As The Number Of Breaches Rise, Enhanced Security Protocols Protect Consumers

As The Number Of Breaches Rise, Enhanced Security Protocols Protect Consumers

It seems like every day there is a new organization that has fallen victim to a cyber security breach, compromising millions of personal records. As each breach becomes more complex than the rest, it becomes even more important to have solutions in place to help protect against these attacks. In an effort to combat breaches, individual states have begun to enact regulations to for threat prevention with New York becoming the latest, effective January 1, 2017. Our participants’ security is our top priority at InfoArmor®, so many of the regulation requirements that are being put in place by various states, have already been implemented at InfoArmor.

InfoArmor’s, Chief Information Security Officer, Christian Lees leads the security initiative focusing on the protection of PrivacyArmor® participant data by performing extensive penetration and vulnerability tests and potential weaknesses. In addition, InfoArmor also utilizes a multi-factor authentication when participants log  into their PrivacyArmor online account portal. This enhancement requires a second identifier in addition to a password to provide an additional layer of security.

While many small businesses are exempt from most states regulations, InfoArmor has developed solutions to ensure that all participants are secure, regardless of the company size they interact with or are employed by. Many times large corporations can survive data breaches, however, 60 percent of small business go out of business within six months of suffering a data breach or cyber attack1.

By providing customized solutions that are geared towards smaller sized businesses, employers and employees can enjoy greater peace of mind that their personal information will remain secure.

While state and federal regulations will continue to develop in the future, PrivacyArmor participants can rest assured that InfoArmor will be on the front end of development with regulations, security protocols and threat intelligence.



Leave a Reply

Your email address will not be published. Required fields are marked *