From the category archives: Insurance Protection Blog

Small Business

Oh no. Where did all of my clients information go?!?

post image I find it fascinating … I have been immersed in the insurance industry for close to 30 years now. I serve on industry boards, I speak at conferences and my clients consist of businessmen from Fortune 500 companies to the Mom and Pop shop down from our Corporate Headquarters. I have sat with entrepreneurs that are just beginning in the world of small business, to executives who have 40 years in their chosen industry. They often inquire as to my opinion on insurance for their company and I am happy to give them advice and recommendations. But it is simply fascinating to me that often when I mention Cyber-Security Insurance, businessmen that I am speaking to, often look at me with confusion, unsureness and complete doubt. It seems to me, that many business people, I talk to, are under the false impression that: *We are too large to have any security issues – Our company has invested into the most sophisticated firewalls and blocking mechanisms currently available for our information system ...
Read the rest of entry »

Cyber Criminals - More than Just the Geek in the Basement

post image Usually in movies they are portrayed as a maniacal recluse. Sitting in front of multiple computer screens, with AC/DC blasting and crumpled cups of coffee and Red Bull scattered all over the desk and the floor. Or as a “V for Vendetta”, Guy Fawkes-styled freedom fighters with a score to settle. Cyber Criminals, Hackers, Data Thieves are the designations we have given them. And they come in all shapes, sizes and forms, from all walks of life, male/female, rich and poor. Their motivation is as varied as their backgrounds. Some choose to become hackers because they seek revenge on someone who betrayed them. This category includes employees of businesses; citizens angry against the government; lovers who feel they have been wronged. Other cyber criminals are looking for monetary gain, often holding data “hostage”. Businesses need to pay a “ransom’ to receive a “key” to be able to unlock and access their data. Since the inception of mainframes and shared/networke ...
Read the rest of entry »

Workplace accidents occur in a fraction of a second.

post image It happens in less than a second. One moment an employee is on the job, working hard, smiling and looking forward to the weekend. The next moment, he is sprawled out on the floor, grabbing his knee, unable to get up, his leg bent at a peculiar angle. The receptionist picks up the phone, calls 911 and you can hear the sound of a siren in the distance. On the job/work place injuries and accidents happen in less than an instant, but can have long lasting effects and huge financial impacts. Workers' Compensation insurance is legally required in most states as long as your business has a single employee. It covers medical and disability expenses related to work-related sicknesses and on-the-job injuries.  Employers' liability coverage, which is an aspect of most worker’s comp policies, protects your company in case of litigation, by paying legal fees and any awarded settlements should an employee sue you, claiming that an illness or injury was caused by your company's negligence or failure to provide ...
Read the rest of entry »

One of the biggest “holes” in your defense against a data breach is the cell phone.

post image I was fascinated to read the results of a recent survey from the Ponemon Institute (for Cyber Research) A little background first, the Ponemon Institute was founded in 2002 by Dr. Larry Ponemon. Headquartered in Michigan, the Ponemon Institute is considered the pre-eminent research center dedicated to privacy, data protection and information security policy. They publish multiple monthly reports, surveys and data concerning all things “cyber.” The following TWITTER post jumped out at me when I was scrolling through the site last week: 51% of respondents on a recent survey do not take any steps to protect the data that is connected to their cell phones. (Ponemon Institute) That is a shocking statistic and I was so amazed at that sentence that I downloaded the entire report and read each word (link to website below) It gets a bit worse… Here are the accompanying statistics: ·      Only 20 percent of respondents describe their use of smartphones or table ...
Read the rest of entry »