<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Guzman Insurance Services, Inc.</title>
	<atom:link href="https://www.guzmaninsuranceservices.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.guzmaninsuranceservices.com</link>
	<description></description>
	<lastBuildDate>Fri, 03 Oct 2025 20:15:35 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1</generator>
	<item>
		<title>Welcome</title>
		<link>https://www.guzmaninsuranceservices.com/welcome/</link>
		<comments>https://www.guzmaninsuranceservices.com/welcome/#respond</comments>
		<pubDate>Mon, 21 Mar 2016 18:04:42 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
				<category><![CDATA[blog]]></category>
		<category><![CDATA[welcome]]></category>

		<guid isPermaLink="false">https://www.guzmaninsuranceservices.com?p=916</guid>
		<description><![CDATA[]]></description>
				<content:encoded><![CDATA[<p>Welcome to Guzman Insurance Services, Inc.! Please check back for future articles and information.</p>
<p>The post <a rel="nofollow" href="https://www.guzmaninsuranceservices.com/welcome/">Welcome</a> appeared first on <a rel="nofollow" href="https://www.guzmaninsuranceservices.com">Guzman Insurance Services, Inc.</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.guzmaninsuranceservices.com/welcome/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Insurance news</title>
		<link>https://www.guzmaninsuranceservices.com/insurance-news/</link>
		<comments>https://www.guzmaninsuranceservices.com/insurance-news/#respond</comments>
		<pubDate>Wed, 15 Oct 2014 10:58:46 +0000</pubDate>
		<dc:creator><![CDATA[user220]]></dc:creator>
		
		<guid isPermaLink="false">https://www.guzmaninsuranceservices.com?p=1087</guid>
		<description><![CDATA[]]></description>
				<content:encoded><![CDATA[<p><span style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 13px; line-height: 16px; background-color: rgb(255, 255, 255);">Individuals and companies alike are concerned about cyber risks. While it&rsquo;s important to be aware that no organization or person is immune to cyber threats, understanding just what exactly can create a cyber risk exposure is equally valuable. Two of the largest concerns are personally identifiable information (PII) and personal health information (PHI) &ndash; and for good reason. In fact, most breaches involve the exposure of both of these categories of information</span><sup style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 16px; background-color: rgb(255, 255, 255);">1</sup><span style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 13px; line-height: 16px; background-color: rgb(255, 255, 255);">, which open up the floodgates to what cyber criminals can access.</span><br style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 13px; line-height: 16px; background-color: rgb(255, 255, 255);" /><br />
<br style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 13px; line-height: 16px; background-color: rgb(255, 255, 255);" /><br />
<span style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 13px; line-height: 16px; background-color: rgb(255, 255, 255);">In 2013 alone, more than 800 million records were exposed</span><sup style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 16px; background-color: rgb(255, 255, 255);">2</sup><span style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 13px; line-height: 16px; background-color: rgb(255, 255, 255);">, which marked a 211 percent increase over 2012</span><sup style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 16px; background-color: rgb(255, 255, 255);">3</sup><span style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 13px; line-height: 16px; background-color: rgb(255, 255, 255);">. With recent headlines like &ldquo;Hackers Find New Ways to Breach Computer Security&rdquo; from The New York Times, cyber breach activity doesn&rsquo;t show signs of slowing. Almost half of PII and PHI breaches have involved the loss of password data</span><sup style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 16px; background-color: rgb(255, 255, 255);">4</sup><span style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 13px; line-height: 16px; background-color: rgb(255, 255, 255);">&nbsp;and 40 percent include the loss of names, user IDs and e-mails</span><sup style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 16px; background-color: rgb(255, 255, 255);">5</sup><span style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 13px; line-height: 16px; background-color: rgb(255, 255, 255);">.</span><br style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 13px; line-height: 16px; background-color: rgb(255, 255, 255);" /><br />
<br style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 13px; line-height: 16px; background-color: rgb(255, 255, 255);" /><br />
<span style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 13px; line-height: 16px; background-color: rgb(255, 255, 255);">While it is critical for organizations to have strict practices in place to ensure breaches don&rsquo;t occur internally, 71 percent of breaches in 2013 were attributed to activity from outside the organization</span><sup style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 16px; background-color: rgb(255, 255, 255);">6</sup><span style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 13px; line-height: 16px; background-color: rgb(255, 255, 255);">. The 2013 statistic blows past the all-time high of 63 percent of breaches occurring from outside the organization</span><sup style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 16px; background-color: rgb(255, 255, 255);">7</sup><span style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 13px; line-height: 16px; background-color: rgb(255, 255, 255);">.</span><br style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 13px; line-height: 16px; background-color: rgb(255, 255, 255);" /><br />
<br style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 13px; line-height: 16px; background-color: rgb(255, 255, 255);" /><br />
<span style="color: rgb(70, 73, 77); font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 13px; line-height: 16px; background-color: rgb(255, 255, 255);">Having cyber insurance has gone from a &ldquo;nice&rdquo; option to a &ldquo;necessary&rdquo; activity in order to protect against cyber threats and to protect organizations and their clients in the event of a breach. Travelers understands the complexity of cyber threats and has solutions to help protect your business.</p>
<p><strong><u>ESPA&Ntilde;OL</u></strong></span><br />
Las personas y empresas por igual est&aacute;n preocupados por los riesgos cibern&eacute;ticos. Si bien es importante ser consciente de que ninguna organizaci&oacute;n o persona es inmune a las amenazas cibern&eacute;ticas, la comprensi&oacute;n de qu&eacute; es exactamente lo puede crear una exposici&oacute;n al riesgo cibern&eacute;tico es igualmente valiosa. Dos de las mayores preocupaciones son la informaci&oacute;n personal identificable (PII) y la informaci&oacute;n de salud personal (PHI) &#8211; y por buena raz&oacute;n. De hecho, la mayor&iacute;a de las infracciones implican la exposici&oacute;n de estas dos categor&iacute;as de informaci&oacute;n1, que abren las puertas a lo que los ciberdelincuentes pueden acceder.&nbsp;</p>
<p>S&oacute;lo en 2013, m&aacute;s de 800 millones de discos fueron exposed2, lo que marc&oacute; un aumento del 211 por ciento sobre 20123. Con los recientes titulares como &quot;Los hackers encontrar nuevas formas de violaci&oacute;n de la seguridad del ordenador&quot; de The New York Times, la actividad incumplimiento cyber no muestra signos de desaceleraci&oacute;n. Casi la mitad de PII y PHI infracciones han supuesto la p&eacute;rdida de la contrase&ntilde;a data4 y el 40 por ciento de incluir la p&eacute;rdida de los nombres, nombres de usuario y e-mails5.&nbsp;</p>
<p>Si bien es fundamental para que las organizaciones tienen pr&aacute;cticas estrictas para garantizar las infracciones no se producen internamente, el 71 por ciento de las infracciones en 2013 fueron atribuidos a la actividad desde fuera de la organizaci&oacute;n. El 2013 estad&iacute;stica pasa m&aacute;s all&aacute; del m&aacute;ximo hist&oacute;rico del 63 por ciento de las violaciones que ocurren desde fuera del Organizaci&oacute;n7.&nbsp;</p>
<p>Tener seguro cibern&eacute;tico ha pasado de ser una opci&oacute;n de &quot;agradable&quot; a una actividad &quot;necesaria&quot; para proteger contra las amenazas cibern&eacute;ticas y para proteger a las organizaciones y sus clientes en el caso de incumplimiento. Hay que entender la complejidad de las amenazas cibern&eacute;ticas y sus soluciones para ayudar a proteger su negocio.<br />
&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.guzmaninsuranceservices.com/insurance-news/">Insurance news</a> appeared first on <a rel="nofollow" href="https://www.guzmaninsuranceservices.com">Guzman Insurance Services, Inc.</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.guzmaninsuranceservices.com/insurance-news/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
<!-- 2026-05-01 --><!-- Total processing time: 172.53804206848 ms --><!-- ff3d3275e74dcbac2d970eea9ad779212cadda17 --><!-- Processed by server 172.31.7.173 -->