Choose A Category

Business Insurance

Continue Reading
+

Do you know who’s sending you emails?

There’s a cyber threat in your inbox. It’s Business Email Compromise (BEC) or CEO fraud, and the FBI says thieves are using your own company employees as their accomplice. […]
Continue Reading
Continue Reading
+

Why Construction Companies Need to Build Better Cybersecurity

You may be too busy building to notice the threat of cybercriminals. Yet the construction industry has become a more attractive target, especially given the industry’s high cash-flow nature. […]
Continue Reading
Continue Reading
+

Cyber Criminals Steal More Than Data

Airplanes, ATM machines, automobiles, cash registers, industrial machinery, medical equipment – all controlled by computers. It can be a bit overwhelming when you stop to realize how many opportunities […]
Continue Reading
Continue Reading
+

Criminals calling—how to protect against mobile malware

It’s a big problem that can fit in the palm of your hand—mobile malware and the security risk all those employee smartphones represent to your company. As more and […]
Continue Reading
Continue Reading
+

Are You Ready? Elements of a Strong Cyber Incident Response Plan

In last week’s post, we reviewed the importance of a cyber incident response plan along with a list of steps to mitigate damage once a breach has occurred. This […]
Continue Reading
Continue Reading
+

Are You Ready? Elements of a Strong Cyber Incident Response Plan

“Do we have an up-to-date, battle tested Cyber Incident Response Plan?” That is one of the important questions we’ve urged every corporate executive to ask themselves and their executive […]
Continue Reading
Continue Reading
+

What You Don’t Know Can Hurt You

Now the fact of the matter is that cyberattacks don’t have to come from big, well-organized forces. You know, one smart person and one bad person can do an […]
Continue Reading
Continue Reading
+

Cybersecurity: A risk leaders can’t afford to overlook

According to FBI Director James Comey, the computer systems in nearly every company have been hacked. The question is whether or not companies are even aware when it happens. […]
Continue Reading
Continue Reading
+

How to protect intellectual property with more than a policy

Just because your company doesn’t make widgets or gadgets or ship “things” out in boxes, doesn’t mean there isn’t anything that can be stolen. In fact, customer data, operational […]
Continue Reading
Continue Reading
+

OSHA delays start date of anti-retaliation provisions

You get to circle a new date on the calendar. Although originally scheduled to start August 1st, enforcement of the new anti-retaliation provisions related to employee reporting of injury […]
Continue Reading