SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
Data Security
and the Cloud
DATA SECURITY
AND THE CLOUDTABLE OF CONTENTS
2
CHAPTER 2	
PAGE 5
HOW DOES THE
CLOUD KEEP MY
DATA SAFE?
CHAPTER 1	
PAGE 4
DATA SECURITY:
TOO IMPORTANT
TO IGNORE
CHAPTER 3	
PAGE 6
TAKE ADVANTAGE OF
DATA CENTERS
CHAPTER 4	
PAGE 8
PROVIDE THE BEST
DATA PROTECTION
CHAPTER 5	
PAGE 9
DATA SECURITY BEST
PRACTICES
D ATA S E C U R I T Y A N D T H E C L O U D
EXECUTIVE
SUMMARY
PAGE 3
Today, stories of major data breaches have dominated
the media, from Target and Home Depot credit card
theft to health record hacking at Anthem. In this era of
Big Data, financial and personal information becomes
a target with information sold to the highest bidder.
Companies that fail to protect themselves lose money,
customers and their reputation. For all industries, data
security is a critical component of business strategy and
health. You must consider data security if any of your
employees are physically connected to the Internet
or other public data networks,regardless of size and
scope of operations. Leveraging the cloud to integrate
the latest security technology is one way to ensure
your business receives high-level data
protection. This ebook provides an
overview of data security and best
practices you can employ to keep
your data safe.
EXECUTIVE SUMMARY
3
D ATA S E C U R I T Y A N D T H E C L O U D
Data security refers to protective digital privacy
measures that are applied to prevent unauthorized
access to information assets such as computers,
databases and websites. With the proliferation
of digital data, it’s a top concern and priority for
businesses of all sizes, in all industries. Take into
consideration these facts about data security:
>> Roughly 55% of small businesses have experienced
a security breach1
>> 30% of cyber attacks are aimed at small companies2
>> In 2014, the average cost of a data breach to a
company was $3.5 million, which is 15% more
than what it cost in 20133
>> A laptop is stolen every 53 seconds in the U.S.4
4
D ATA S E C U R I T Y A N D T H E C L O U D
DATA SECURITY: TOO
IMPORTANT TO IGNORECHAPTER 1
1
	 2013 Small Business Security Survey. National Small Business Association. 2013.
2
	 Internet Security Threat Report 2014. Symantec Corporation. 2014.
3
	 2014 Cost of Data Breach Study: Global Analysis. Ponemon Institute. May 2014.
4
	 Stuart, Keith. Having your laptop stolen is traumatic. The Guardian. January 2015.
5
	 2014 Cost of Data Breach Study: Global Analysis. Ponemon Institute. May 2014.
6
	 Data Breach: Is Your Business at Risk? Commercial Risk Insurance.
If a cyber attack or breach occurs at your agency, consider
the financial impact. For every record stolen, companies
stand to lose up to $188 per record.5
While financial loss
can eventually be regained, loss of reputation and customer
loyalty can be permanent. Four in 10 customers will consider
leaving a company if their information is lost or stolen.6
It’s
also critical to protect your clients’ personal and financial
information for compliance with various data protection laws.
As a trusted advisor, your client relationships go beyond just
risk management services you provide; your clients expect
you to safeguard their personal information and privacy. You
cannot afford to be unprotected.
HOW DOES THE CLOUD
KEEP MY DATA SAFE?CHAPTER 2
At the most basic level, the cloud is a delivery
mechanism for IT services over a network, allowing
you to receive information technology such
as applications, data and security as a service.
Traditionally, many businesses, including agencies,
purchase hardware and software, and operate
it themselves or with the help of an outside
company. The cloud provides an alternative option,
and represents a shift from the traditional way in
which agents view IT. More and more companies
are running some or all of their critical business
applications in the cloud, and enabling clients to
connect with them online. In almost all cases, client
data is just as safe or safer in the cloud than in in-
house agency systems. In fact, most data breaches
involve on-premises data center environments.
5
D ATA S E C U R I T Y A N D T H E C L O U D
So how does the cloud environment work? The cloud
environment includes secure data centers that control
computing operations. These remotely-accessed centers
are home to the servers that host software and process,
store and protect data. Data and applications remain
centralized in the data center facility while users operate
in a virtual atmosphere through a wired or wireless
Internet connection. With the cloud, there is no longer a
need to store or back up data to removable media such
as flash drives or CDs that can be lost or stolen.
In an online environment, information can be accessed
on a laptop, tablet computer or smartphone anytime,
anywhere an Internet connection is available. Users have
more access through more devices in more locations.
This kind of 24/7 on-demand service is a central
component and provides a significant advantage.
Most insurance agents do not have the resources,
expertise, time or money to match what data
centers provide. Besides providing data security,
data centers themselves are physically secure sites,
staffed 24/7 with additional monitoring through video
surveillance. These strict security standards require
levels of redundancy and other measures that
cannot be duplicated in typical offices.
TAKE ADVANTAGE OF
DATA CENTERSCHAPTER 3
D ATA S E C U R I T Y A N D T H E C L O U D
“We cannot provide the same environment that
Applied can provide for us. Whether that’s data
security, reliability, the cost of maintaining the
servers or doing upgrades for us, the Applied
environment is much more robust than what we
could do on our own.”
JOHN GAGE
Systems Administrator
Knight Insurance Group
6
When choosing a data center option, be sure it
measures up to these standards:
 99.9% uptime
 Tier 3+ facility, as defined by the Uptime Institute
 AES-256 data-at-rest-encryption (DARE)
 128-bit, bi-directional, packet-level encryption
 Regular auditing against SSAE16 SOC 2 standards
 Automatic antivirus and software updates
 Site redundancy for backup
 Built-in firewall and intrusion prevention system
 Nightly backups
 Automatic download of agency data
Maintaining critical business information in a
secure data center provides an extra layer of
data protection. In addition, your business benefits
from implementing more efficient data
management and data access processes.
Often, with a cloud-based system,
applications and supporting software
update automatically, so your business
continually runs the latest software
versions without incurring delays or extra
expenses that may be required for manual updates.
7
D ATA S E C U R I T Y A N D T H E C L O U D
For insurance agencies, one of your most valuable
assets is your client data. When physical damage
occurs affecting your business and clients in the
area, you must respond. Servers and tapes can
be damaged, but in the cloud, the data is safe and
accessible. Consider data security as part of your
business continuity plan.
Any number of problems can compromise agency
data, from theft of sensitive customer information, to
natural disasters and cyber attacks. Online solutions
can assist in mitigating risks and keeping your agency
up and running should your business operations be
interrupted. Physical and electronic security deliver
data protection beyond what any individual agency
can offer, as well as providing minimal downtime
due to scheduled upgrades. If your agency’s internal
computers or offices become inaccessible, online
solutions are readily available from any secure
Internet connection.
PROVIDE THE BEST
DATA PROTECTIONCHAPTER 4
8
D ATA S E C U R I T Y A N D T H E C L O U D
There are a number of precautions you can take
to ensure better data security. Your agency cannot
afford to take chances with security. If your company’s
data is lost, the cost to recover or recreate it can be
insurmountable. When developing a data security
plan, remember these best practices.
DATA SECURITY
BEST PRACTICESCHAPTER 5
9
D ATA S E C U R I T Y A N D T H E C L O U D
 Encrypt your data – Encrypting data helps to
prevent the accidental loss of sensitive or protected
information, including data classified as Personally
identifiable information (PII). A Secure Sockets Layer (SSL)
certificate is also important to secure your site, encrypting
the communication between the user and the website. For
secure remote access, you should also set up a virtual private
network (VPN )security measures to standardize security
software across your agency.
 Leverage network-based security hardware and software –
Use firewalls, gateway antivirus, intrusion detection devices,
honey pots and monitoring to screen for denial-of-service
(DoS) attacks, virus signatures, unauthorized intrusion, port
scans, and other “over the network” attacks and attempts at
security breaches.
Data security should be a part
of every business strategy and
technology program. By following
these best practices, you are
taking steps to safeguard your
data and your business’ reputation.
Learn more about the cloud and
data security and discover how
Applied can be your data
security partner.
10
D ATA S E C U R I T Y A N D T H E C L O U D
 Protect outbound data –Transport Layer Security (TLS) email
encryption should be used for outbound emails, especially
when emailing sensitive information. Data loss prevention
(DLP) is a strategy for making sure that end users do not send
sensitive or critical information outside the corporate network.
Consider creating a DLP strategy at your agency.
 Secure your technology against viruses and malware – It is
important to run antivirus software on your computing assets,
such as desktops, laptops and tablets. Programs can be run at
regular intervals to scan for viruses. It’s critical to continue to
patch your operating systems and all third party software, as
well as keep your antivirus software up to date.
 Vulnerability management – Periodic vulnerability
assessments evaluate the effectiveness of security control
solutions. You should conduct periodic vulnerability
assessments of critical systems, those systems exposed
on the Internet, or as determined by legal, regulatory or
compliance requirements. This includes running internal and
external vulnerability scans often.
 Educate your users – It is essential to create a culture of
security and ensure all employees are aware of the data
security plan. Encourage them to create strong passwords
that are frequently changed. Staff should remember to always
log out of the system when away from their computer and be
careful when selecting unauthorized Wi-Fi networks.
This eBook was prepared by Applied Systems, Inc.
About Applied Systems
Applied Systems is a leading provider of software that
powers the business of insurance. Applied is recognized as
a pioneer in agency and brokerage management systems
and data exchange between agencies, brokers, carriers
and their clients. Automating the insurance lifecycle for more
than 140,000 insurance professionals, 12,000 agencies and
brokerages, and 350 carriers worldwide, Applied enables
millions of people around the world to safeguard and protect
what matters most.
©2015 Applied Systems, Inc. All rights
reserved. This document is provided
for information purposes only. It is
intended to give timely, but general,
information on the subject matter
covered herein, and the contents of
this document are subject to change
without notice. Prior results and case
studies mentioned in this document
do not guarantee a similar outcome
on any particular situation in the future.
You should consult with an attorney or
other professional service provider with
respect to how the matters discussed
herein affect and relate to your own
business affairs. This document is not
warranted to be error-free, nor subject
to any other warranties or conditions,
whether express or implied.
Applied Systems and its affiliates
specifically disclaim any liability with
respect to this document and no
contractual obligations are formed either
directly or indirectly by this document.
Any statements made herein are not
a commitment to deliver any material,
code or functionality, and should not
be relied upon in making purchasing
decisions, except as provided for in a
separate software license agreement.
The development, release, timing and
availability of any products, features or
functionality described herein remain at
the sole discretion of Applied Systems
and its affiliates. All other names of
products and published works identified
herein may be the trademarks or
otherwise proprietary material of their
respective owner.
Applied Systems, Inc.
200 Applied Parkway
University Park, IL 60484
800.999.5368
For more information visit
appliedsystems.com
CONTRIBUTORS
11
D ATA S E C U R I T Y A N D T H E C L O U D
Applied Systems, Inc.
200 Applied Parkway
University Park, IL 60484
800.999.5368
For more information visit
appliedsystems.com
© Copyright 2015 Applied Systems

Contenu connexe

Dernier

Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
ALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxolyaivanovalion
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Delhi Call girls
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Onlineanilsa9823
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
 

Dernier (20)

Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
ALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptx
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 

En vedette

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

En vedette (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Data Security and the Cloud

  • 2. DATA SECURITY AND THE CLOUDTABLE OF CONTENTS 2 CHAPTER 2 PAGE 5 HOW DOES THE CLOUD KEEP MY DATA SAFE? CHAPTER 1 PAGE 4 DATA SECURITY: TOO IMPORTANT TO IGNORE CHAPTER 3 PAGE 6 TAKE ADVANTAGE OF DATA CENTERS CHAPTER 4 PAGE 8 PROVIDE THE BEST DATA PROTECTION CHAPTER 5 PAGE 9 DATA SECURITY BEST PRACTICES D ATA S E C U R I T Y A N D T H E C L O U D EXECUTIVE SUMMARY PAGE 3
  • 3. Today, stories of major data breaches have dominated the media, from Target and Home Depot credit card theft to health record hacking at Anthem. In this era of Big Data, financial and personal information becomes a target with information sold to the highest bidder. Companies that fail to protect themselves lose money, customers and their reputation. For all industries, data security is a critical component of business strategy and health. You must consider data security if any of your employees are physically connected to the Internet or other public data networks,regardless of size and scope of operations. Leveraging the cloud to integrate the latest security technology is one way to ensure your business receives high-level data protection. This ebook provides an overview of data security and best practices you can employ to keep your data safe. EXECUTIVE SUMMARY 3 D ATA S E C U R I T Y A N D T H E C L O U D
  • 4. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to information assets such as computers, databases and websites. With the proliferation of digital data, it’s a top concern and priority for businesses of all sizes, in all industries. Take into consideration these facts about data security: >> Roughly 55% of small businesses have experienced a security breach1 >> 30% of cyber attacks are aimed at small companies2 >> In 2014, the average cost of a data breach to a company was $3.5 million, which is 15% more than what it cost in 20133 >> A laptop is stolen every 53 seconds in the U.S.4 4 D ATA S E C U R I T Y A N D T H E C L O U D DATA SECURITY: TOO IMPORTANT TO IGNORECHAPTER 1 1 2013 Small Business Security Survey. National Small Business Association. 2013. 2 Internet Security Threat Report 2014. Symantec Corporation. 2014. 3 2014 Cost of Data Breach Study: Global Analysis. Ponemon Institute. May 2014. 4 Stuart, Keith. Having your laptop stolen is traumatic. The Guardian. January 2015. 5 2014 Cost of Data Breach Study: Global Analysis. Ponemon Institute. May 2014. 6 Data Breach: Is Your Business at Risk? Commercial Risk Insurance. If a cyber attack or breach occurs at your agency, consider the financial impact. For every record stolen, companies stand to lose up to $188 per record.5 While financial loss can eventually be regained, loss of reputation and customer loyalty can be permanent. Four in 10 customers will consider leaving a company if their information is lost or stolen.6 It’s also critical to protect your clients’ personal and financial information for compliance with various data protection laws. As a trusted advisor, your client relationships go beyond just risk management services you provide; your clients expect you to safeguard their personal information and privacy. You cannot afford to be unprotected.
  • 5. HOW DOES THE CLOUD KEEP MY DATA SAFE?CHAPTER 2 At the most basic level, the cloud is a delivery mechanism for IT services over a network, allowing you to receive information technology such as applications, data and security as a service. Traditionally, many businesses, including agencies, purchase hardware and software, and operate it themselves or with the help of an outside company. The cloud provides an alternative option, and represents a shift from the traditional way in which agents view IT. More and more companies are running some or all of their critical business applications in the cloud, and enabling clients to connect with them online. In almost all cases, client data is just as safe or safer in the cloud than in in- house agency systems. In fact, most data breaches involve on-premises data center environments. 5 D ATA S E C U R I T Y A N D T H E C L O U D So how does the cloud environment work? The cloud environment includes secure data centers that control computing operations. These remotely-accessed centers are home to the servers that host software and process, store and protect data. Data and applications remain centralized in the data center facility while users operate in a virtual atmosphere through a wired or wireless Internet connection. With the cloud, there is no longer a need to store or back up data to removable media such as flash drives or CDs that can be lost or stolen. In an online environment, information can be accessed on a laptop, tablet computer or smartphone anytime, anywhere an Internet connection is available. Users have more access through more devices in more locations. This kind of 24/7 on-demand service is a central component and provides a significant advantage.
  • 6. Most insurance agents do not have the resources, expertise, time or money to match what data centers provide. Besides providing data security, data centers themselves are physically secure sites, staffed 24/7 with additional monitoring through video surveillance. These strict security standards require levels of redundancy and other measures that cannot be duplicated in typical offices. TAKE ADVANTAGE OF DATA CENTERSCHAPTER 3 D ATA S E C U R I T Y A N D T H E C L O U D “We cannot provide the same environment that Applied can provide for us. Whether that’s data security, reliability, the cost of maintaining the servers or doing upgrades for us, the Applied environment is much more robust than what we could do on our own.” JOHN GAGE Systems Administrator Knight Insurance Group 6
  • 7. When choosing a data center option, be sure it measures up to these standards: 99.9% uptime Tier 3+ facility, as defined by the Uptime Institute AES-256 data-at-rest-encryption (DARE) 128-bit, bi-directional, packet-level encryption Regular auditing against SSAE16 SOC 2 standards Automatic antivirus and software updates Site redundancy for backup Built-in firewall and intrusion prevention system Nightly backups Automatic download of agency data Maintaining critical business information in a secure data center provides an extra layer of data protection. In addition, your business benefits from implementing more efficient data management and data access processes. Often, with a cloud-based system, applications and supporting software update automatically, so your business continually runs the latest software versions without incurring delays or extra expenses that may be required for manual updates. 7 D ATA S E C U R I T Y A N D T H E C L O U D
  • 8. For insurance agencies, one of your most valuable assets is your client data. When physical damage occurs affecting your business and clients in the area, you must respond. Servers and tapes can be damaged, but in the cloud, the data is safe and accessible. Consider data security as part of your business continuity plan. Any number of problems can compromise agency data, from theft of sensitive customer information, to natural disasters and cyber attacks. Online solutions can assist in mitigating risks and keeping your agency up and running should your business operations be interrupted. Physical and electronic security deliver data protection beyond what any individual agency can offer, as well as providing minimal downtime due to scheduled upgrades. If your agency’s internal computers or offices become inaccessible, online solutions are readily available from any secure Internet connection. PROVIDE THE BEST DATA PROTECTIONCHAPTER 4 8 D ATA S E C U R I T Y A N D T H E C L O U D
  • 9. There are a number of precautions you can take to ensure better data security. Your agency cannot afford to take chances with security. If your company’s data is lost, the cost to recover or recreate it can be insurmountable. When developing a data security plan, remember these best practices. DATA SECURITY BEST PRACTICESCHAPTER 5 9 D ATA S E C U R I T Y A N D T H E C L O U D Encrypt your data – Encrypting data helps to prevent the accidental loss of sensitive or protected information, including data classified as Personally identifiable information (PII). A Secure Sockets Layer (SSL) certificate is also important to secure your site, encrypting the communication between the user and the website. For secure remote access, you should also set up a virtual private network (VPN )security measures to standardize security software across your agency. Leverage network-based security hardware and software – Use firewalls, gateway antivirus, intrusion detection devices, honey pots and monitoring to screen for denial-of-service (DoS) attacks, virus signatures, unauthorized intrusion, port scans, and other “over the network” attacks and attempts at security breaches.
  • 10. Data security should be a part of every business strategy and technology program. By following these best practices, you are taking steps to safeguard your data and your business’ reputation. Learn more about the cloud and data security and discover how Applied can be your data security partner. 10 D ATA S E C U R I T Y A N D T H E C L O U D Protect outbound data –Transport Layer Security (TLS) email encryption should be used for outbound emails, especially when emailing sensitive information. Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. Consider creating a DLP strategy at your agency. Secure your technology against viruses and malware – It is important to run antivirus software on your computing assets, such as desktops, laptops and tablets. Programs can be run at regular intervals to scan for viruses. It’s critical to continue to patch your operating systems and all third party software, as well as keep your antivirus software up to date. Vulnerability management – Periodic vulnerability assessments evaluate the effectiveness of security control solutions. You should conduct periodic vulnerability assessments of critical systems, those systems exposed on the Internet, or as determined by legal, regulatory or compliance requirements. This includes running internal and external vulnerability scans often. Educate your users – It is essential to create a culture of security and ensure all employees are aware of the data security plan. Encourage them to create strong passwords that are frequently changed. Staff should remember to always log out of the system when away from their computer and be careful when selecting unauthorized Wi-Fi networks.
  • 11. This eBook was prepared by Applied Systems, Inc. About Applied Systems Applied Systems is a leading provider of software that powers the business of insurance. Applied is recognized as a pioneer in agency and brokerage management systems and data exchange between agencies, brokers, carriers and their clients. Automating the insurance lifecycle for more than 140,000 insurance professionals, 12,000 agencies and brokerages, and 350 carriers worldwide, Applied enables millions of people around the world to safeguard and protect what matters most. ©2015 Applied Systems, Inc. All rights reserved. This document is provided for information purposes only. It is intended to give timely, but general, information on the subject matter covered herein, and the contents of this document are subject to change without notice. Prior results and case studies mentioned in this document do not guarantee a similar outcome on any particular situation in the future. You should consult with an attorney or other professional service provider with respect to how the matters discussed herein affect and relate to your own business affairs. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether express or implied. Applied Systems and its affiliates specifically disclaim any liability with respect to this document and no contractual obligations are formed either directly or indirectly by this document. Any statements made herein are not a commitment to deliver any material, code or functionality, and should not be relied upon in making purchasing decisions, except as provided for in a separate software license agreement. The development, release, timing and availability of any products, features or functionality described herein remain at the sole discretion of Applied Systems and its affiliates. All other names of products and published works identified herein may be the trademarks or otherwise proprietary material of their respective owner. Applied Systems, Inc. 200 Applied Parkway University Park, IL 60484 800.999.5368 For more information visit appliedsystems.com CONTRIBUTORS 11 D ATA S E C U R I T Y A N D T H E C L O U D
  • 12. Applied Systems, Inc. 200 Applied Parkway University Park, IL 60484 800.999.5368 For more information visit appliedsystems.com © Copyright 2015 Applied Systems