Insurance professionals should be concerned about the growing phenomenon of cyber-security breaches and the impact on the businesses they represent as well as the impact on their own data.
Cyber security is an escalating concern facing companies throughout the world due to increased network failures, breaches in security and outside attacks. Regardless of the cause, businesses that maintain databases housing private customer information must review risk strategies to mitigate breaches and prepare for the very real possibility that a breach ultimately will occur.
Preparations should include three distinct areas: improved technology security, financial protection and mitigation and rebuilding trust through effective communications.
|Improved technology security
In a January 2016 survey conducted by VansonBourne, an independent technology market research provider that surveyed 500 CIO respondents from the U.S., the UK, France and Germany, cyber security investments for 2016 exceeded $83 million. Still, nearly 87 percent of CIOs believe their cyber security attempts are failing to protect business interests. What is the cause? Today's technology has increasing dependence on the use of mobile devices and storage solutions such as cloud-based software, with security measures based on keys and certificates. Through these keys and certificates, hackers gain access.
Recommended For You
Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader
Your access to unlimited PropertyCasualty360 content isn’t changing.
Once you are an ALM digital member, you’ll receive:
- Breaking insurance news and analysis, on-site and via our newsletters and custom alerts
- Weekly Insurance Speak podcast featuring exclusive interviews with industry leaders
- Educational webcasts, white papers, and ebooks from industry thought leaders
- Critical converage of the employee benefits and financial advisory markets on our other ALM sites, BenefitsPRO and ThinkAdvisor
Already have an account? Sign In Now
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.