Resources

Disaster Planning Guide

Updated September 2024 for 2025 Distribution Click here to download the guide.

What Not to Say On The Web

Our website wording guide offers myriad examples of troublesome website phrasing and suggested replacement wording:

Your Website Says What?

This white paper provides a high-level overview of the website wording topic as well as a summary of lessons learned from each focus area of the “Your Website Says WHAT?” webinar…

Agency Website Wording: Dos and Dont’s

Our one-page topic overview is your quickest route to the most essential information on what not to do with your agency website

Quality Certificate and Checklist document inspecting target marketing planning assignment with quality management. Standardization, certification. Compliance to regulations service and standards.

2018 Agency Universe Study – Technology Summary

The Agency Universe Study (‘AUS’) is a product of Future One, a cooperative effort of the Independent Insurance Agents & Brokers of America (IIABA) and independent agency companies. The AUS…

2020 Agency Universe Study – Technology Summary

The 2020 Agency Universe Study – also known as the ‘AUS’ – was recently released as a collaboration between the Big ‘I’ and leading independent agency companies. This biennial study…

ACT Alert – Agency Hacking Security Alert

What’s Happening We know from real data that independent agents (IAs) are a prime and focused target of cyber criminals. Over 12% of all breaches are now within the Financial…

The spy gets access to the data. Threat to personal data and secret documents. Industrial and financial espionage. Confidential information leakage. Hacker hacking database. Unauthorized admission

ACT ‘Agency Cybersecurity Policy’ Template

The ACT Security Issues work group, in conjunction with IIABA created this sample cybersecurity policy to help agencies easily comply with the requirement to have a cybersecurity policy in place.…

Cyber security concept. Man using computer with system hacked alert due to cyber attack on computer network. Data Protection. Internet virus cyber security and cybercrime