This guide is intended for general informational purposes only. IIABA and its subsidiaries and affiliates shall not be held responsible for any liability relating to this guide or reliance on any information contained or referenced herein. IIABA does not guarantee the accuracy or completeness of any information contained or referenced herein. Such information is not intended to constitute and should not be considered investment, accounting, legal or other professional advice. If specific expert advice is required or desired, the services of an appropriate, competent professional, such as an attorney or accountant, should be sought. Copyright © 2024 Independent Insurance Agents & Brokers of America, Inc. All rights reserved. No portion of this guide may be reproduced in any manner without the prior written consent of IIABA.
Security PolicyWritten Security Policy Template A customizable security policy template for your agency. Learn More Gramm-Leach-Bliley ActGramm-Leach-Bliley Act Check out these insights as provided by the Federal Trade Commission (FTC) on GLBA, and more detail on what the provisions and compliance for safeguards mean for our industry. This site also house links to additional GLBA-related resources. Learn More A Cybersecurity Checklist for the Small BusinessA Cybersecurity Checklist for Small Businesses 10 Cyber Security Tips for Small Business Learn More How to Prevent Cyberattacks: Top Ways to Protect YourselfHow to Prevent Cyberattacks: Top Ways to Protect Yourself Extensive infographic guide developed by Maryville University. Detailed insights and resources on common types of cyberattacks, emerging cybersecurity threats, ways to protect yourself from cyberattacks and more. Learn More CISA - Cybersecurity & Infrastructure Security AgencyCISA - Cybersecurity & Infrastructure Security Agency US Government website that works with partners to defend against today's threats and build a more secure and resiilient infrastructure for the future. Includes resources for Small and Midsize businesses. Learn More National Security Agency - Mobile Device Best Practices National Security Agency - Mobile Device Best Practices Threats to mobile devices are more prevalent and increasing in scope and complexity. This best practices guide outlines steps the users can take to better protect personal devices and information. Learn More Bring Your Own Device (BYOD) ResourceBring Your Own Device (BYOD) Infographic format explaining the cyber issues surrounding using personal devices for business reasons Learn More
|