Experts: Airtight network security is critical

Reich-Hale, David
October 1998
National Underwriter / Life & Health Financial Services;10/26/98, Vol. 102 Issue 43, p16
Advises insurance companies to have an airtight computer network security for storing sensitive and confidential data. Types of the extremely confidential data insurance agents send after dialing into a network; Need to set up walls of protection for the network; Network security systems recommended.


Related Articles

  • Role-Based Access Secures E-Business. Murrell, Laurie // National Underwriter / Property & Casualty Risk & Benefits Manag;8/13/2001, Vol. 105 Issue 33, p15 

    Reports on the significance of a computer security platform based on role-based access control (RBAC) to maintain customer privacy and data security. Details of the functionality of RBAC; Description on the use of RBAC; Benefits of the system to insurance companies.

  • Dude, where's my data? Weicher, neil // Fairfield County Business Journal;2/6/2006, Vol. 45 Issue 6, p28 

    The author reflects on the significance and need for data security in business. He implies that best practices always focused on preventing people from getting access to the data and not on what to they once these people get access to it. The author asserts that it is about time for a cyber...

  • Remote Control. Hyle, Robert Regis // TechDecisions;Nov2004, Vol. 6 Issue 11, p8 

    Provides information on Secure Enterprise Solution, a computer network solution from Sygate Technologies Inc. that offers simple and secure remote access to reinsurance company PartnerRe. Challenges that need to be addressed by PartnerRe; Importance of hands-on training and user education to...

  • Darwin Expands Liability Product for Tech-Dependent Health Cos.  // Insurance Advocate;1/1/2007, Vol. 118 Issue 1, p11 

    The article reports on the expansion of Tech//404, a liability product for health care organizations, by Darwin Professional Underwriters Inc. in Farmington, Connecticut. According to Darwin, the expansion is in response to increasing exposure to network security and data privacy losses....

  • AIG Subsidiary Enhances Suite Of Network Security Insurance, To Address Heightened Risks.  // Insurance Advocate;5/26/2003, Vol. 114 Issue 20, p8 

    Announces the enhancement of the Net Advantage suite of network security insurance and risk management services from AIG eBusiness Risk Solutions. Provision of reimbursement for computer attack forensic; Costs of restoring an insured business; Coverage for physical theft of hardware containing...

  • Is It Really You? Hyle, Robert Regis // TechDecisions;Apr2008, Vol. 10 Issue 4, p26 

    The article focuses on network security. Carriers have made their systems Web enabled so the attention has shifted from protecting network systems locked in the information technology (IT) department providing access to agents and policyholders. With the changing technology, access to the these...

  • To Tweet or Not To Tweet -- Understanding the Risks in Social Media. HEGEL JR., KENNETH C. // Global Cosmetic Industry;Jul2011, Vol. 179 Issue 6, p56 

    The article focuses on the risk of using social media in businesses such as insurance companies. It states that there are two types of insurance exposures that are affected by social media such as the liabilities emanating to market the product and services and the association of social media to...

  • Be prepared to prevent data breach.  // Business Insurance;10/22/2012, Vol. 46 Issue 41, p0005 

    The article discusses the highlights of the "Business Insurance" webinar on effective data security strategy sponsored by OneBeacon Professional Insurance (OBPI) on October 16, 2012 . David Molitano of OBPI shared that they review both the network security issues and the company itself while...

  • AXA rolls out scanner to prioritise patches. Goodwin, Bill // Computer Weekly;11/9/2004, p16 

    The article reports that insurance company AXA UK PLC is rolling out a web-based service to allow it to make daily scans of 15,000 devices on its IT network for potentially dangerous security vulnerabilities. The company plans to use the service to improve the security of its IT systems by...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics