
CLAIMS
Claims Service and Expertise
When you need to make a claim, you want to work with experts who understand your loss and what to do. That’s why at Great American, our claims professionals specialize in the markets they serve. We'll pair you with claims professionals who have deep industry experience and understand your organization’s specific needs.
What do I need to report a claim?
-
Your Name
-
Your contact information (address, phone number and email)
-
Your connection to the claim (For example, are you the policyholder, the agent, an injured party or a witness?)
-
A Great American policy number (as available)
-
The type of loss – auto, property, workers comp, general liability
-
Details of what happened
Report a claim
Other Contacts
Workers' Compensation Claims
Electronic Billing Information
Medical providers can submit bills directly through the Data Dimensions electronic billing system. If you have questions, contact Data Dimensions.
Claims Payments Via Electronic Funds Transfer
To receive Workers' Compensation claims payments electronically, complete this form, and email or mail it to our offices (as noted on the form).
Not sure where to go?
If you're not sure how to proceed, contact our Call Center team.
844 GAIG NOW (844-424-4669)
Option 1: new claims
Option 2: existing claims.
Please call during our regular business hours of 8:00 a.m.-5:00 p.m. Eastern.
Additional Resources
Our claims professionals specialize in the markets they serve.
Zero Trust Security: A Modern Approach to Cybersecurity
Rethinking Network Protection for the Digital Age
Cyber threats like data breaches and ransomware attacks are becoming more frequent and sophisticated. Traditional security models, which assume everything inside a company’s network is safe, often fall short. That's where Zero Trust Security comes in. This modern strategy challenges outdated assumptions and strengthens your organization’s defenses.
What Is Zero Trust Security?
Zero Trust Security isn't a single product. It's a strategic mindset. It requires every user, device and application to prove trustworthiness before access is granted. The core principle is simple: Never trust, always verify. Whether someone is working remotely or on-site, they should meet the same rigorous security standards.
This approach helps protect sensitive data, simplifies network management, and reduces the risk of cyberattacks.
Why Traditional Security Models Fall Short
Conventional security relies on a perimeter, a digital fence around the network. But with remote work, cloud services and mobile devices, that perimeter is no longer reliable. Once a threat actor breaches the perimeter, they can move freely within the network. Even trusted insiders can unintentionally or deliberately cause harm. And with data spread across platforms, securing it all becomes increasingly complex.
Core Principles of Zero Trust Security
Zero Trust Security is built on four foundational principles:
- Verify explicitly: Always confirm the identity, location, device and intent of anyone requesting access.
- Use least privilege access: Grant only the minimum access necessary to perform a task.
- Assume breach: Design systems with the expectation that a breach may already exist.
- Microsegmentation: Divide the network into isolated segments to limit lateral movement and contain threats.
These principles are supported by technologies, such as multi-factor authentication (MFA), identity management systems, and tools that isolate network components to reduce exposure.
How to Get Started
Implementing Zero Trust Security is a phased process:
- Assess your current environment: Identify areas where trust is assumed and vulnerabilities exist.
- Prioritize critical assets: Focus on protecting your most valuable data and systems.
- Map data flows: Understand how information moves across your network to apply appropriate controls.
- Deploy protections: Use secure access platforms, identity providers, and monitoring tools.
- Continuously improve: Zero Trust Security is not a one-time fix. Ongoing updates and monitoring are essential.
Future-Proof Your Network with Zero Trust Security
Zero Trust Security is more than a trend. It’s a practical and proactive way to secure today's digital businesses. By eliminating blind trust and enforcing continuous verification, organizations can better defend against evolving cyber threats. In a landscape where breaches are a matter of when, not if, Zero Trust Security is a must-have strategy.
- Cyber Security
- Cyber Risk
- Loss Control




