We take online safety seriously. Below are the ways we help to safeguard your information including:
Locked file systems and user authentication are used to control access to sensitive information so authorized users or trusted computer programs can access your information stored in a file. We take steps to help ensure that only those who must see your information in order to provide products and services are granted access.
Encryption techniques are used to make your personal information unreadable when it is stored on computer disks and when it is sent out over electronic networks. This is an important control to help protect your information from anyone who is eavesdropping or trying to steal your information from computer storage.
A firewall is like the doormen at a private club, it's there to let the approved guests pass in and out, and turn away anyone who is not on the invite list. Firewalls act as gates between networks with different levels of trust, for instance between the public Internet and company Web servers. They're a key component in protecting the information that is stored and processed on trusted applications and Web servers.
System software easily becomes outdated in today's rapidly changing cyber world. Software bugs and errors provide stepping stones for viruses and hackers to steal information or disable controls on computer systems. It's very important to keep servers, as well as home computer systems, updated with the latest software versions and patches to avoid potential attacks and to keep your information safe.
Antivirus and antispyware software - which we're all familiar with - are used to monitor systems for viruses and other unauthorized software. Malicious code is often used by computer hackers to steal the information being input into or processed by the server. In this way, they're able to steal your information without your knowledge. Keeping the antivirus and antispyware software operational and up-to-date is a key protection on the server.
To access your accounts, you'll be required to sign in using a User ID and a Password you've created. Passwords must meet several requirements to help ensure its strength and safety.
Because these other websites are not under our control, we cannot guarantee the quality, accuracy, timeliness or security of third party web sites; therefore, third party sites should open up in new windows.
Remember, we always recommend that you review the privacy notice of any Web site you visit prior to entering any personally identifiable information.
Arm yourself with protection that gives you the resources you need to restore your good name in the event you become a victim.Click here to learn more »
Whether you call them scams,cons or rip-offs, they all share one common name: insurance fraud.Launch the site now »