Our agents and customer service representatives specialize in various lines and claims to make certain we provide top service to meet every client's needs. Read More
Covering your business, your car, your home… and you.
From a small company creating its first employee benefits program to a large firm with hundreds of employees, we bring an expertise in risk assessment and knowledge of the best options. Read More
The options for individual coverage are so plentiful, diverse, and ever-changing that it is essential to have a knowledgeable, experienced guide to develop a plan that meets your needs. Read More
When you add an employer-sponsored retirement plan to your employee benefits package, you are adding a valuable asset for attracting and retaining employees. Read More
About the Agency
Anticipating risk and providing protection against it is challenging in today’s volatile climate. While there will always be many options for businesses and individuals to mitigate risk with insurance solutions, nothing can replace having a trusted advocate who can guide you through the options and help you find what is right for your situation.
“There are so many good things to say about Summit Insurance Services/Kelly Insurance that it is hard to focus on just one, or even just a few. Since taking over as my company's broker, they have improved the quality of the insurance for my company and employees, while containing and, in some cases, reducing cost. What Summit/Kelly provides should stand as a model to all companies for how they should treat their customers. “
~ Dawn Legere, PD Systems
OVERVIEW On May 16, 2016, the Equal Employment Opportunity Commission (EEOC) issued final rules that describe how the Americans with Disabilities Act (ADA) and the Genetic Information Nondiscrimination Act (GINA) apply to employer-sponsored wellness programs. The final ADA rule provides … Continue reading article
4 Important Takeaways From Verizon’s 2016 Data Breach Investigations Report According to Verizon’s 2016 Data Breach Investigation Report, cyber criminals are exploiting well-known methods and published vulnerabilities in the majority of data breaches. In fact, four key findings reflect some … Continue reading article