Insurance Agencies — Southern California

Insurance Agency IT That Protects Your Book of Business

Independent agencies, MGAs, and brokerages trust IT Center to keep AMS360, Applied Epic, and Hawksoft running securely — while maintaining full GLBA Safeguards Rule 2023 compliance, a documented WISP, and airtight protection for every producer's policyholder PII. One flat rate. Zero surprises.

$300 per computer user / month
GLBA Safeguards Rule 2023 Ready
WISP Documented & Maintained
24/7 AI-Powered Monitoring
AMS360 Applied Epic · Hawksoft
GLBA Compliant Safeguards Rule 2023
WISP Ready Written Info Security Program
CCPA / CPRA California Privacy Compliant
CA DOI Ready Dept. of Insurance Standards
SOC 2 Aligned Security & Availability Controls
24/7 AI Monitoring Threat Detection & Response

The IT Threats That Keep Insurance Agency Owners Up at Night

Insurance agencies sit at the intersection of high-value personal data and complex multi-party transactions — making them prime ransomware and BEC targets. These are the four threats we eliminate for agencies across Southern California.

Producer Data Exfiltration

When a producer leaves your agency — or gets phished — their access to AMS360 or Applied Epic client records doesn't always disappear. Without role-based access controls, automated offboarding, and session monitoring, ex-producers can walk out with your entire book of business. We lock down every endpoint and revoke credentials within minutes of a departure notification.

High Risk

Ransomware Targeting Policy Databases

Ransomware groups specifically target AMS platforms because policy data — including SSNs, DOBs, property addresses, vehicle VINs, and financial information — commands high prices on dark web markets. A single encryption event can shut your agency down for days, destroy carrier relationships, and trigger a mandatory CA DOI breach notification. Our immutable backup architecture and AI-driven behavioral detection stop attacks before encryption begins.

Critical

BEC Wire Fraud on Premium Payments

Business Email Compromise attacks impersonating carriers or wholesalers redirect premium remittances and binding deposits to fraudulent accounts. With agency transactions routinely exceeding $50,000 per wire, a single successful BEC can be financially devastating. We deploy DMARC/DKIM/SPF enforcement, AI-powered email anomaly detection, and mandatory dual-authorization workflows for all outbound wire transfers.

High Risk

E&O Exposure from Inadequate Data Security

Errors & Omissions carriers increasingly scrutinize cyber hygiene during renewal. Agencies without a documented WISP, current penetration test results, or verified MFA on carrier portals are seeing premiums spike or coverage denied entirely. An unaddressed GLBA Safeguards gap creates a paper trail of negligence that can follow an agency through regulatory investigations, civil litigation, and E&O disputes. We close those gaps before they become liabilities.

Compliance Risk

Managed IT Services Built for Insurance Agencies

Every service in our $300/computer user flat rate is designed around the operational realities of independent agencies, MGAs, and brokerages — not one-size-fits-all MSP packages built for general offices.

Fully Managed IT & 24/7 Help Desk

Unlimited support for all agency staff — producers, CSRs, accounting, and management — via phone, chat, and remote session. We cover workstations, laptops, printers, and agency-issued mobile devices with no per-ticket billing. Average response under 4 minutes for P1 issues affecting AMS or carrier portal access.

  • Unlimited remote and on-site support
  • Proactive patch management for all endpoints
  • 24/7/365 AI-assisted monitoring and alerting
  • Agency management system (AMS) tier-1 support
  • Carrier portal connectivity troubleshooting

GLBA Safeguards Compliance & WISP

The 2023 GLBA Safeguards Rule requires insurance agencies that qualify as financial institutions to implement a comprehensive Written Information Security Program. IT Center creates, maintains, and tests your WISP, conducts annual risk assessments, and documents all the controls the FTC and CA DOI expect to find during an examination.

  • Written Information Security Program (WISP) authoring
  • Annual risk assessment with documented findings
  • Vendor / third-party service provider oversight
  • Incident response plan tailored to insurance
  • Board / owner-level security reporting

Remote Producer Security & Endpoint Protection

Your remote producers are your highest-risk endpoints — working from home offices, coffee shops, and client locations with access to the same policyholder data as in-office staff. We deploy enterprise EDR (Endpoint Detection and Response), DNS filtering, VPN enforcement, and device compliance policies that keep remote producers secure without limiting their productivity.

  • EDR with behavioral AI (CrowdStrike or SentinelOne)
  • Always-on VPN for AMS and carrier portal access
  • DNS-layer filtering and web content control
  • Mobile Device Management (MDM) for agency devices
  • Geo-blocking and impossible travel alerts

Email Security & BEC Prevention

Business Email Compromise is the leading cause of financial loss for insurance agencies. We implement multi-layered email security that stops impersonation attacks, flags wire transfer requests, and gives your staff real-time warnings when an email fails authentication checks or originates from a suspicious location.

  • DMARC, DKIM, SPF enforcement and monitoring
  • AI-powered BEC and phishing detection
  • Impersonation protection for carriers and wholesale brokers
  • Wire transfer flagging and dual-approval workflows
  • Security awareness training with phishing simulations

Backup, Disaster Recovery & AMS Continuity

If your AMS360 or Applied Epic instance goes down — whether from ransomware, hardware failure, or a corrupted update — your agency cannot quote, bind, or service clients. We implement immutable, air-gapped backups with tested recovery playbooks that restore your AMS environment to a defined recovery time objective (RTO) of four hours or less.

  • Immutable offsite backups with 90-day retention
  • AMS-specific recovery playbooks and runbooks
  • Quarterly restore tests with documented results
  • Business continuity plan for carrier portal outages
  • Ransomware recovery without paying ransom

Carrier Portal SSO & MFA Management

Managing MFA across 40+ carrier portals, rating platforms, and wholesale broker extranets is one of the most operationally painful aspects of running an agency. IT Center deploys Single Sign-On (SSO) solutions that centralize carrier portal access, enforce MFA consistently, and eliminate the password sprawl that leaves agencies vulnerable to credential stuffing attacks.

  • SSO deployment for carrier and wholesale portals
  • TOTP and hardware key MFA enforcement
  • Password vault management for shared credentials
  • Access reviews and privileged account audits
  • Conditional access policies by role and location

Identity & Access Management for Agency Staff

Role-based access is the cornerstone of both GLBA compliance and protecting your book of business. We implement least-privilege access models so personal lines producers cannot access commercial accounts, new hires cannot see premium financials, and departing employees lose all system access in minutes — not days after IT finds out.

  • Microsoft Entra ID / Active Directory management
  • Role-based access by producer, CSR, and management tier
  • Automated onboarding and offboarding workflows
  • Privileged access workstations for agency principals
  • Session recording for privileged account activity

Security Monitoring & Incident Response (MSSP)

Our AI-powered Security Operations Center monitors your agency environment 24/7 for threats that standard antivirus cannot detect — lateral movement, credential harvesting, anomalous AMS queries, and unauthorized data exports. When an incident is confirmed, our IR team engages in under 15 minutes and provides a full written report suitable for CA DOI, E&O carriers, and cyber insurers.

  • 24/7 SIEM monitoring with AI correlation
  • UEBA to detect insider threat and account takeover
  • Dark web monitoring for agency domain credentials
  • Incident response with chain-of-custody documentation
  • Post-incident regulatory breach notification support

GLBA Safeguards, WISP, and CA DOI Requirements

Insurance agencies are regulated as financial institutions under the Gramm-Leach-Bliley Act. The FTC's 2023 Safeguards Rule updates significantly expanded the technical and administrative controls required. Here is what the law demands and how IT Center delivers it.

GLBA Safeguards Rule 2023 — Key Requirements

  • 1
    Qualified IndividualDesignate a CISO or qualified security officer responsible for overseeing your information security program. IT Center provides a virtual CISO (vCISO) as part of the managed service.
  • 2
    Risk AssessmentConduct a periodic written risk assessment identifying reasonably foreseeable internal and external risks to customer information. We perform this annually with a written deliverable.
  • 3
    Access ControlsImplement and monitor access controls, including limiting who can access customer data and requiring MFA for any remote access to systems containing customer information. Required for all carrier portal and AMS access.
  • 4
    Data Inventory & ClassificationIdentify and manage the data you collect, store, process, and transmit — knowing where policyholder PII lives is the foundation of every other control.
  • 5
    Encryption in Transit and at RestEncrypt all customer information both when transmitting over external networks and when stored on devices or servers.
  • 6
    Secure Development PracticesAdopt secure development practices if you build or modify software that accesses customer information — relevant for agencies with custom integrations or quoting tools.
  • 7
    Penetration TestingConduct penetration testing at least annually and vulnerability assessments at least every six months.
  • 8
    Security Awareness TrainingImplement a security awareness program for all staff. IT Center provides role-based training with phishing simulations and tracks completion.
  • 9
    Incident Response PlanEstablish and test a written incident response plan addressing ransomware, data breach, and unauthorized access scenarios specific to insurance agency operations.
  • 10
    Vendor OversightOversee service providers by contract. Verify that vendors handling customer information maintain appropriate safeguards. We manage your vendor risk register and annual attestation process.

Written Information Security Program (WISP)

  • A
    What the WISP Must CoverThe GLBA Safeguards Rule requires that your WISP be written, comprehensive, and appropriate to your agency's size, complexity, and the nature of your customer data activities. A generic template does not satisfy the requirement.
  • B
    IT Center WISP Development ProcessWe interview agency leadership, map all data flows including AMS integrations, carrier connections, and third-party raters, then draft a WISP that specifically references your systems, staff roles, and business processes. Document is reviewed annually or upon material changes.
  • C
    WISP Testing and UpdatesYour WISP is a living document. We update it after incidents, after annual risk assessments, when you add new carriers or integrations, and when producers join or leave the agency.
  • D
    Board Reporting RequirementThe Safeguards Rule requires reporting to the board of directors or equivalent governing body at least annually on the status of your security program. We prepare the written report and can present to your ownership group.

California DOI & CCPA Requirements

  • CA
    CA DOI Cybersecurity RequirementsCalifornia Department of Insurance licensed entities must notify the DOI within 72 hours of discovering a cybersecurity event affecting policyholder data. Your incident response plan must be calibrated to this timeline. We provide breach notification support and regulatory liaison services.
  • CC
    CCPA / CPRA for Insurance AgenciesCalifornia's Consumer Privacy Rights Act grants policyholders rights to access, correct, and delete their personal information. Agencies must maintain a privacy notice, respond to consumer requests within 45 days, and document their data processing activities. We maintain your data inventory and support your privacy rights request workflows.
  • EO
    E&O Cyber Hygiene StandardsMajor E&O carriers including CNA, Chubb, and Travelers now require documented evidence of MFA, EDR, backup testing, and security training as conditions of coverage. IT Center produces the attestation documentation your E&O carrier requires at renewal.

Agency Management Systems & Software We Support

IT Center engineers have hands-on experience with every major insurance AMS platform, rating engine, and carrier integration tool used by independent agencies in Southern California. We understand the infrastructure requirements, backup considerations, and security configurations specific to each platform.

AMS360
Agency Management System — Vertafore

AMS360 is the most widely deployed AMS in the independent agency channel. IT Center supports AMS360 hosted and on-premise deployments, SQL Server backend maintenance, integration with Vertafore's Real Time and Download services, and IVANS connectivity. We ensure AMS360 meets GLBA Safeguards encryption and access control requirements.

SQL Server IVANS Real Time Hosted / On-Prem GLBA Ready
Applied Epic
Agency Management System — Applied Systems

Applied Epic's browser-based architecture introduces specific security considerations around session management, API integrations, and the Applied Pay payment processing module. IT Center configures conditional access policies for Applied Epic, manages the Azure AD integrations Applied Systems recommends, and supports Epic's carrier connectivity and download configurations.

Azure AD Applied Pay Browser-Based API Security
Hawksoft
Agency Management System — HawkSoft

Hawksoft is the preferred AMS for small-to-midsize independent agencies seeking a simpler, cost-effective platform. IT Center supports Hawksoft's Windows-based deployment model, manages the SQL Express or full SQL Server backend, and ensures Hawksoft backups are captured, tested, and retained in compliance with your WISP retention policy.

Windows SQL Express Backup Small Agency
EZLynx
Comparative Rater & Agency Platform

EZLynx serves as both a comparative rater and a lightweight AMS for agencies seeking a cloud-first approach. IT Center secures the endpoints used to access EZLynx, manages SSO integration, and ensures that EZLynx's carrier data transmissions are protected by enforced TLS and proper DNS filtering to prevent man-in-the-middle exposure.

Cloud-Based Comparative Rating SSO TLS Enforcement
QQCatalyst
Agency Management System — Vertafore

QQCatalyst's cloud-hosted model places the AMS outside your perimeter, meaning endpoint security and identity management become the primary control surfaces. IT Center configures MFA enforcement for QQCatalyst, manages API key security for integrations, and ensures your agency's QQCatalyst access complies with GLBA access control requirements.

Cloud Hosted MFA Required API Security Vertafore
IVANS & Downloads
Carrier Connectivity & Data Exchange

IVANS Transformation Station and carrier download configurations are a frequent source of data integrity and security issues for agencies. IT Center manages your IVANS connections, troubleshoots download failures, and ensures that the SFTP credentials and API tokens used for carrier data exchange are secured in a privileged credential vault with rotation schedules.

SFTP Carrier Download Credential Vault API Tokens
Microsoft 365
Productivity & Collaboration Suite

Microsoft 365 is the productivity backbone of virtually every insurance agency. IT Center manages your M365 tenant security, configures Defender for Business, implements Purview data loss prevention policies to flag outbound emails containing SSNs or policy numbers, and manages SharePoint / Teams governance to prevent unauthorized sharing of policyholder documents.

Defender for Business Purview DLP Entra ID SharePoint
DocuSign & E-Signature
Electronic Signature & Document Delivery

E-signature platforms transmit signed applications, binders, and policy documents containing policyholder PII. IT Center manages the identity verification configurations in DocuSign and similar platforms, ensures envelopes are routed only to verified recipient email addresses, and monitors for unauthorized envelope creation that could indicate a compromised account.

Identity Verification Envelope Security Audit Trail

What Makes IT Center Different for Insurance Agencies

Most MSPs treat insurance agencies like any other small business office. We treat you like the financial institution the GLBA says you are — with the security posture, documentation, and specialized knowledge your regulators and E&O carriers expect.

We Know Insurance, Not Just IT

Our team understands the difference between a personal lines CSR workflow and a commercial lines producer workflow, how carrier downloads work in AMS360, why IVANS connectivity issues happen on Monday mornings, and what E&O carriers actually look for during renewal assessments. We do not need a tutorial on your business.

Flat Rate Means No Surprise Bills After an Incident

At $300 per computer user per month, you get everything — monitoring, help desk, backup, WISP maintenance, security training, and incident response. When a ransomware event or breach occurs, you are not receiving an emergency services invoice on top of the crisis. Our response is included.

Remote Producer Security Is Our Specialty

You cannot enforce your office's firewall on a producer working from their kitchen table. We deploy zero-trust network access (ZTNA), per-device compliance enforcement, and behavioral monitoring that secures remote producers the same way we secure in-office staff — without limiting their ability to quote and bind in the field.

WISP We Actually Maintain

We have seen agencies produce a WISP template from the internet, sign it, and file it away. That is not compliance. IT Center writes your WISP from scratch based on your specific systems and data flows, then updates it at least annually and every time you add a carrier, integration, or producer. It is always current and always defensible.

Carrier Portal MFA Without the Operational Pain

Enforcing MFA across 40 carrier portals is operationally painful without the right identity infrastructure. We deploy a centralized SSO and MFA solution that gives your producers a single authenticated session for all their carrier portals — satisfying GLBA requirements without the help desk tickets and frustration of managing portals individually.

E&O and Cyber Insurance Renewal Support

When your E&O carrier sends the annual renewal questionnaire asking about MFA, EDR, backup testing, and security training, we provide the written attestation and evidence documentation you need. We also prepare the technical exhibits required by cyber liability carriers underwriting your agency's cyber policy.

Southern California Agency Relationships

We serve agencies throughout the Inland Empire, Los Angeles, Orange County, and San Diego. We understand the local regulatory environment, can appear on-site at your Corona, Riverside, San Bernardino, or LA-area office for hands-on work, and are available during Pacific Time business hours without routing through an offshore help desk.

Breach Notification Support When It Counts

California's 72-hour breach notification requirement to the CA DOI is one of the shortest regulatory response windows in the country. When an incident occurs, our incident response team is already engaged, documenting scope, and preparing the CA DOI notification materials — so you meet the deadline with a defensible, factual response rather than a frantic guess.

IT Center vs. Generic MSP for Insurance Agencies

Capability IT Center Generic MSP
GLBA Safeguards WISP authoring Included Extra cost or not offered
AMS360 / Applied Epic / Hawksoft support Deep knowledge ~ Limited / pass-through to vendor
Remote producer endpoint management Zero-trust ZTNA ~ Basic VPN if available
Carrier portal SSO and MFA enforcement Centralized SSO Per-portal manual setup
BEC wire fraud prevention AI + policy controls ~ Standard spam filter only
Incident response included in flat rate Always included Emergency billing applies
CA DOI breach notification support Included Refer to attorney
E&O renewal attestation documentation Written deliverable Not provided
Annual risk assessment (written) GLBA-compliant ~ Vulnerability scan only
Pricing model $300/computer user flat rate Per-device + hourly overages

Request Your Free GLBA Security Assessment

In 30 minutes, IT Center will evaluate your agency's current security posture against the GLBA Safeguards Rule 2023 requirements, identify the top three compliance gaps, and give you a clear, actionable roadmap — with no obligation and no sales pressure.

GLBA Safeguards Rule gap analysis at no cost
AMS360, Applied Epic, or Hawksoft security review
Remote producer and carrier portal risk assessment
Written summary of findings delivered same week
$300/computer user flat rate — everything included
(888) 221-0098 Mon–Fri 8am–6pm PST · Emergency 24/7

1159 Pomona Rd Suite B · Corona, CA 92882 · sales@itcosc.com

Schedule Your Free Assessment

We respond within one business hour. No spam. No pressure.

By submitting, you agree to our Privacy Policy. We never sell your information.