As an employer, what do you do if you suspect that one of your employees has COVID-19? When is it safe and compliant for your employee to return to work after COVID-19; after a case that is suspected or confirmed? To support you in answering these questions, use this flowchart to help you enable a safe working environment, be in compliance, and reduce risk and liability for your business.
Resource Search
Get the facts before hail damage hits. Hailstorms come on suddenly, and homeowners often feel pressured to make repairs just as fast. See how applying top precautions can help you make informed decisions in the event of hail-related roof damage.
At some point in a business relationship, differences of opinion are likely to arise. In businesses where there are equal owners of the company or in a 50/50 business, it is important to ensure that there are carefully drafted governing documents that detail the process for resolving a conflict or impasse. Learn the common mechanisms for resolving such standoffs and give careful consideration when drafting dispute resolution or divorce provision.
As COVID-19 cases have spiked across the country, many businesses have adjusted certain operations with an eye on customer and employee safety, as well as to ensure compliance with recent changes to government orders. Some businesses have faced challenges that they have not seen since last spring. As the average daily death totals in the U.S. remain high, there a few things to consider when proceeding to re-open and establish new processes in the face a dynamic environment.
After a very difficult 2020, rapid vaccine development has sparked optimism among the public and in the business community. But there’s a long road ahead while infections remain high. During this transition period—when vaccines are becoming more widely available, but before the country achieves herd immunity— businesses should consider and anticipate a few things, including that certain individuals may not comply with COVID policies.
When a ransomware attack happens, it forces many organizations to make a difficult choice—pay the ransom or experience prolonged business or data loss. But there is also another complication for organizations to consider—the government regulators warning companies that payments made to ransomware attackers may constitute violations of U.S. sanctions. Further complicating matters is the move by many organizations to cloud storage. When moving data to the cloud, an organization still retains liability for that data in the eyes of the law.
Third-party vendors can range from custodial companies, to IT services, to professional service firms. Whatever their contracted function, they have access to your physical premises and/or your network data. So how can you make sure that when you’re signing a contract with an outside vendor, you’re not exposing yourself and your clients to excessive risk? There are four best practices you should follow before signing the dotted line.
The COVID-19 pandemic has led to an acceleration of adoption of cloud solutions and other remote access tools. However, hasty adoption of any new technology that is not combined with robust security frameworks, policies, and controls can leave businesses vulnerable. A formal vendor management process and having specific controls in place can mean the difference between a cloud solution being a huge advantage to agile solutions or leaving the business open to attacks and unauthorized access.
Organizations across the wealth management landscape face an array of technology risks that are growing more prominent in a post-COVID environment. While keeping an eye on the future and building resiliency, learn how to turn five tech risks—including the rise of disruptive technologies—into an opportunity that goes beyond adopting the right technology.
The more we use social media to share updates, pictures and videos with friends and family, the easier it can be for cybercriminals to steal our information. See how you can use social media safely to protect yourself and your private information from cybercriminals.