Meet Jenny Schlichting, a Senior Client Manager at Schauer Group.
Join host and moderator, Nicole M. Thorn, health care attorney, as she discusses important considerations for health care owners and operators regarding their business insurance coverage with guest and certified property and casualty underwriter, Bryan Schauer of Schauer Group. Specifically, they will discuss key coverage areas in employment practices, cyber liability and medical malpractice insurance coverage policies.
A compromised inbox is a treasure trove of corporate information that can then be exploited by a cunning criminal.
By applying multi-factor verification to more of your accounts, such as email, social media, and more, you can better secure your information and identity online.
Download and adapt this sample Cyber Security Policy for your organization. A Cyber Security Policy forms the foundation of the corporate Information Security Program and enables the IT team to manage the security of information assets and maintain accountability.
It is often assumed that smaller businesses can escape attention from cyber crooks, but according to industry experts, an increasing number of data breaches are occurring at companies with fewer than 100 employees.
While no cyber security method is foolproof, using two-factor authentication can add an extra layer of security to your online accounts.
It’s important for board members to be actively involved in developing and promoting effective workplace cybersecurity measures—especially as it pertains to ransomware attacks.
It’s not enough to simply protect workplace technology with software and security protocols. It’s also critical for your organization to test the overall effectiveness of these protocols on a regular basis. That’s where penetration testing can help.
While there are numerous benefits of implementing a BYOD policy at your workplace, it can be problematic from an e-discovery standpoint, should your company enter litigation.