When COVID hit, many business owners faced the dire realization that the insurance they paid so much for did not cover the business interruption resulting from the pandemic exposures. To help guard against that type of unexpected disruption in the future, many business owners have set up captives—a lucrative alternative risk financing structure—to navigate the risk and insurance challenges they face.
Resource Search
The C-suite faces tough operational obstacles as competition for talent remains fierce and employers experience higher-than-average turnover. In navigating the challenges, this report addresses the current and upcoming trends in healthcare, compliance and benefits, and provides practical solutions for employers to negotiate these challenges.
Corporate insiders pose a unique threat as they are given privileged access to the company’s assets and are trusted to use that access responsibly and ethically. However, this can go awry in several ways, from unintentional, negligent acts to intentional, malicious acts. To help prevent, detect, and respond to that threat, it’s important to address the three key risks when evaluating your Insider Threat Program.
In this podcast episode, learn more about the latest updates on mandatory vaccine and mask policies, new action to ban non-compete agreements, a big free speech decision, New York regulatory updates, and a proposed wage and hour rule.
When a catastrophic event occurs and total loss and devastation ensues, the reality is that people may decide not to rebuild, and in some cases abandon their ‘property.’ While the choice remains with the owner of the property as to whether or not to repair, there are conditions within your insurance policy that you need to consider.
All modern vehicles are vulnerable to cyberattacks; particularly as “smart cars” become more prevalent, hackers have greater opportunities to penetrate, control, and steal information from vehicle systems. Learn about the types of cyber attacks that are prevalent with smart cars and what you can do to avoid them.
Remote work, IoT devices, and new technologies create risk for your personal data at home. Learn how you can mitigate these risks with this infographic.
This checklist and visual representation of a home is a helpful guide on how to protect your privacy while working from home. These simple tips can be a difference maker.
Board oversight is critical in the management of cybersecurity as a whole, but especially for ransomware, since the increase in attacks year-over-year is up as much as 715% according to a study by Cyber Florida at the University of South Florida. If it isn’t already, cybersecurity should be on your board agenda at every meeting. As a starting point, the board needs to understand the layers of defense available to mitigate ransomware risk and design their responses to the threats accordingly.
In this podcast, two industry experts discuss how boards’ oversight of data governance within their organizations is changing to meet the opportunities and risk in the rapidly evolving digital space in which organizations are conducting their business. The key takeaways: