Today more than ever, preventing data security breaches is a top priority for any business. Recovering from a breach has a measurable impact on the bottom line. A 2006 study by the Ponemon Institute reported it cost companies $182 for each lost customer record in direct costs, lost productivity, and lost customer opportunity. But perhaps even greater is the damage to a company's reputation. In a survey of consumers, Ponemon found 60 percent terminated or considered terminating business with companies that notified them of mishandling their private information.
Of course, information security is nothing new to insurers, but in the past, security has focused on ways to keep people away from information and to control access to and connections between enterprise applications. Today, that model has been turned on its head.
"In the good old days, you could batten down the hatches, not allow any communication into your corporate applications, and be reasonably secure people wouldn't hack into your [core] systems. With the explosion of Web services and service-oriented architecture, corporate barriers and firewalls are like Swiss cheese as the business finds legitimate reasons to expose applications to improve efficiency and do things it couldn't do with tight integration," says Mounil Patel, vice president and research director at Aberdeen Group.
Recommended For You
Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader
Your access to unlimited PropertyCasualty360 content isn’t changing.
Once you are an ALM digital member, you’ll receive:
- Breaking insurance news and analysis, on-site and via our newsletters and custom alerts
- Weekly Insurance Speak podcast featuring exclusive interviews with industry leaders
- Educational webcasts, white papers, and ebooks from industry thought leaders
- Critical converage of the employee benefits and financial advisory markets on our other ALM sites, BenefitsPRO and ThinkAdvisor
Already have an account? Sign In Now
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.