Thursday Apr 27, 2023
Cybersecurity Best Practices for Insurance Agents
Cybersecurity threats are on the rise. It's vital to not only keep your data protected, but as an insurance agent you have the responsibility to protect your clients' data. Find out best practices for internet safety by listening to this episode.
Email us at ASGPodcast@Ritterim.com
Follow Us on Social!
Ritter on Facebook, https://www.facebook.com/RitterIM Instagram, https://www.instagram.com/ritter.insurance.marketing/ LinkedIn, https://www.linkedin.com/company/ritter-insurance-marketing TikTok, https://www.tiktok.com/@ritterim Twitter, https://twitter.com/RitterIM and Youtube, https://www.youtube.com/user/RitterInsurance
Sarah on LinkedIn, https://www.linkedin.com/in/sjrueppel/ and Instagram, https://www.instagram.com/thesarahjrueppel/
Tina on LinkedIn, https://www.linkedin.com/in/tina-lamoreux-6384b7199/
Resources:
5 Basic Care Tips for Your Electronic Devices: https://agentsurvivalguide.podbean.com/e/5-basic-care-tips-for-your-electronic-devices/
Agent Apps | Protect Your Privacy - Password Manager Apps: https://agentsurvivalguide.podbean.com/e/agent-apps-protect-your-privacy-password-manager-apps/
How to Successfully Set SMART Goals: https://agentsurvivalguide.podbean.com/e/how-to-successfully-set-smart-goals-1639071365/
What Are Insurance Agents Responsible for Under HIPAA: https://agentsurvivalguide.podbean.com/e/what-are-insurance-agents-responsible-for-under-hipaa-1637595382/
Why We Added Multi-Factor Authentication to Ritter Logins: https://www.ritterim.com/blog/why-we-added-multi-factor-authentication-to-ritter-logins/
References:
10 Things to Do if Your Identity Is Stolen: https://money.usnews.com/money/personal-finance/family-finance/articles/things-to-do-after-your-identity-is-stolen
Anti Malware Software Program – What is it? https://www.digitaldefense.com/blog/anti-malware-software-program-what-is-it-digital-defense/
Best Identity Theft Protection Services of 2023: https://www.usnews.com/360-reviews/privacy/identity-theft-protection
Confronting Heightened Cybersecurity Threats Amid COVID-19: https://www.cisa.gov/resources-tools/resources/confronting-heightened-cybersecurity-threats-amid-covid-19
Definition of antimalware: https://www.techtarget.com/searchsecurity/definition/antimalware
“End-of-Life”/ “EOL”, “Unsupported”, and “Out of Support” – What Does it All Mean? https://thecomputercellar.com/unsupported/
HHS Strengthens HIPAA Enforcement: https://wayback.archive-it.org/3926/20131018161347/http:/www.hhs.gov/news/press/2009pres/10/20091030a.html
How long does it take to correct identity theft? https://www.allstateidentityprotection.com/content-hub/how-long-does-it-take-to-correct-identity-theft
Multi-Factor Authentication: https://www.cisa.gov/sites/default/files/publications/MFA-Fact-Sheet-Jan22
The HIPAA Privacy Rule: https://www.hhs.gov/hipaa/for-professionals/privacy/index.html
The HIPAA Security Rule: https://www.hhs.gov/hipaa/for-professionals/security/index.html
Omnibus HIPAA Rulemaking: https://www.hhs.gov/hipaa/for-professionals/privacy/laws-regulations/combined-regulation-text/omnibus-hipaa-rulemaking/index.html
Senior scam statistics 2023: https://www.comparitech.com/identity-theft-protection/senior-scam-statistics/
Tip Sheet - Protected Health Information and Personal Identifying Information: https://ora.research.ucla.edu/OHRPP/Documents/Policy/6/PHI_PII.pdf
What hackers actually do with your stolen medical records: https://www.advisory.com/daily-briefing/2019/03/01/hackers
What is a phishing attack: https://www.imperva.com/learn/application-security/phishing-attack-scam/
What is Malware? The Ultimate Guide to Malware: https://www.avg.com/en/signal/what-is-malware
What is the Deep and Dark Web? https://www.kaspersky.com/resource-center/threats/deep-web
What is a VPN? How It Works, Types of VPN: https://www.kaspersky.com/resource-center/definitions/what-is-a-vpn
Why is PHI Valuable to Criminals? https://compliancy-group.com/why-is-phi-valuable-to-criminals/
Why is PHI Valuable to Hackers? https://www.accountablehq.com/post/why-is-phi-valuable-to-hackers
Comments (0)
To leave or reply to comments, please download free Podbean or
No Comments
To leave or reply to comments,
please download free Podbean App.