E-mail Encryption via TLS FAQ’s

Q1 What is TLS? TLS (Transport Layer Security) is an encryption process that functions similar to SSL (i.e. https://) which is used by Internet sites to encrypt and protect transmissions…

Online correspondence concept. Top view of young lady pressing READ button on cellphone with incoming email, orange background. Unrecognizable woman getting electronic letter

Sample Agency Website Disclaimers

Agents should consult with their local counsel to customize these sample disclaimers so that they fit their websites and social media sites, are positioned at the appropriate places on the…

Adult, Business, Businessman, Computer,Search

Planning and Security

  NEW SECURITY RESOURCE FOR INDEPENDENT AGENTS Handling sensitive information is now one of the most critical responsibilities faced by the modern insurance agency. Our Agency Cyber Guide 3.0 will…

Security concept: Lock on digital screen, contrast, 3d render

Protecting Your Clients’ Most Private Information

by Jeff Yates, ACT Executive Director American citizens are becoming increasingly concerned with the privacy of their health and other personal information. Clients want to know that their agents and…

Managing the Security Risks of Portable Devices

by Jeff Yates, ACT Executive Director Laptops, Windows based portables, and smart phones allow agents and brokers to stay in touch with their customers and offices and to have access…

Different modern devices on color background

Protect Your Clients with Secure Email Using TLS

by Jim Rogers, The Hartford Email is now entrenched within business workflows and is how a significant amount of business is transacted between agents and carriers. The words shared between…

Online correspondence concept. Top view of young lady pressing READ button on cellphone with incoming email, orange background. Unrecognizable woman getting electronic letter

Agency Information Security Plan Development Materials

This Plan for Agency is intended to create effective administrative, technical, electronic and physical protections to safeguard the personal information of the Agency’s Clients and employees, the Agency’s proprietary and…

Padlock with a tablet, keyboard, mouse and other device. Internet and technology security

Protecting Agency Security Takes Center Stage

by Jeff Yates, ACT Executive Director High profile cases of identity theft have been all over the general press in recent weeks. We have seen from these cases just how…

Home insurance or mortgage protection concept with a 3D house model under a blue umbrella

The Independent Agent’s Guide to Systems Security

The world has changed for independent agents and brokers. In the past, agencies primarily had to protect the paper within the physical perimeter of their agencies. Today, most of the…