We're committed to you
Guardian and our family of companies are committed to safeguarding our customers' data. Our systems have procedural, technical and physical safeguards to help protect this sensitive information. Information security is an essential and fundamental part of our trusted relationship. The section below highlights some of the many protections we have in place.
Multi-layered detection and protection
We take a “defense in depth” approach to security, which means we use multiple layers of protection and detection.
Access to sensitive data requires passwords that meet certain standards for length and complexity, and you are automatically logged out after a period of inactivity. Account access is performed using secure, encrypted methods.
For some websites or certain transactions, additional authentication is required, such as responding to challenge questions or entering a random code that’s sent to your phone or email.
Added security for members
Guardian takes additional measures to secure personal data by collaborating with employers to create Guardian Unique Member IDs that are used throughout Guardian’s systems, applications and processes. Critical personal data, such as Social Security Numbers, are only collected when needed for tax purposes and are protected in our systems.
24/7 Security Operations
Trained specialists monitor our systems 24/7 to detect and respond to unusual activity and emerging threats.
We share sensitive data with you using encrypted protocols.
Call center verification
We use multiple methods to verify your identity before granting access to your account.
Teams monitor transactions to look for and respond to suspicious or unusual activity in accounts.
Physical access controls
Access to physical locations processing your data are controlled and restricted. Sensitive documents are disposed of securely.
Restricted access to data
Access to data is restricted only to those who require access for business purposes.
Employee education and awareness
An important part of security is ensuring employees are well trained on policies and standards and how to respond to threats. We use multiple methods, including simulations, to achieve this.
Third party risk
In some cases, the firm may use third parties to perform specialized functions. These third parties are closely managed to ensure they meet our standards for protection.
Business continuity planning
We have plans in place to continue operations in the event of unplanned events (e.g., major storms).
Safeguard your data
Identity theft occurs when someone uses another person's personal information such as name, Social Security number, driver's license number, credit card number or other identifying information to take on that person's identity in order to commit fraud or other crimes.
Ask questions whenever you are asked for personal information that seems inappropriate for the transaction. Ask how the information will be used and if it will be shared. Ask how it will be protected. If you’re not satisfied with the answers, don’t give your personal information.
Don’t fall for phishing
Phishing is when someone sends you fake emails, texts or websites to get you to share your personal information with them. This can include your account numbers, Social Security numbers or your login IDs and passwords. Scammers can use your information to steal money, your identity or both. They may also use phishing to gain control over your computer and install programs that lock you out of your important files. Be thoughtful when opening attachments or clicking on links in emails.
Watch out for call and pop-up scams
This is when scammers call you and indicate a problem with your computer, claiming they can help fix it. Other times you may get a pop-up offering a “free computer scan.” Others can claim to be with the IRS or from Guardian. If in doubt, hang-up, look up the number from a valid source, and call the number back.
Use strong passwords and login methods
Use long, hard-to-guess passwords that use phrases or combinations of numbers, upper and lowercase letters and symbols. Don’t use names of pets, family members or your username or personal information (e.g., date of birth). Don’t use the same passwords on multiple sites, and don’t share passwords with others.
Change your password immediately if you suspect it may have been compromised.
When possible, use text codes to your phone or challenge questions to ensure you are the only person accessing your account.
Web browse carefully
Ensure your wireless network at home has a password and is encryption enabled. Enable safe browsing features on your browsers where available.
Keep your phone and home PC well protected
Keep your computer or mobile device updated with current versions of your browser and other software. Be careful about downloading or installing software from questionable sources. Always use anti-virus software.
Protect your personal information
Your personal information, including your location and what you’ve bought online is valuable. Be sure you review how this information is collected through apps and websites. Review your privacy and security settings on websites and apps, and make sure they’re set to the right level for you.
Monitor your financial accounts
Periodically review transactions and current activity across all your financial accounts. Set up alerts where available and immediately report suspicious activity. Remember to update your contact information as soon as it changes, and check back regularly to be sure it’s up-to-date.
Federal Trade Commission – Privacy, Identity and Online Security
Stop Think Connect
National Cyber Security Alliance