Removing Autos from Your Business Auto Policy

Question: Business is bad and I need to save some money on my auto insurance. I want to delete the coverage on some vehicles that aren’t being used right now. They are stored in a secure parking area. Is that OK? Answer: Removing vehicles you still own from your auto insurance policy is probably not…

Cyber Checklist for Risk Managers

If the value of personal information makes us vulnerable, the value of health care information exponentially expands the bullseye. According to Reuters, medical records are worth up to 10 times more than credit card numbers on the black market. As a health care organization, it is our responsibility to protect the integrity of our patient’s…

Your Cyber Security Rests on Your Weakest Link and Your Lawyers

According to the Association of Corporate Counsel, “employee error” is the most common cause of data security breaches for employers. Other common causes of security breaches included insiders stealing company data and phishing attacks. The survey of 1,000 in-house lawyers for organizations in 30 countries found that most respondents anticipate that their role in cybersecurity,…

The Hyatt Data Breach: What It Means for Employers and Employees

A number of hospitality firms were victimized by hackers in 2015. On November 30th, Hyatt Hotels discovered that hackers “managed to breach its network, access the payment processing system and possibly steal payment-card information belonging to visitors.” The spokesperson for the hotel chain did not give details about the scope of the attack: how many…

Microsoft & IRS Scam Phone Calls

A few weeks ago a friend received a call on her cell phone. A gentleman said he was calling from “Microsoft” to fix her computer. She told him he needed to talk with “her techie husband” and handed me the phone. I promptly hung up. She wanted to string him along. I did not want…

FBI Reports Hackers are a REAL Problem

The FBI reports hackers have stolen $1.2B from more than 7,000 businesses in the past 2 years, most often using a scam known as business email compromise (hacking the CEO’s email account and then sending emails from that account telling employees to transfer money). Some good things to keep in mind: ·      Establish a multi-person…