In recent years, small businesses have suffered around 31% of cyber attacks. It’s clear that an effective data security policy is essential to avoiding these attacks, and in order for a policy to be effective there are key elements that must be included in the framework. In a world where 52% of breaches are caused by human and system failure vs. malicious intent, it’s imperative that the policy you create be shared and well-understood by all employees at your company. By incorporating the following key elements into your data security policy, your company will be in a better position to beat the odds.[Read more…]
New England is known for some of the most picturesque scenes in America. Many buildings are packed with history, still retaining the unique architecture of centuries past. Many of these historic landmarks have been preserved in their original format due to historical significance. Unfortunately, there are many reasons that buildings must be torn down. Law and ordinance coverage is important to have as structures age and codes are updated: many buildings must be renovated at best and demolished at worse.[Read more…]
In today’s workplace, it is more important than ever to be aware of the security risks that lurk at every corner of the digital space. Even more important, is having safeguards in place to protect against any threat, breach, or attack that may come your company’s way. Though no one method can be guaranteed foolproof 100% of the time, by utilizing practices for risk management, you are putting your company in a much better position to beat the odds. Here are our suggested best practices.
Getting into an accident is stressful enough on its own, but add an uninsured driver to the mix and things get even trickier. In most states it is illegal to drive without auto insurance. Unfortunately, people choose to break this law everyday. In the United States, about 1 in 8 drivers on the road is uninsured. If you were to get into an accident with an uninsured motorist, would you know what to expect? Let us help you get up to speed.
Preparing for a workers’ compensation audit is something that is often dreaded. Going through all the steps can be quite tedious, and any oversights in the process can lead to unpleasant surprises in the form of costly charges. However, if you make a conscious effort to thoroughly understand the audit process and prepare for it in advance, the following common mistakes can be avoided.
Any step taken to protect your business against liabilities resulting from breached or failed technology is a step in the right direction. However, a business must be sure not to confuse policies and assume coverage exists where it does not.
Two policies that are commonly mistaken for the other are technology errors and omissions insurance (tech E&O) and cyber and privacy insurance. Although both policies contain a number of the same insuring agreements, there are key differences. [Read more…]
Confronting the possibility of a cyber threat affecting your business is a daunting, yet absolutely necessary task. It can happen to any business, large or small, at any time. Businesses that will thrive in the aftermath of an attack will have understood their risk prior, and made appropriate steps to protect themselves. Risk managers and insurance agents must work together to address exposures faced by the entity they have been enlisted to protect. [Read more…]
The Internet of Things is a concept that encompasses a multitude of complexities, and has become an increasingly hot topic in the workplace. If up to this point, the term has drawn a blank for you, don’t worry; you will just need to start with the basics. Here are 3 key points to help you in gaining a fundamental understanding, so that you may start the learning process and begin take part in the conversation. [Read more…]
Social engineering is a method that cyber criminals use to trick individuals into revealing confidential information to gain access to systems. Once obtained, that information can be used to carry out actions that could lead to the demise of your organization; a whopping 60% of small companies go out of business within six months of a cyber-attack. Fortunately, knowledge is power. Here are the most common social engineering attacks to look out for. [Read more…]
When asked, many small businesses will express concern about cyber security. However, a clear disconnect exist when less than half (49%) allocate any budget toward mitigating their risk. Before an attack can be prevented, a business needs to acknowledge where it stands. Is your business on the right side of these key cyber security statistics? [Read more…]