A hacker attacking a computer enterprise can compromise thesystem, steal everything of value, and completely erase his or hertracks within 20 minutes, according to the New York-basedInternational Council of Electronic Commerce Consultants.

In addition, spam, spyware, e-mail-borne viruses and othermalicious code continue to spread via the Internet, endangeringsystems and data worldwide.

Meanwhile, federal and state regulations require that insurers,brokers and agents comply by taking reasonable precautions toprevent unauthorized access to the often-sensitive consumer datathat resides on their systems.

Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader

  • All PropertyCasualty360.com news coverage, best practices, and in-depth analysis.
  • Educational webcasts, resources from industry leaders, and informative newsletters.
  • Other award-winning websites including BenefitsPRO.com and ThinkAdvisor.com.
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.