Could Nationwide’s Security Breach Happen to Any Insurer?

The security breach of Nationwide Insurance last week is the last thing anyone in the business world wants to announce. There’s a level of trust associated with any company that consumers choose to do business with, but despite the best efforts of those companies and their security teams, the attack on Nationwide doesn’t appear to be anything out of the ordinary, nor will it be the last of its kind.

In an article to be published in the December issue of Tech Decisions, I interviewed Dan Greteman, CIO of Allied Group, a part of the Nationwide family. The interview was conducted in late September, just days before the attack on his company.

Greteman was proud of Nationwide’s record on security, but hardly cocky. He pointed out that for two years in a row the Ponemon Institute had listed Nationwide as one of the most trusted companies in the United States in terms of privacy.

Like all accolades, though, they focus only on what has happened in the past. Security conscious CIOs, as Greteman admits, need to focus on the future. He also doubts that security issues will ever disappear.

 “I feel good about where we are as an organization—a great mix of reactive and proactive,” he says. “We attend security events across industries and speak to others to get a good perspective on what they are dealing with. It doesn’t matter if you are a financial services company, an insurance company or a telecommunications company, likely you have very similar dynamics. We are learning from them and I believe we’ve had very good results. As we move into new models and packaged software, we need better integration to make sure we are protecting our policyholder data and personal information.”

How many CIOs would say the exact same thing about their company? Quite likely, most, but that statement—and the attack on Nationwide—only goes to show how difficult a job companies have to protect their private information on systems that are vulnerable to attack.

We as consumers trade off security every day of the week for one simple reason: convenience. We want quick access to the personal information we share with companies to pay our bills and conduct important business functions. As Greteman points out, when there is something of value sitting out there, criminals will find ways to get their hands on it.

 “Anytime there is money, personal information, and the ability to do harm to folks, you are going to have people out there trying to take advantage of that,” he says.

Vigilance in terms of data security is a 24-hours-a-day job and even then it might not be enough.

About the Author
Robert Regis Hyle, PropertyCasualty360.com

Robert Regis Hyle, PropertyCasualty360.com

Robert Regis Hyle is editor-in-chief of Tech Decisions magazine and technology channel editor for PropertyCasualty360.com. He has spent over three decades as a journalist for a variety of business and regional news publications including a stint with a weekly newspaper that he owned and operated. He has been with Tech Decisions since the magazine’s inception in 1999 and has written articles on virtually every issue and trend facing insurance IT professionals. Prior to joining Tech Decisions, he spent two years as editor of a sister publication, The Ohio Underwriter, where he covered insurance topics for the agency and carrier markets. He has spoken on insurance technology issues at various industry conferences such as IASA and ACORD LOMA and on a number of web seminars. He is a graduate of Xavier University in Cincinnati with a degree in Communication Arts. Hyle may be reached at rhyle@sbmedia.com

Comments

Resource Center

View All »

Increase Sales Conversion with this Complimentary White Paper

This whitepaper will share proven techniques - used by many of the industry's top producers...

D&O Policy Definitions: Don't Overlook These Critical Terms

Unlike other forms of insurance where standard policy language prevails, with D&O policies, even seemingly...

Environmental Risk: Lessons Learned from Willy Wonka and the Chocolate...

Whether it’s a chocolate factory or an industrial wastewater treatment facility, cleanup and impacts to...

More Data, Earlier: The Value of Incorporating Data and Analytics...

Incorporating more data earlier in claims lifecycles can help you reduce severity payments by 25%*...

How Many Of Your Clients Are At Risk Of Flood?

Every home is vulnerable to flooding. Learn four compelling reasons why discussing flood insurance with...

Gauging your Business Intelligence Analytics Capabilities and the Impact of...

Big Data, Data Lakes and Data Swamps, How to gauge your company's Big Data readiness....

Extending Contact Center Capabilities Across the Insurance Enterprise

Today advancements in technology are making a big impact on business and society. To yield...

Drug and Alcohol Testing Requirements

In this two-part series, NBIS Risk Management team will break down the requirements to assist...

Why Cyber Liability is Essential for Human Service Organizations

For traditional low-tech operations, information is often compromised in ways that don't involve technology. Access...

A Solution for Large Commercial Habitational Accounts

6 Reasons to place your LARGE Habitational Accounts with Dauntless.

Tech Digest eNewsletter

Technology related insights for insurance professionals including key developments, solution providers and news briefs from the carrier front – FREE. Sign Up Now!

Advertisement. Closing in 15 seconds.