Cybersecurity at Guardian
Cybersecurity Practices
Cybersecurity Practices
GUARDIAN® is a registered trademark of The Guardian Life Insurance Company of America®
Guardian and our family of companies are committed to safeguarding our customers' data. Our systems have procedural, technical and physical safeguards to help protect this sensitive information. Information security is an essential and fundamental part of our trusted relationship. The section below highlights some of the protections we have in place.
“Defense in Depth”
We take a “defense in depth” approach to security, which means we use multiple layers of protection and detection.
Multifactor / Risk-based authentication
For websites and mobile applications or certain transactions, multifactor or risk-based authentication may be required, such as entering a pin code that’s sent to your phone or email, or responding to challenge questions.
24/7 Security Operations / Incident Response
Our systems are monitored to detect and respond to unusual or suspicious activity. Incident response teams are in place to respond appropriately.
Encryption
We share sensitive data with you using encrypted protocols.
Call center verification
We verify your identity before granting access to your account.
Fraud detection
Teams monitor transactions to look for and respond to suspicious or unusual activity in accounts.
Physical access controls
Access to physical locations processing your data is controlled and restricted. Sensitive documents are disposed of securely.
Restricted access to data
Access to systems/data is logged and limited to authorized individuals.
Employee education and awareness
An important part of security is ensuring employees are trained on policies and standards and how to respond to threats. We use multiple methods, including simulations, to achieve security awareness.
Managed third party risk
In some cases, Guardian may use third parties to perform specialized functions. These third parties are governed to ensure they meet our standards for protection.
Resiliency / Business continuity planning
Our systems are designed for resiliency and also have plans in place to continue operations in the event of a natural or man-made disaster. Copies of data are protected and stored in alternative sites.
Security Assessments
Our company periodically assesses and tests its security controls in order to identify and mitigate risks.
Privacy policy
More information about how we keep your information private can be found on our privacy policy page.
Identity theft occurs when someone uses your personal information including your name, Social Security number, driver's license number, credit card number or other identifying information to take on your identity to commit fraud or other crimes.
Remember to ask
Ask questions whenever you are asked for personal information that seems inappropriate for the transaction. Ask how the information will be used and if it will be shared. Ask how it will be protected. If you’re not satisfied with the answers, don’t give your personal information.
Don’t fall for phishing
Phishing is when someone sends you fake emails, texts or websites to get you to share your personal information with them. This can include your account numbers, Social Security numbers or your login IDs and passwords. Scammers can use your information to steal money, your identity or both. They may also use phishing to gain control over your computer and install programs that lock you out of your important files. Be thoughtful when opening attachments or clicking on links in emails.
Watch out for call and pop-up scams
This is when scammers call you and indicate a problem with your computer, claiming they can help fix it. Other times you may get a pop-up offering a “free computer scan.” Others can claim to be with the IRS or from Guardian. If in doubt, hang-up, look up the number from a valid source, and call the number back.
Use strong passwords and login methods
Use long, hard-to-guess passwords that use phrases or combinations of numbers, upper and lowercase letters and symbols. Don’t use names of pets, family members or your username or personal information (e.g., date of birth). Don’t use the same passwords on multiple sites, and don’t share passwords with others.
Change your password immediately if you suspect it may have been compromised
When possible, use text codes to your phone or challenge questions to ensure you are the only person accessing your account.
Browse the web carefully
Ensure your wireless network at home has a password and is encryption enabled. Enable safe browsing features on your browsers where available.
Keep your phone and home PC well protected
Keep your computer or mobile device updated with current versions of your browser and other software. Be careful about downloading or installing software from questionable sources. Always use anti-virus software.
Protect your personal information
Your personal information, including your location and what you’ve bought online is valuable. Be sure you review how this information is collected through apps and websites. Review your privacy and security settings on websites and apps, and make sure they’re set to the right level for you. Be cautious of where you leave sensitive information. Written or printed information should not be left open for others to see and should be shredded for proper disposal.
Monitor your financial accounts
Periodically review transactions and current activity across all your financial accounts. Set up alerts where available and immediately report suspicious activity. Remember to update your contact information as soon as it changes and check back regularly to be sure it’s up to date.