HOT TAKES. ONE PLACE.

There's a LOT to know about insurance. So, whether you've got a specific question or just want the 411 on what we do, click around on the articles below.

Laptop and glasses
 
Cyber, Risk Management Megan Henderson Cyber, Risk Management Megan Henderson

Cyberespionage Explained

Cyberespionage is a type of cyberattack that involves an unauthorized user (or multiple users) accessing a victim’s sensitive information in order to secure economic benefits, competitive advantages or political gain. Also known as cyberspying, the primary targets of such cyberattacks include government entities, large corporations and other competitive organizations.

Read More
Cyber, Risk Management Megan Henderson Cyber, Risk Management Megan Henderson

Jackware Cyberattacks Explained

Ransomware incidents entail cybercriminals compromising their victims’ computers or servers with malware and demanding large payments in order to restore the technology (as well as any files or data stored on it). They have often been considered one of the most damaging cyberattack methods.

Read More
Risk Management, Workplace Safety Megan Henderson Risk Management, Workplace Safety Megan Henderson

Active Shooter Incident Preparedness and Response Strategies

In recent years, active shooter incidents have become a growing concern across the United States. Also called a mass shooting in some situations, such an incident refers to an individual or group of individuals entering a populated area in order to kill or attempt to kill their victims, generally through the use of firearms.

Read More
Cyber, Risk Management Megan Henderson Cyber, Risk Management Megan Henderson

Credential Stuffing Cyberattacks Explained

Credential stuffing incidents entail cybercriminals leveraging stolen usernames and passwords in attempts to gain access to additional accounts and systems. For example, a cybercriminal may obtain a target’s username and password for a social media account and use those same login credentials to try and access the victim’s other systems (e.g., email accounts, banking applications or workplace networks).

Read More
Risk Management, Workplace Safety Megan Henderson Risk Management, Workplace Safety Megan Henderson

Protect Workers from Noise Exposure with Hearing Conservation Programs

Nearly half (46%) of manufacturing workers have been exposed to hazardous noise levels at some point during their employment, according to the American Journal of Industrial Medicine. Equipment such as rotors, power tools, stators, gears, fans, impact processes and electrical machinery can all generate significant amounts of noise, which can negatively affect employees’ hearing.

Read More
Cyber, Risk Management Megan Henderson Cyber, Risk Management Megan Henderson

Cyber Hygiene Best Practices

As cyberattacks become more frequent and severe it is increasingly important for organizations to practice good cyber hygiene to minimize their exposure to risk. Cyber hygiene refers to habitual practices ensuring critical data and connected devices are handled safely.

Read More
Risk Management Megan Henderson Risk Management Megan Henderson

Age Discrimination in the Workplace

Age discrimination, or ageism, in the workplace involves treating an applicant or employee unfavorably because of their age. The Age Discrimination in Employment Act (ADEA) forbids age discrimination against people aged 40 or older in all aspects of employment, including hiring, firing, pay, job assignments, promotions, layoffs, training and benefits.

Read More
Risk Management Megan Henderson Risk Management Megan Henderson

Construction Risk Advisor | April 2022

Throughout the past year, material prices across the construction sector have soared, negatively impacting both contractors and their clients. These rising costs have resulted from a combination of continued supply chain shortages and surging demand amid the ongoing COVID-19 pandemic.

Read More