Protecting Your Information

Select A Section

Guardian and our family of companies are committed to safeguarding our customers' data. Our systems have procedural, technical and physical safeguards to protect this sensitive information. Information security is an essential and fundamental part of our trusted relationship. The section below highlights some of the many protections we have in place.

  • Multi-layered detection and protection

    We take a “defense in depth” approach to security, which means we use multiple layers of protection and detection.

  • Secure websites

    Access to sensitive data requires passwords that meet certain standards for length and complexity, and you are automatically logged out after a period of inactivity. Account access is performed using secure, encrypted methods. 

  • Risk-based authentication

    For some websites or certain transactions, additional authentication is required, such as responding to challenge questions or entering a random code that’s sent to your phone or email.

  • 24/7 Security Operations

    Trained specialists monitor our systems 24/7 to detect and respond to unusual activity and emerging threats.

  • Encryption

    We share sensitive data with you using encrypted protocols.

  • Call center verification

    We use multiple methods to verify your identity before granting access to your account.

  • Fraud detection

    Teams monitor transactions to look for and respond to suspicious or unusual activity in accounts.

  • Physical access controls

    Access to physical locations processing your data are controlled and restricted. Sensitive documents are disposed of securely.

  • Restricted access to data

    Access to data is restricted only to those who require access for business purposes.

  • Employee education and awareness

    An important part of security is ensuring employees are well trained on policies and standards and how to respond to threats.  We use multiple methods, including simulations, to achieve this.

  • Third party risk

    In some cases, the firm may use third parties to perform specialized functions. These third parties are closely managed to ensure they meet our standards for protection.

  • Business continuity planning

    We have plans in place to continue operations in the event of unplanned events (e.g., major storms).

  • Privacy Policy

    More information about how we keep your information private can be found on our privacy policy page: https://www.guardianlife.com/privacy-policy

 

 

 

Identity theft occurs when someone uses another person's personal information such as name, Social Security number, driver's license number, credit card number or other identifying information to take on that person's identity in order to commit fraud or other crimes.

 

Ask questions whenever you are asked for personal information that seems inappropriate for the transaction. Ask how the information will be used and if it will be shared. Ask how it will be protected. If you’re not satisfied with the answers, don’t give your personal information.

  • Don’t fall for phishing

    Phishing is when someone sends you fake emails, texts or websites to get you to share your personal information with them. This can include your account numbers, Social Security numbers or your login IDs and passwords. Scammers can use your information to steal money, your identity or both. They may also use phishing to gain control over your computer and install programs that lock you out of your important files. Be thoughtful when opening attachments or clicking on links in emails.

  • Watch out for call and pop-up scams

    This is when scammers call you and indicate a problem with your computer, claiming they can help fix it. Other times you may get a pop-up offering a “free computer scan.” Others can claim to be with the IRS or from Guardian. If in doubt, hang-up, look up the number from a valid source, and call the number back.

  • Use strong passwords and login methods

    Use long, hard-to-guess passwords that use phrases or combinations of numbers, upper and lowercase letters and symbols.  Don’t use names of pets, family members or your username or personal information (e.g., date of birth). Don’t use the same passwords on multiple sites, and don’t share passwords with others.

    Change your password immediately if you suspect it may have been compromised.

    When possible, use text codes to your phone or challenge questions to ensure you are the only person accessing your account. 

     

  • Web browse carefully

    Ensure your wireless network at home has a password and is encryption enabled. Enable safe browsing features on your browsers where available.  

  • Keep your phone and home PC well protected

    Keep your computer or mobile device updated with current versions of your browser and other software. Be careful about downloading or installing software from questionable sources. Always use anti-virus software.

  • Protect your personal information

    Your personal information, including your location and what you’ve bought online is valuable. Be sure you review how this information is collected through apps and websites. Review your privacy and security settings on websites and apps, and make sure they’re set to the right level for you.

  • Monitor your financial accounts

    Periodically review transactions and current activity across all your financial accounts. Set up alerts where available and immediately report suspicious activity. Remember to update your contact information as soon as it changes, and check back regularly to be sure it’s up-to-date.

Additional Resources

Federal Trade Commission – Privacy, Identity and Online Security
https://www.consumer.ftc.gov/topics/privacy-identity-online-security

Stop Think Connect
https://www.stopthinkconnect.org/

National Cyber Security Alliance
https://staysafeonline.org/stay-safe-online/