Any email we send containing sensitive or confidential information is encrypted using a variety of industry standard encryption methods. For more information please visit our encryption page.
We protect our data with numerous firewalls and specialized hardware, software, and related techniques that control access. The infrastructure is constantly monitored and tested to prevent security breaches. To read about security at IMG and its subsidiaries please visit the security summary page.
Here are some steps you can take to protect yourself
Be sure to use and configure firewalls to keep out hackers and viruses. Many of todays DSL routers and cable modems have built in firewalls.
Use anti-virus and anti-spyware and keep them updated regularly to minimize the chance of malicious software (malware) from infecting your computer and causing a security breach.
When installing a wireless network, be sure to change the defaults for the access point name, disable the broadcasting of the SSID so others cannot detect its presence, require an encryption key to gain access, and apply a password both to your configuration and to gain access.
Your computer settings can reduce the chances of someone hacking into your computer. This includes setting site timeouts, emptying your cache, safely accepting cookies via your browser settings, prompting before a script executes via your browser settings, and using pop-up blockers.
Stay current on the latest security threats via:
Internet Storm Center http://isc.sans.org/
Symantec Anti-Virus http://www.sarc.com/