carrier and…

Combat Cybercrime and Protect Your Agency With Simple Security Steps

What is Cybercrime? Like traditional crime, cybercrime covers a broad scope of criminal activity and can occur anytime and anyplace. What makes it different is that the crime is committed…

Padlock with a tablet, keyboard, mouse and other device. Internet and technology security

“Bring Your Own Device” Opportunities & Risks

By Danielle Johnson, Director of IT, InsurBanc The consumerization of IT revolution — sparked by the iPhone — has shifted the IT culture so that the users are the ones…

smart house, home automation, device with app icons. Man uses his smartphone with smarthome security app to unlock the door of his house.

Agency Strategies to Send & Receive Personal Data Securely

By Jeff Yates, ACT Executive Director The Internet and mobility revolutions have enabled agents and their clients to live in an electronic world where the parties can work and communicate…

Businessmen work with stock market investments using smartphone to analyze trading data. smartphone with stock exchange graph on screen. Financial stock market.

Protecting Agency Customer Information from Identity Theft

by Bill Murray, CISSP IT Risk, Security & Compliance Manager Westfield Group Highlights of Report The federal Gramm-Leach-Bliley Act requires independent agencies and brokers to proactively implement administrative, technical, and…

Agency E&O Considerations When Using Social Media

by Sabrena Sally, CPCU Not a day goes by without my email containing an invitation to join a social networking site. Whether used for business contacts, maintaining contact with friends…

Don’t Get Caught in the Web!

by Sabrena Sally, CPCU Over 40% of agencies insured through the IIABA-Swiss Re E&O program now have their own website, having grown from 19% in 2006. Having a good website,…

Insurance Agents Fined for Not Having Written Security Plans

by Jeff Yates, ACT Executive Director Recent headlines have underscored the importance of agents having written security plans to protect the privacy of their clients’ personal information. Not only could…

Open the right lock with a key. Get access, reveal secrets. Discover new knowledge and wisdom. Authentication. Successful attempt. Achieve the goal, resolve task. Find a solution, solve a problem.

Specific Carrier TLS Email Encryption Information

The matrix below lists insurance carriers that have reported to ACT that they support TLS email encryption for their agencies provided the agency has also enabled TLS on their mail…

Online correspondence concept. Top view of young lady pressing READ button on cellphone with incoming email, orange background. Unrecognizable woman getting electronic letter