Having trouble viewing this email? Click here to view online.  
 
Forward | Subscribe
Ringler Newsletter Banner
August
2016
   
 
Get A Quote My Website Attorney Fees Brochure Download vCard
 
Associate Photo
Tony & Julie Robinson
40 Lake Bellevue Drive, Suite 100
Bellevue, WA 98005
Serving the Pacific Northwest and Beyond
Toll Free: (800) 344-7452

Structure Strategies

Family Vacation Turns Fatal


Jim and Sarah were on their way home from the family cabin on a Sunday night – a trip they had taken hundreds of times before. Another driver pulled out from a side road and didn’t see them coming, striking the passenger side where Sarah was riding. She suffered traumatic head injuries and later died at the hospital.

Jim had lost his wife of 10 years, and his two daughters had lost their mom. Furthermore, low policy limits and some questions about liability made this a case in which a negotiated compromise would need to be reached.

Health insurance was a major concern for Jim as both girls are diabetic. So we structured the premiums for an ACA-compliant health insurance policy. Even with less money available to go around, we helped find a solution that ultimately provided some peace of mind for Jim and his family.

(Note: While Structure Strategies is based on actual Ringler case histories, the names and images of the people involved have been changed to protect their privacy.)

Hackers Use Mobile Devices to Break Through Data Security Walls

Small Business Data SecuritySmall businesses are also under cyberattack. Click to expand.

Hackers Breach Nation’s Most Prestigious Law FirmsWall Street Journal
 
Massive Breach at Anthem Should Be Wake-Up Call to Life Insurers InsuranceNewsNet
 
“Panama Papers” Law Firm Responds to Massive Data HackFortune
 
Headlines like these portend a new frontier for hackers: the rich deposits of confidential data stored by law firms and insurance companies on in-house servers, floating around on the cloud, or even on a thumb drive. This begs the question: Are we ready to defend our digital borders? The answer is not encouraging, according to many experts in data security.
 
As a rule, many law firms and insurers haven’t kept pace with the data security trends that are now standard in other sectors. To address this concern on a national level, law firms recently formed a group to disseminate information about cyberthreats and other vulnerabilities; this group is managed by the Financial Services Information Sharing and Analysis Center. The National Association of Insurance Commissioners also established a Cybersecurity Task Force late last year to coordinate data protection among state insurance departments and insurance companies.
 

Proliferation of Mobile Devices Multiplies Risk

Working against heightened efforts to lock down our cyberborders is the exploding use of mobile devices, especially by busy professionals. Not only are we doing more work away from the office, but we are using a growing variety of mobile devices to get that work done – including smart phones, notebooks, laptops and now even wearables. When these devices are not properly secured, which is too often the case, cybercrooks can easily evade enterprise-wide protections. Thus, mobile devices have become the weak link in the data security chain, according to many corporate IT officers, and are increasingly the launching pad for successful attacks.

Meanwhile, cyberthieves are using a rapidly expanding bag of tricks to take full advantage of the situation. Small, lightweight and portable, mobile devices are easy to steal or leave behind in a thousand different places. Once in hand, mobile devices (even those with tough security locks) can be defeated by a seasoned attacker and mined for corporate data or passwords. Hackers are also scamming users into downloading mobile malware with email, text messages and bogus advertising. And then there are Wi-Fi hackers who use easily obtained equipment to read a nearby wireless device or install malware that will allow future data access.

We Are the First Line of Defense

The first line of defense in this cybersecurity battle is, of course, those of us who depend on our mobile devices to help us do our jobs. Yet surveys show that many of us are unaware of the data security threats posed by our mobile devices and/or haven’t implemented available security measures. Here are eight tips from the Center for Internet Security to help you get started (download PDF for full details):

Passwords
Click to expand. (Courtesy of the Center for Internet Security.)
  1. Regularly update your device. Safeguard against the latest mobile malware by updating operating systems and security software as soon as updates are available.
  2. Enable encryption. This is one of the best ways to thwart unauthorized access to information stored on your device.
  3. Use a passcode. Why make it easy if your device falls into the wrong hands? Create a strong, unique password, don’t share it with others, and enable authentication after a period of inactivity.
  4. Do not use public Wi-Fi. Don’t log into accounts and manage any sensitive transactions while using public Wi-Fi. Also disable the “automatically connect to Wi-Fi” setting.
  5. Install applications only from trusted sources. Many applications fail security tests, so check online reviews for security warnings before downloading.
  6. Install a phone locator/remote erase app. If your phone already has this app, turn it on.
  7. Disable certain services when not in use. Turn off services like Bluetooth and Near Field Capabilities (NFC) when not in use to prevent unauthorized access by a nearby user.
  8. Carefully dispose of mobile devices. Make sure you wipe information from your smartphone and other devices before disposal. Check the manufacturer's website for instructions.