Skip to main content
Category

data

“Essential 8” IT Security Recommendations When Returning To The Office

By backup, backup solutions, Commercial, Cyber, cyber security, cybersecurity, data, data restoration, Education, Employees, information technology, Insurance, loss prevention, malware, malware attack, Microsoft Office, multi-factor authentication, office, operating system, original equipment manufacturer, preventative maintenance, ransomware, Risk Management, software, Technology, vpn, web browser

The office has been disinfected, work spaces are rearranged, and now we can begin our return to working in the office. But has the company planned for IT security challenges? Tab Bradshaw, Chief Operating Officer at Redpoint Security, has put together…

Read More

“Essential 8” IT Security Recommendations When Returning To The Office

By backup, backup solutions, Commercial, Cyber, cyber security, cybersecurity, data, data restoration, Education, Employees, information technology, Insurance, loss prevention, malware, malware attack, Microsoft Office, multi-factor authentication, office, operating system, original equipment manufacturer, preventative maintenance, ransomware, Risk Management, software, Technology, vpn, web browser

The office has been disinfected, work spaces are rearranged, and now we can begin our return to working in the office. But has the company planned for IT security challenges? Tab Bradshaw, Chief Operating Officer at Redpoint Security, has put together…

Read More

May the Coverage Be With You!

By Builders Risk, Business, catastrophic event, cause of loss, cloud storage, Commercial, commercial building, commercial insurance, construction, coverage, Cyber, cyber security, data, deductible, employee, Employees, exposure, exposures, inland marine, Insurance, Liability, liability insurance, risk, risk assessment, Risk Management, safety, Technology, underwriter, workers' compensation, workplace, workplace safety

One of the toughest parts of commercial insurance is identifying all of the exposures a business might have. I met with a new client yesterday, Darth Vader, who is the Operations Manager for a business called The Empire. It sounds…

Read More

Stay Cyber Secure When Connecting Remotely

By Business, Commercial, Communication, computer attacks, Cyber, cyber hygiene, cyber risk, cyber security, cyberattack, CyberScout, cybersecurity, data, Employees, hackers, Insurance, Internet, malware, malware attack, mobile security, Personal, phishing, Prevention, ransomware, scam, secure, security, smishing, Technology, vishing, webcam

COVID-19 has forced people from their workplaces and schools. Working from home and homeschooling means that millions of Americans are using video conferencing for the first time. With this surge in new users, there will be many cybersecurity challenge…

Read More

Juice Jacking: What You Need to Know

By cell phone, cyber security, cybersecurity, data, data backup, data breach, Insurance, malware, malware attack, mobile device, mobile security, Personal, Personal Cyber Protection, personal data, personal information, Personal Insurance, Prevention, protecting your data, smart phone, Technology, USB flash drive

We have probably all been to a public building where there are signs offering a free service to plug in your device at a charging location. Without thinking, we hurriedly plug in our device to the USB, by either using our…

Read More