Saturday, November 23, 2024
Home Authors Posts by Michael Bridges

Michael Bridges

14 POSTS 0 COMMENTS
Michael Bridges has served the life insurance industry with technology and thinking that challenges change within the industry. As a respected thought leader among his peers, Bridges has participated and helped shape our industry’s progress over the last 20 years. Bridges has received several US and foreign technology patents related to data security and compliance benefiting and protecting industry processing. Bridges currently leads PaperClip Inc as their President and COO.

Cyber Security… Join The Party

In the spirit of Tech-Tock, I’m going to discuss cyber security from a compliance perspective. This is still about technology and does have a sense of urgency for financial services professionals. The trend I’ve witnessed for the last few years is pushing downward into the supply chain-compliance. Cyber security companies like SimplicIT that provide managed it solutions in idaho believe they have a good handle on defensive, layering, real-time protection, and that the problem today is pushing down into the supply chain and continues to close vulnerabilities. They develop software that tries their best to protect your data from external breaches, for example, companies similar to Fleetsmith try their best to protect your business with application security.

Technology-wise the movement here is “Trust No One” when it comes to securing data and data access. The day is coming soon where two factor log-ons will be required for everyday users. Two factor access starts with your typical login and a strong password, you know, the one you never change. The system will then send you a code (i.e., text message, email, phone call, fob code, etc.) which you will enter into your log-on process and you’re in. As you move deeper into IT Land you see a group of professionals that keep that cyber world running and have all the keys to the kingdom. Not trusting them is taking shape in third-party key vaulting; companies have a key and the D3P have a key and to decrypt the data requires both parties to participate. Layers.

So these Cyber professionals mentioned previously believe technology in the market today, when properly deployed and maintained, can protect confidential information. They claim today’s vulnerabilities are those businesses that let their partners into their world in various degrees that pose the threat. Making their case over time in many forums has created more compliance and is pushing deeper into the supply chain. This has produced the recent rollout of the European Union’s General Data Protection Regulations (GDPR) which added some user rights and big fines. The most popular user right is the ability to have your personal information destroyed after use. When this hits the U.S. hang on! Revenue models will implode-no more data markets. California has just released their new state law in effect killing the data resale market. Fines that start at 20 million EU and can go as high as four percent of the company’s EU revenue has everyone’s attention.

Privacy and identity protection is also beginning to hit some current technology we use today-E-Signing, the backbone of the E-App initiative. Case law has taken a turn whereby judges are not accepting login and password as adequate for signer authentication. In two 2016 cases the California courts ruled that login and password were insufficient evidence to prove identity. After a decade of identity theft, who can trust anyone’s documentation. Courts want more evidence to authenticate- like adding biometric to the signing event (e.g., voice signatures and video signing).

So, what does that mean to the brokerage and agent community? More compliance. In my experience, the BGA/agent was not a real threat because regulations had a high threshold before you needed to report and execute a breach event. The trend today is that these thresholds are falling fast and breach level record counts of 50,000 or more are dropping to 500 or more (NY DOR Regulation 500). So, the world of compliance is descending upon the BGA/agent community.

This means significant change for many BGAs and agents and the way they look at cyber compliance “peer apathy.” The “because the majority of your peers don’t spend the resources on compliance, so why should you” mentality is over. You’ll know it’s over when you get your first request for your annual SOC2 Type2 audit report. I know because I receive many calls these days asking me: “What is a SOC2 audit and should I care?” Service Organization Controls testing level 2 covers internal financial, human resources (SOC1) and cyber security controls. Type 2 means the audit period is the past 12 months of records demonstrating your compliance to the subject controls. Controls are cyber practices, HR screening, threat training, data protection and access to confidential information safeguards. I usually respond to the SOC2 phone question with a typical 200 Control questionnaire and ask the caller to self-assess.

This is where the story gets interesting. The next call usually starts with, “I don’t do any of this, I don’t have a Chief Security Information Officer.” If you’re the principle of the organization, you’re now the CSO. The next question usually is, “I outsource all my computing needs (i.e., hosted CRM, hosted AMS, hosted document management, etc.) so why do I need to do this?” Simple. The regulations make it clear that you can outsource your technology-but not your responsibility-to third parties. Outsourcing is good because your vendors can provide their SOC2 Type2 audit reports, which provide oversight requirements of all your vendors and can serve many answers to the control questions, leaving about 100 controls to go. Now the SOC2 audit focuses on how your organization interacts with the hosted solutions. Auditors will want to review your cyber security policies and procedures on how you manage, background checks, least privileged access, incident reporting, disaster recovery, social media conduct, hard drive destruction, email encryption and so on. Just because you outsource your technology does not relieve you of conducting a third party SOC2 Type 2 audit.

The cyber world and government regulators believe today that if everyone in a supply chain of confidential information conformed to cyber compliance, identity theft would be greatly reduced. Well now, what do I do and what’s it going to cost? Let’s start with, if you’re a home-grown solution, a third-party PEN test (about $15,000-$30,000). Next, find a law firm which provides breach services and internal SOC2 control consulting (about $25,000 to $50,000). This law firm serves two purposes-preparing your control (i.e., budgeting) remediation plan and they would be the first phone call to make if you have evidence of or suspect a breach. Remember, a breach is unauthorized access to confidential information (i.e., lost notebook with no disk encryption, unencrypted email traffic, terminations that walkout with their shadow files, not shredding paper files, etc.). When using penetration testing, you are basically sanctioning an authorized breach in order to identify areas of vulnerability in a network. When you’re ready, a SOC2 audit (about $20,000 – $50,000) every year. What makes it more expensive is the fact that, in the life insurance world, you’re subject to HIPAA and PCI audit requirements which are separate from SOC2 audits. I really think life insurance is the most expensive group when it comes to compliance cost because of the information you manage. Once you have your SOC2 audit complete, now you can get Cyber Insurance. Cyber insurance companies generally want a complete SOC2 audit so they can underwrite your risk. With a good report expect to pay around $10,000-$20,000 annually for $2 million to $3 million in coverage.

Independent agents should review their E&O insurance and expand coverage for the risk they have access to and engage in personal encryption solutions (i.e., encrypted notebooks/computing, communications archiving, email encryption and password management tools). Agents working from PC-based computing at home should consider virtualizing (e.g., VMware Desktop) their business computing, separating their work life from their family or personal life (around $2,000-$3,000). Accordingly, in case you were not already aware, VMware Workstation is a virtual machine software that is used to run multiple operating systems over a single host computer. Each virtual machine can run a single instance of any operating system, such as Microsoft or Linux, simultaneously. If you would like to learn more about VMware Workstation, you might want to consider completing some of the fantastic vmware certifications out there. Ultimately, getting an industry-approved certification from a vendor such as VMware demonstrates to employers that you can be trusted to work to a high standard.

Well there you have it. The train has left the station and the trends discussed above are coming soon to a BGA/agent near you. Some call it the cost of doing business…I think it’s just seat belts on an airplane. Welcome to the party, Hans.

How Millennials Are Changing Life Insurance

Tech-Tock is a new column where we address the cyber world connection to life insurance and the distribution channels. Several thought leaders will discuss the latest technology trends and why you should care about mobile/marketing, web/new business, document management/compliance, security/risk and more; basically, technology, its business effect and its trends. At the end of the day, we want to intrigue you and give you a sense of urgency to integrate with change.

I think the way to start is to identify our players and their technology. Our players are the Millennial and Baby Boomer generations. The Boomers represent the institutions and the Millennials are the new middle management of these same institutions. As Millennials grew up in the digital explosion, the way they learned access to information behavior is so different that it affects the way they approach problem solving. At age 30, Boomers would have to call a travel agent to book a flight…today Millennials can hold a portal in their hand and in less than 60 seconds do the same. At age 30, Boomers would have to drag their finger in circles listening to clicks to order a pizza…today Millennials hold up a portal and say, “Order pizza.” Millennials have different experiences with transactions today and the process of selling and processing life insurance will evolve and integrate with their portal; point being it will be a marketplace app.

Technology thinking has already changed, whereby Millennials are all about outsourcing. I’ve seen, in my 40 years of involvement with technology, a cycle of on-premise to outsourcing cycles changing every 10 years. The new generation has adopted outsourcing and it will never change again. With the advent of Cloud computing, and soon the new Quantum computing, third party platforms will host all the applications and internally all the institutions will host are their portal interfaces (mobile, tablet, desktop & IoT devices).

Recently attending the Nexus Insurance Show (Chicago, November 2018) the startup companies presenting powerful new applications understand the demand for hosted applications because the Millennials are the buyers. Artificial Intelligence lead the day with everyone of the 40 exhibitors talking about their unique application and benefits of AI. One showed how eights pictures of a damaged car could produce a repair estimate in less than a minute. One showed smart home AI whereby water leaks could be detected and turned off saving millions in claims. One showed a Machine Learning process flow application which could display the real time movement of the company’s workflow and measure their efficiencies. Many of the companies will be acquired and continue to expand the tool bag of larger established vendors which will be the winners. Winners because with so many startups building out a solution to solve a specific problem, integration has always been the challenge. In the past the institutions supported standard organizations for supply chain integration, but this remains labor intensive with ongoing expenses. As larger vendors acquire technology and accept the responsibility of tight integration, only then will they emerge. The last thing to do is ask a Millennial to key information in over and over again.

Boomers—no matter the size or number of people in your institution, the message is to keep your technology fresh, exciting and outsourced. It’s time to turn off that server in the closet and to start finding outsourced tools to help train, sell, process, deliver and store your business all from a portal. Millennials, you need to be patient. I have not seen much change in technology in the life insurance industry over the last 20 years. Example: Independent life production comes in on paper 80 percent of the time even today. The good news is you’re now in charge and I see the change coming very fast. Congratulations!

Red Flags Policy — The First Line Of Defense

0

Summer of 2012, Mat Honan, a respected writer for WIRED Magazine, had his digital world destroyed in two hours, and the hackers never hacked—they “gamed” the system. Did I mention they were teenagers? Mr. Honan later made contact with one of the hackers, and that person explained how they did it.

Amazon tech support with basic information added a new email to the account—yes, the hacker’s—amazing. This was even after the hacker could not answer the security questions created by Mr. Honan. Now, with an email address attached to Mr. Honan’s Amazon account, the hacker clicked the classic “Forgot Password” and within seconds got the password reset email and hijacked the Amazon account. Now the hacker had access to Mr. Honan’s account record and simply took the last four digits of his credit card.

Apple tech support was the next call. Armed now with Mr. Honan’s billing address and the last four digits of his credit card, the hacker knew he could get into his Apple account. The Apple tech asking the security questions with no correct answers went to wallet security: your billing address and last four digits of your credit card. Apple tech then reset over the phone the new password and the hacker was now in Mr. Honan’s Apple account. Because Mr. Honan had connected his Apple account to his Google account, more email passwords were obtained and now Gmail was hijacked.

Mr. Honan’s Amazon, Apple and Google accounts were now under the control of teenage hackers in less than an hour, armed with only a phone and an email client. Fortunately for Mr. Honan, this is where it stopped. The teenage hackers only deleted everything on those accounts and Mr. Honan’s family memories were lost. More ambitious hackers with that much information could have done a lot more damage, possibly even a complete identity hijacking.

I opened with this story about Mr. Honan because the hack was not Star Wars. This was not a brute-force password attack, or a man in the middle of email eavesdropping, or a more sophisticated SQL injection, or a malware Trojan, or a keyboard logger virus. It was more old-school—like the days I used to dumpster dive to find disgruntled workers, befriend them and on and on. This was a classic social engineering hack; by the way, the teenage hackers started their pursuit with Facebook.

So enters the Red Flags Rule, issued in 2007 under Section 114 of the Fair and Accurate Credit Transaction Act of 2003 overseen by the Federal Trade Commission (FTC). The Red Flags Rule requires many businesses and organizations to implement a written identity theft prevention program designed to detect the red flags of identity theft in their day-to-day operations, take steps to prevent the crime and mitigate its damage. The bottom line is that a program can help businesses spot suspicious patterns and prevent the costly consequences of identity theft. The FTC enforces the Red Flags Rule with several other agencies. More about the rule can be found on the FTC’s Bureau of Consumer Protection website.

The insurance industry is one massive process of non-public information (NPI). Every organization within the supply chain should have a red flags program to safeguard client personal information.

In Mr. Honan’s case, the overriding goal to service the customer was the downfall of protecting his information. When the questions and answers Mr. Honan provided when signing up failed authentication, the only alternative should have been a two-factor escalation.

One factor authentication is defined as something you know, such as a password or the answers to questions you created. Two factor authentications are defined by something you know and something you have. Something you have can be many things: cell phone, computer, fingerprint, land line and so on. The most used device today is cell phone texting. Any time during a two factor escalation, the gatekeeper can send an alpha-numeric code to the person who in turn can respond via phone or device. New authentication methods include white listing dial from phone numbers, computer location, GPS and my favorite, voice recognition. Voice rec is where you record a short statement during the account onboarding phase. The authentication comes into play when you say the statement again and, if the two match, you’re the real thing.

When I think of the insurance process, it’s just one large consumer of NPI. A one-way process—information comes in and never goes out. There is no need to share NPI over the phone with anyone, even with the most sincere request. That’s a simple rule to live by.

Back to the red flags policy you need to develop. The first step is to identify the relevant red flags you might come across that signal that people trying to get products or services from you aren’t who they claim to be: They fail the “Do I know you” or what I call the relationship test. Emails that arrive from addresses or carbon copy addresses you don’t know to be associated with the customer are red flags.

The second step is to explain how your business or organization will detect the red flags you’ve identified. Phone inquiries that fail the relationship test should require a single- or two-factor authentication policy your people will use to identify callers.

During the onboarding process, capture a phone password, provide them with a business card with a number or word written on the back, create a question and answer from the customer—something only they would know or have—not from their wallet.

If they fail the single factor, then go to two factor: Text their cell phone, send them an email or “flash” over and call a white listed number. In any case, send an email notice to the customer calling to their attention that someone authenticated that day for a service request.

Emails should be secure and compliant. Provide your customer with a secure transaction email account to send and receive emails which provide authentication and encryption. Audit trails then provide a record of information exchange meeting the requirements of “Who had access to NPI.”

The third step is to decide how you’ll respond to any red flags that materialize. All red flagged communications should trigger an email notice of the event to the customer. This is to inform him that inquiries are being made, which keeps the customer involved in the security of his own NPI.

Red flags—the recognition of, how to handle, and informing those concerned, is the objective. Excellent customer service and protecting customer information is everyone’s goal. Setting the line between the two can be very simple. Educate your staff and customer on office behavior so when the occasion arrives, all concerned know what to expect and how to behave. Involving the customer can be as simple as a one-page document on what is expected “When contacting our office.” The customer will be happy to conform and will be pleased that your organization is doing everything it can to protect his NPI.

Develop a red flag plan and use it. You don’t want to be the next Mr. Honan. Or worse, lose your identity.

PaperClip Incorporated

0

Independent Brokerage Technology Outlook 2012. I’ve watched the independent distribution channel grow around technology for the last 17 years—we have accomplished a lot. The brokerage community has secured their data and communications, adopted standards, and invested in agency management systems, document management systems (like the ones from http://www.filecenterdms.com), and sales tools. Today, supporting carriers receive the majority of their applications electronically. The largest hurdle has been jumped, taking paper out of people’s hands; and the stage is now set for the evolution of electronic business documents.

The current focus on new electronic business documents is the Smart fillable form. Carrier applications created in a fillable Adobe PDF document allows the content to be validated and extracted for a standardized data feed. Five or so years ago several vendors extended their fillable PDF solutions, offering electronic signature (e-sign) options.

In a recent Life Brokerage Technology Committee (formerly the NAILBA technology committee) survey, 90 percent of respondents use Smart fillable forms, and e-sign was the highest priority (47 percent) of the top ten technology solutions, followed by integrated status (43 percent). E-sign is leveraged by about half (48 percent) of the BGAs selling term insurance and universal life, while other lines of business are under review. The clear BGA concern was on the expansion of e-sign centers for the agent. BGAs believe that agents have not been properly educated about the benefits of e-sign. Thus, agents feel it is impersonal, which is counter to their selling culture and contradicts their training.

The new electronic business document is moving in the market, and acceptance and adoption will continue to grow. Training programs at all levels on the e-sign process would go a long way to get agents involved. New selling strategies need to be developed where agents and consumers participate together in the signing event. Remember, the consumer has the final choice—paper or digital.

Other areas the independent distribution channel would like to see progress are the 1035 exchange, Check 21 processing, and support of vendor solutions. These areas all have one thing in common—the lack of carrier adoption. These subjects remain at the top of the discussion at many industry conferences.

Carriers receive more than 27 different document types in the new business application process and delivery of an electronic policy (e-policy) to the insured, yet refuse to accept a digitized 1035 exchange document. In 2007, John Felton, then chairman of NAILBA, sent out 38 letters to insurance carriers requesting their support in adopting the electronic process for replacements. Entering 2012, the stalemate continues; it’s not about technology, it’s about change.

Check 21 is a growing banking technology designed to stop processing of paper checks. The Check Clearing for the 21st Century Act (2003) opened the door for depositing funds from the image of a paper check, which is called truncation. Traditional Check 21 processing vendors combine special check scanning hardware and software to produce images and associated electronic data files with the required information to transact a NACHA Automated Clearing House (ACH) debit. The benefit is that BGAs (and others) stop paper check handling and logging, and eliminate overnight fees.

The BGA community routinely scans checks for reference and sends them on to carriers today. The pioneer here is Legal & General America, being first to accept scanned check images, directly processing into the NACHA network. LGA will share this process with interested parties because they believe this process will strengthen the independent channel like a rising tide.

The industry continues to suffer from a mixed bag of technology solutions provided by the vendor and carrier camps. The burden of this continues to fall on the BGA community with 16 different ways to process the same thing; case status, document capture, standards and email to name a few.

Carriers should focus their precious resources on internal technology, and when it comes to connecting to their producers, work with the vendor community. The vendor community has the advantage with their inherent independence, economy of scale, and the ability to deploy “many-to-many” solutions.

As mentioned earlier, the forum for this collaboration is the Life Brokerage Technology Committee. Every organization concerned with the technology of the independent distribution channel should participate because decisions are made by those who show up.

Compliance is a challenge we all face with increasing regulations on how we conduct business. The nature of life insurance touches virtually every federal, state and local law. Securing customer information is a real concern because the threat is just as real; if the supply chain is breached, carriers will share the heaviest of burdens. Education about the threat and best practices to protect yourself should be a never-ending campaign. Compliance is another reason the community should embrace vendor solutions. Carriers routinely evaluate vendor solution security and accept the risks or not. The time is coming when regulations will motivate carriers to evaluate all homegrown and sub-contracted third party vendors (Cloud). Someone doing business with a carrier-reviewed vendor (a company with skin in the game) along with a practiced internal security program would not be accused of “willful neglect” but probably would find themselves in a safe harbor position.

More adoption of electronic processing will occur in 2012—that’s a fact. However, some desired efficiencies have nothing to do with technology, just the commitment to change. The industry has matured enough to provide state-of-the-art processing, yet instead of adopting these processes, many organizations continue to build external facing solutions, falsely believing that in the end they will have a competitive advantage. In effect, all they’ve done is pushed their process on to someone else.

Remember, every piece of paper we touch costs us net one dollar. When you look around your organization, imagine every page of paper is a dollar bill; it’s never too late to win the lottery. [DMB]