Gloved hand holding a hacked cell phone. Phones have become personal appendages and hackers lurk in the shadows looking for opportunities to fund illegal ventures on the dark web. (Photo: Shutterstock)

On a recent visit to my mom's house, she asked why I spent so much time on my phone. Not talking, which is the only use a phone has to her, but doing seemingly everything else. Online banking, changing my auto insurance coverages, ordering food, checking into my flight, ordering the Lyft to take us to dinner. You wouldn't think 26 years between mom and son would make that much of a difference, but in the world of technology, it does.

Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader

  • All PropertyCasualty360.com news coverage, best practices, and in-depth analysis.
  • Educational webcasts, resources from industry leaders, and informative newsletters.
  • Other award-winning websites including BenefitsPRO.com and ThinkAdvisor.com.
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.