Could Nationwide’s Security Breach Happen to Any Insurer?

The security breach of Nationwide Insurance last week is the last thing anyone in the business world wants to announce. There’s a level of trust associated with any company that consumers choose to do business with, but despite the best efforts of those companies and their security teams, the attack on Nationwide doesn’t appear to be anything out of the ordinary, nor will it be the last of its kind.

In an article to be published in the December issue of Tech Decisions, I interviewed Dan Greteman, CIO of Allied Group, a part of the Nationwide family. The interview was conducted in late September, just days before the attack on his company.

Greteman was proud of Nationwide’s record on security, but hardly cocky. He pointed out that for two years in a row the Ponemon Institute had listed Nationwide as one of the most trusted companies in the United States in terms of privacy.

Like all accolades, though, they focus only on what has happened in the past. Security conscious CIOs, as Greteman admits, need to focus on the future. He also doubts that security issues will ever disappear.

 “I feel good about where we are as an organization—a great mix of reactive and proactive,” he says. “We attend security events across industries and speak to others to get a good perspective on what they are dealing with. It doesn’t matter if you are a financial services company, an insurance company or a telecommunications company, likely you have very similar dynamics. We are learning from them and I believe we’ve had very good results. As we move into new models and packaged software, we need better integration to make sure we are protecting our policyholder data and personal information.”

How many CIOs would say the exact same thing about their company? Quite likely, most, but that statement—and the attack on Nationwide—only goes to show how difficult a job companies have to protect their private information on systems that are vulnerable to attack.

We as consumers trade off security every day of the week for one simple reason: convenience. We want quick access to the personal information we share with companies to pay our bills and conduct important business functions. As Greteman points out, when there is something of value sitting out there, criminals will find ways to get their hands on it.

 “Anytime there is money, personal information, and the ability to do harm to folks, you are going to have people out there trying to take advantage of that,” he says.

Vigilance in terms of data security is a 24-hours-a-day job and even then it might not be enough.

About the Author
Robert Regis Hyle, PropertyCasualty360.com

Robert Regis Hyle, PropertyCasualty360.com

Robert Regis Hyle is editor-in-chief of Tech Decisions magazine and technology channel editor for PropertyCasualty360.com. He has spent over three decades as a journalist for a variety of business and regional news publications including a stint with a weekly newspaper that he owned and operated. He has been with Tech Decisions since the magazine’s inception in 1999 and has written articles on virtually every issue and trend facing insurance IT professionals. Prior to joining Tech Decisions, he spent two years as editor of a sister publication, The Ohio Underwriter, where he covered insurance topics for the agency and carrier markets. He has spoken on insurance technology issues at various industry conferences such as IASA and ACORD LOMA and on a number of web seminars. He is a graduate of Xavier University in Cincinnati with a degree in Communication Arts. Hyle may be reached at rhyle@sbmedia.com

Comments

Resource Center

View All »

Integrated Content & Communications: A Key Business Issue For Insurers

Insurers are renewing their focus on top line growth, and many are learning that growth...

High Risk Insurance Coverage in the E&S Market

Experts discuss market conditions, trends and projected growth in a rapidly changing niche.

Top E-Signature Security Requirements

This white paper covers the most important security features to look for when evaluating e-signatures...

EPLI Programs Crafted Just For Your Clients

Bring us your restaurant clients, associations and other groups and we’ll help you win more...

Is It Time To Step Up And Own An Agency?

Download this eBook for insight on how to determine if owning an agency is right...

Claims - The Good The Bad And The Ugly

Fraudulent claims cost the industry and the public thousands of dollars in losses. This article...

Leveraging BI for Improved Claims Performance and Results

If claims organizations do not avail themselves of the latest business intelligence (BI) tools, they...

Top 10 Legal Requirements for E-Signatures in Insurance

Want to make sure you’ve covered all your bases when adopting e-signatures? Learn how to...

Get $100 in leads with $0 down!

NetQuote's detailed, real-time leads have boosted sales for thousands of successful local agents across the...

The Growing Role of Excess & Surplus Lines in Today’s...

The excess and surplus market (E&S) provides coverage when standard insurance carriers cannot or will...

Tech Digest eNewsletter

Technology related insights for insurance professionals including key developments, solution providers and news briefs from the carrier front – FREE. Sign Up Now!

Advertisement. Closing in 15 seconds.