article thumbnail

Who’s Responsible For Cyber Insurance Policy Misrepresentations? It Depends.

Forrester IT

On July 6, 2022, The Travelers Property Casualty Company of America (Travelers Insurance) filed a suit in Illinois Federal Court against International Control Services, Inc (ICS) asking for policy rescission and declaratory judgment against ICS.

Insurance 195
article thumbnail

Patient Portal Puts a Spotlight on Secure Messaging

CTOvision

Given the Health Insurance Portability and Accountability Act (HIPAA) requirement for secure communication of Protected Health Information (PHI), a spotlight has been placed on the support for secure messaging. Secure Messaging Requires Authentication and Secure Networks. Patient Portal and Messaging Authentication.

Security 267
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Change my password? AGAIN?

Computerworld Vertical IT

Every year at this time, I have to fill out my firm’s cyber insurance application — and every year they ask whether we encourage strong passwords and change them often. We should instead be choosing authentication processes that appropriately match site risks; using a password should be the last thing you want to rely on.

article thumbnail

Impact of technology on insurance industry

Hacker Earth

Like every other industry, the global insurance sector, worth over $5 trillion, has undergone an immense overhaul because of disruptive technologies in recent years. According to PwC’s 2017 Global InsurTech Report, the challenges the insurance industry faces in their ability to innovate are. Talent (87%). IT security (53%). Blockchain.

article thumbnail

What's the Prescription for Cyber Resilience in Healthcare?

SecureWorld News

without the ability to get insurance approval for services ranging from a drug prescription to a life saving operation. Many pharmacies have been unable to give patients medicine due to insurance verification failures. But it's not just doctors. Our modern healthcare system is deeply dependent on computers and data networks.

article thumbnail

Four of the Biggest Financial Data Breaches of 2019

Galido

Perhaps not surprisingly, banks, insurance companies, and other financial-service firms are 300 times more likely to suffer from a cyber-attack than other industries. What caused the security failure is not yet known, but the exposed documents were viewable to anyone without the need for authentication. First American Financial Corp.

Financial 100
article thumbnail

Passwordless MFA for Customers: How to Fortify Security without Introducing Friction

CIO Business Intelligence

Password-based authentication is likely the most widely used method of authenticating users to online services. Password-based authentication is used because it is easy to understand and implement. They provide multifactor authentication (MFA) without the usual burden on the user. on a user’s other online accounts.