Cyber Insurance
Mobile Device Security
The methods and tactics of hackers are constantly changing, but one thing that remains the same is that those purveyors of ransomware and other malware are always looking for the weak link in your defenses. You’ve probably devoted a lot of attention to locking down your company network and devices, but what about the phones…
Read MoreManufacturing Industry Trends
Looking ahead, certain factors indicate the manufacturing industry is poised for continued growth in the future. Yet, some sector developments could pose challenges in the coming months and years. Labor Shortages The past few years have been met with labor shortages across industry lines. Furthermore, the pandemic motivated many employees to reevaluate their job expectations and…
Read MoreHow to protect your business against “Smishing”
Most businesses and individuals are familiar with phishing, which entails cybercriminals leveraging fraudulent emails to manipulate recipients into sharing sensitive information, clicking malicious links or opening harmful attachments. While these scams remain a pressing concern, a new form of phishing—known as smishing—has emerged over the years. WHAT IS SMISHING? Smishing relies on the same tactics…
Read MoreCyber Attacks – A Growing Business Interruption Threat
When you think about what usually causes a business interruption, natural disasters such as fires, earthquakes and floods probably come to mind first. These events can physically damage your property and equipment, making your workspace unusable for a time. The damages from Hurricane Katrina and Superstorm Sandy are great examples of how a natural disaster…
Read MoreWhat is Business Email Compromise (BEC)?
Business email compromise (BEC) is a form of phishing that occurs when a cybercriminal impersonates a legitimate source to trick employees into wiring money, sharing sensitive information or engaging in other compromising activities. Unlike more traditional phishing attacks that target a large group on individuals, BEC attacks are crafted to appeal to specific individuals –…
Read MoreCommon Types of Construction Insurance
As contractors, it’s important to understand what types of insurance your business should have and why. You work hard – make sure you’re properly covered for unforeseen circumstances that could harm your business. Check out this list of recommended insurance policies: Workers’ compensation—Workers’ compensation covers work-related employee injuries or illnesses. While injuries are infrequent, they…
Read MoreCyberthreats in Construction
Incidents involving ransomware and other types of malware have reached epidemic proportions over the past few years, and the construction industry has absorbed more than its share of the damage. A recent study by Safety Detectives found that construction was the third-most targeted industry in North America in 2021, with 13.2 percent of all attacks.…
Read MoreCallback Verification: What it is and Why You’ll Need it
Cybercrime comes in so many variations that it’s hard to keep up: Phishing, spear phishing, smishing, whaling, pharming … it’s enough to make your head spin. All have one thing in common, though, and that’s an attempt by a cyber thief to separate your business from its money by pretending to be someone else. The…
Read MoreCyber Liability Insurance: More than Ransomware
When you think of cyber liability coverage for your business, you probably think of ransomware attacks, and with good reason: Ransomware incidents have spiked over the past few years, as have the associated costs. In many cases the actual ransom amount, steep though it may be, pales in comparison to the associated costs of recovery…
Read MoreCyber Security for Small Businesses
Despite significant cyber security exposures, 85% of small business owners believe their company is safe from hackers, viruses, malware or a data breach. This disconnect is largely due to the widespread, albeit mistaken, belief that small businesses are unlikely targets for cyber attacks. In reality, data thieves are simply looking for the path of least…
Read More