Insurance & Technology is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary
Content tagged with Security posted in May 2012
North Carolina Fights Medicaid Fraud With Analytics
News  |  5/24/2012  | 
In two years, IBM data mining software has identified $191 million in potentially false Medicaid claims.
ID Federation Draws Closer to Solving Password Problem
Commentary  |  5/16/2012  | 
Insurers and vendors join forces in nonprofit to identify login standards for independent agents.
Santam Says Saved Big on Fraud With IBM Partnership
Commentary  |  5/11/2012  | 
The South African insurer reports $2.4 million in savings on fraudulent claims in the first four months of using IBM analytics.
Facebook Users Expose Too Much to Insurers: Consumer Reports
Commentary  |  5/4/2012  | 
The organization says that insurers could "use against" policyholders the fact that they "like" a page about "health conditions or treatments." But is that all insurers get out of social?
8 Priorities for More Effective Mobile Security
Slideshows  |  5/4/2012  | 
Smartphone shipments are expected to reach 1.7 billion in 2017, forecasts telecommunications analyst Ovum – more evidence that the growth of the mobile channel presents opportunities for insurance companies in areas as diverse as distribution, claims and customer service. However, security remains a huge concern – especially as the bring-your-own-device movement means increasing volumes of sensitive corporate and client information are handled on mobile devices. To help insurers opti
Where Do Insurers Stand on Mobile Security Today?
Commentary  |  5/3/2012  | 
Measures such as wiping only enterprise data from the phone of a terminated employee, limiting access and installing virus protection are only the start of what insurers must do to address the vulnerabilities of the emerging mobile channel.
4 Critical Questions About Mobile IT Security Strategy
Commentary  |  5/1/2012  | 
How to ensure that your strategy clear about the planned usage of capabilities when shaping a security strategy for mobile devices.

Register for Insurance & Technology Newsletters