Third-party vendors can range from custodial companies, to IT services, to professional service firms. Whatever their contracted function, they have access to your physical premises and/or your network data. So how can you make sure that when you’re signing a contract with an outside vendor, you’re not exposing yourself and your clients to excessive risk? There are four best practices you should follow before signing the dotted line.
Resource Search
The COVID-19 pandemic has led to an acceleration of adoption of cloud solutions and other remote access tools. However, hasty adoption of any new technology that is not combined with robust security frameworks, policies, and controls can leave businesses vulnerable. A formal vendor management process and having specific controls in place can mean the difference between a cloud solution being a huge advantage to agile solutions or leaving the business open to attacks and unauthorized access.
Organizations across the wealth management landscape face an array of technology risks that are growing more prominent in a post-COVID environment. While keeping an eye on the future and building resiliency, learn how to turn five tech risks—including the rise of disruptive technologies—into an opportunity that goes beyond adopting the right technology.
The more we use social media to share updates, pictures and videos with friends and family, the easier it can be for cybercriminals to steal our information. See how you can use social media safely to protect yourself and your private information from cybercriminals.
Crafting the right message can be tricky at the best of times—add a global pandemic and new vaccine to the mix and the process can be downright terrifying. Depending on the needs and culture of your organization, you may use one or a combination of these communication approaches when deciding on whether to roll out a vaccination awareness campaign for your employees.
As many as 20% of family offices have knowingly experienced a cyber security attack prior to the coronavirus pandemic, and it’s likely that number is significantly higher today. Learn how to build cyber protection from the surge in cybercrime, including how to reduce your digital footprint and what to do if you become a victim of a cyber breach. Protection also means having cyber insurance and knowing the essential elements it should cover.
In the wake of the COVID-19 pandemic, cybercrime syndicates and hackers have been busy: the FBI estimates there’s been an 400% spike in cybercrimes since the onset of the pandemic. In this infographic, learn what’s at stake for affluent and high-net-worth individuals—and how to build protection from the surge in cybercrime.
Water damage is one of the biggest challenges for property managers. Improving plumbing infrastructure and creating a risk mitigation plan can be the difference between sinking or swimming until your next insurance renewal. Learn the five ways to minimize your risk and the cost of water damage. Every preparation you take to combat future water damage will provide coverage opportunities in the present.
A vaccinated and protected workforce will be the key to ending the pandemic and emerging from the COVID crisis. Employers are uniquely positioned, if not charged with, leading this effort, but a myriad of legal pitfalls must be considered. In this webinar, we explore the following legal and practical issues for employers:
Based on decades of firsthand experience, the Hurricane Protection Unit of AIG provides insights and lessons learned from the front lines to help enhance your home’s resiliency in the event of a major storm.