Meet Jenny Schlichting, a Senior Client Manager at Schauer Group.

Podcast: Health care checkup – Are you properly covered?
Join host and moderator, Nicole M. Thorn, health care attorney, as she discusses important considerations for health care owners and operators regarding their business insurance coverage with guest and certified property and casualty underwriter, Bryan Schauer of Schauer Group. Specifically, they will discuss key coverage areas in employment practices, cyber liability and medical malpractice insurance coverage policies.

Email Multi-Factor Authentication Helps Shut Cyber Criminals Out
A compromised inbox is a treasure trove of corporate information that can then be exploited by a cunning criminal.

Be Cyber Smart: Multi-Factor Authentication
By applying multi-factor verification to more of your accounts, such as email, social media, and more, you can better secure your information and identity online.

Cyber Security Policy Sample
Download and adapt this sample Cyber Security Policy for your organization. A Cyber Security Policy forms the foundation of the corporate Information Security Program and enables the IT team to manage the security of information assets and maintain accountability.

Understanding and Preventing Data Breaches
It is often assumed that smaller businesses can escape attention from cyber crooks, but according to industry experts, an increasing number of data breaches are occurring at companies with fewer than 100 employees.

The Importance of Two-factor Authentication
While no cyber security method is foolproof, using two-factor authentication can add an extra layer of security to your online accounts.

Ransomware Considerations for Board Members
It’s important for board members to be actively involved in developing and promoting effective workplace cybersecurity measures—especially as it pertains to ransomware attacks.

Penetration Testing Explained
It’s not enough to simply protect workplace technology with software and security protocols. It’s also critical for your organization to test the overall effectiveness of these protocols on a regular basis. That’s where penetration testing can help.

Mitigating BYOD and E-discovery Risks
While there are numerous benefits of implementing a BYOD policy at your workplace, it can be problematic from an e-discovery standpoint, should your company enter litigation.