A hacker attacking a computer enterprise can compromise the system, steal everything of value, and completely erase his or her tracks within 20 minutes, according to the New York-based International Council of Electronic Commerce Consultants.
In addition, spam, spyware, e-mail-borne viruses and other malicious code continue to spread via the Internet, endangering systems and data worldwide.
Meanwhile, federal and state regulations require that insurers, brokers and agents comply by taking reasonable precautions to prevent unauthorized access to the often-sensitive consumer data that resides on their systems.
Recommended For You
Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader
Your access to unlimited PropertyCasualty360 content isn’t changing.
Once you are an ALM digital member, you’ll receive:
- Breaking insurance news and analysis, on-site and via our newsletters and custom alerts
- Weekly Insurance Speak podcast featuring exclusive interviews with industry leaders
- Educational webcasts, white papers, and ebooks from industry thought leaders
- Critical converage of the employee benefits and financial advisory markets on our other ALM sites, BenefitsPRO and ThinkAdvisor
Already have an account? Sign In Now
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.