Entries Tagged 'Sign Of The Times' ↓

Should I Consider a BOP or CPP Insurance Bundle?

To briefly discuss a critical and complex topic for small business owners, let’s do a quick overview with an analogy to something simple we can all enjoy: pizza!

Business Owner Insurance (BOP) is like a standard Domino’s pizza. Its preset bundle of ingredients is designed to meet the needs and requirements of most small businesses and is practical in terms of cost and coverage.

A Commercial Policy Package (CPP) is more of a build-your-own, à la carte menu of options for those with more specific appetites or dietary requirements when there are unique risks within that business’s industry that necessitate extra coverage. This might sound expensive, but because it can be built from the ground up, it facilitates nearly unlimited options and has the capacity to be more cost-effective (rather than purchasing a standard BOP policy and adding additional menu items to your order).

Keep in mind, while BOP and CPP packages cover the majority of the gamut of coverage business owners need, they often do not include vital coverage for other key ingredients, such as commercial flood insurance, workers’ compensation and other crucial liability insurances.

Also, with the impact that COVID-19 has had on many brick-and-mortar businesses, it is critical for those now operating businesses out of their homes to know that homeowners insurance policies specifically exclude liability coverage for all business operations.

We’re here to help you painlessly place your order; we’ll assist you in understanding and confidently deciding which policy type is best for you. Our goal is to help you navigate toward options that make the most holistic sense for your business in terms of risk management, budgets and bringing you a personal sense of stability.

Does Your Business Depend on a Supply Chain?

Supply chains are a vital part of many businesses that operate. Whether its sourcing parts and materials or reselling goods made in other countries, supply chains make the world go around.

But what happens when that supply chain is interrupted by a natural disaster or other unforeseen event that throws your business into chaos? Pointing fingers, blaming suppliers or transporters, or even trying to make alternate arrangements can cost lost credibility, time, money, and, most importantly, clients. Companies need protection against broken links in their supply chains. The right insurance can’t stop the chain from breaking, but it can stop the business from falling apart if it does.

There are two main coverage options: contingent business interruption insurance and supply chain insurance.

A contingent business interruption insurance policy reimburses lost profits and extra expenses caused by the interruption of someone else’s business. If you rely on one supplier to get you your materials, depend on one manufacturer for most of your merchandise or purchase the bulk of your products from one business, this may be the way to go. The policy is limited, though, in that it only provides coverage if your supply chain is interrupted due to physical property damage at a supplier’s business.

Broader coverage is offered by supply chain insurance. It too covers supply chain disruptions caused by property damage to your supplier’s business, but it can also cover road closures, political upheaval, regulatory action, financial issues, public health emergencies, natural disasters, industrial accidents, riots and labor issues.

If you have any confusion about these policies, please call or email us today. We will look at your options and guide you to the best policy for you based on the supply chain that serves you. We’re always here to help and make sure you have the coverage that’s right for you.

The Ins and Outs of Cyber Liability Insurance

When considering types of insurance to buy, many people gloss over an important type of insurance for their businesses: cyber liability. While some may think a slip and fall or other workplace accident is the most likely reason they need insurance coverage, cybercrimes and data breaches are becoming increasingly common workplace “accidents” that require insurance as well. Below are two types of cyber liability insurance that every business should consider obtaining before they’re the victim of a cyberattack.

First-party coverage. When hackers strike your secure server and wipe out business records and other crucial online documents, there is a real cost to that. Coupled with the cost of informing your customers, purchasing equipment, upgrading software, and engaging information technology professionals, there is the likelihood of a substantial financial loss. First-party coverage pays for damages directly suffered by your business.

Third-party coverage. A cyber breach can impact your clients and partners in ways not foretold. Unfortunately, this sometimes leads to litigation or other claims for damages from others, which can take a larger toll than the breach itself. Third-party coverage helps ensure that you have a policy in place to cover others’ losses as a result of a data breach impacting your business.

Let us help you review your cyber liability policy in order to make sure you have the coverage you need to safeguard the business you’ve worked so hard to build.

At Home Resources During Covid-19

You might be looking for creative ways to entertain the kids or grandkids after school closures and thankfully there are some great online resources that may come in handy.

1) The Kennedy Space Center has educator resources here and they’ve launched science lessons on Facebook Live here.

2) Children book author, Mac Barnett, is reading a different book every day at 3 PM EST via Instagram Live here.

3) Learn more about marine biology with this family’s Virtual Marine Biology Camp here.

4) In the STEM (stands for Science, Technology, Engineering, and Math) Activity Clearinghouse, you can find vetted activities that are appropriate for multiple audiences and difficulty level here.

5) iKnowIt.com is a comprehensive, interactive math practice site for students in Kindergarten to fifth grade and can be used for independent practice, remediation, assessment, and more (90 day free access). Learn more here.

6) One teacher gathered links for over 30 Virtual Field Trips including Mars, an animal farm tour, U.S. Space and Rocket Museum in Huntsville, the Boston Children’s Museum, and more here.

7) Vooks has an ever-growing streaming library of kid-safe animated storybooks on all of your favorite devices here. 8) Authors are grabbing their favorite books and phone and are recording themselves reading with Operation Story Time. Learn more here.

Gone Phishing: Don’t Take the Bait

The 2019 Verizon Data Breach Investigation Report indicates that one third of cyberattacks involve phishing traps. These scams involve imitating a reputable source to induce staff to reveal sensitive information. As companies increase awareness of these cons, cyber criminals increase their efforts, making tactics more sophisticated.

How can you protect your company?

First, educate yourself and staff about current phishing techniques. Cybercriminals often use links embedded in emails to direct employees to unsecure sites. A second common method is to spoof a sender email address and request secure data. Scammers may also impersonate a known IT department or vendor and ask for sensitive information over the phone. Recently, phishing tactics have expanded to texting, which can be particularly effective, since staff may be more distracted and less vigilant when it comes to these informal interactions.

In addition to education, protect your business from phishing methods by using appropriate security software and remaining current on all updates. Use spam filters and web filters to block malicious content. Develop solid security protocols for password protection and encrypt all sensitive business data. Don’t forget to require encryption for telecommuters, too.

Even with the best measures in place, you may be susceptible to attacks. To fully protect your business, establish appropriate insurance coverage. Cyber insurance policies offer protection for these situations. If you suffer a data breach, data loss, business interruption, or other expenses due to cybercrime, insurance is essential for covering the resulting costs.

Contact our office to find out more about available coverage for your company.

Technology Insurance vs. Cybersecurity Coverage

In today’s business world, most companies are dependent on technology for some or all of their company’s operations. While this makes many new processes and services possible, it also leaves businesses vulnerable to a new realm of risk.

Cyber crimes, computer crashes, and software malfunctions are just a few of the technological risks that modern companies now face. Since technological incidents can cost a business anything from a few minutes of inconvenience to millions of dollars, it’s essential for companies to have appropriate insurance coverage.

Enter technology insurance and cyber insurance.

These two types of policies provide the protection businesses need to recover from technological disasters. Not only is their coverage important, but businesses need to know that these policies are not one in the same. They apply to different circumstances, and a company might need one policy or the other, or both. Here’s the scoop.

Technology Insurance

Technology Errors & Omissions (E&O) policies cover companies that provide technology services (such as data storage) and technology products (such as computer software). The terms of the policy are designed to provide protection for loss and liability. Such losses might be related to liability for media content, damages due to security breaches, or losses due to business interruption. It can also cover extortion threats and crisis management expenses. Technology insurance also typically pays for groundless liability claims and all associated investigations.

Cyber Insurance

While Tech E&O policies are designed to protect technology providers, cyber insurance is intended to protect technology consumers (the company’s customers). It covers situations in which customers’ identities, credit cards, health records, or other sensitive information is compromised. The policy pays for any damages incurred.

Overlap

Cyber insurance policies and technology insurance do have some overlap. Either policy may provide coverage if a business experiences a loss related to technology. Since many situations impact both the technology provider and the consumer, this overlap is inevitable. However, the specifics of each policy’s terms will determine which situations are covered and which are not included.

Who Needs Coverage?

Since most businesses rely on technology for at least a portion of their operations, some form of coverage is recommended for a majority of companies. Those that serve customers and store sensitive customer information should strongly consider a cyber insurance policy.

For high-tech and internet-based businesses, technology business insurance is recommended. Such companies would include IT businesses, website developers, internet service providers, and programmers. Additionally, those who rely heavily on technology solutions as part of their operations (intranet communications, customer e-mails, database management) may also want to add this coverage.

Does your business fall into any of these categories? Are you properly protected with insurance for the tech side of your operations?

If you’re not sure which policy would be right for you or are unsure about your current coverage, contact our office. I’d be happy to review your current policies and coverage options to make sure you are prepared for any technological incidents that may come your way.

How Telematics Is Transforming Insurance

Technology is transforming every aspect of our lives, and insurance is no exception. Insurance carriers are tapping into automotive telematics to guide insurance premiums.

What is telematics? This is a form of communications technology that can be used for monitoring a vehicle to determine driving behaviors. Using a combination of GPS, Bluetooth, and mobile devices, insurance companies can review customers’ driving habits and reward safe behaviors with reduced premiums.

For example, a telematic device can monitor the times of day drivers are on the road, their mileage, and sudden changes in speed (which indicate rapid accelerations or hard braking).

Insurance companies can use this data to predict driving habits and generate a reasonable premium based on these behaviors. Drivers are typically required to have the device in their vehicle for a set period of time before a premium is established. The premium may also fluctuate as driving changes. As vehicle operators drive more safely, the premium lowers.

Of course, if drivers have poor driving habits, this can cost the policyholder. If the telematics data shows risky behaviors, the premium could go up! However, the knowledge that they are being monitored and the incentive of monetary savings may actually help drivers develop better habits on the road.

Do your operations rely on any commercial vehicles? These safe-driving programs are a growing trend and could provide significant savings on your premiums. To find out more about telematics and how it can help you save money, contact our office.

Reduce Their Risk: Safety Tips for Teen Drivers

It’s time for a teen to get their driver’s license. Who is more nervous – the teenager or the parent? 

Parent anxiety during this rite of passage is understandable. According to the Insurance Information Institute, motor vehicle accidents are the number one cause of death among those age 15 to 20. 

Fortunately, teens and parents can take steps to improve safety on the road. If you have a teen behind the wheel, try these best practices. 

Choose a safe car: Sure, your teen will probably prefer to drive that sporty convertible, but giving a teenager the keys to a sleek, fast car will only encourage speeding and other unsafe driving habits. For a teen’s first vehicle, choose a car that is easy to drive and offers solid protection during an accident. Avoid small cars and SUVs, which are prone to rollovers.

Limit their risk: Consider following a graduated driver’s license (GDL) program. These are in place in some states, and parents can institute similar policies in areas where they aren’t required. Under these programs, teens’ driving privileges are restricted until the teen has gained experience behind the wheel. Restrictions may prohibit driving at night or with teen passengers. 

Emphasize safe habits: Talk with teens about risky driving behaviors. Explain the dangers involved with distracted driving caused by phone use, radio use, or conversations with passengers. Stress the importance of remaining focused while driving. 

Additionally, certain practices, such as enrolling teens in a safe driver program or using electronic devices to monitor their driving, may qualify you for insurance discounts. Contact our office to discuss what programs are available in your area.

Cybersecurity Glossary: What You Need to Know

According to information from Cybersecurity Ventures, cyberattacks are the fastest-growing crime in the world. Yet PricewaterhouseCoopers reports that less than half of companies are sufficiently prepared for one of these attacks. 

Is yours? 

A good first step to protect your company from cybercrime is education. Learn the language of the world of cybercrime to increase awareness. Use the following list of basic cybercrime terms to get started.

Access control: This involves permitting or prohibiting access to information or physical locations. Proper monitoring and limitation of this access is essential to maintain company security.

Cyber insurance: This coverage protects your business from damage that results from electronic threats to your operations, including liability and recovery costs.

Cybersecurity: This encompasses all policies, standards, and strategies relating to the security of company operations that occur in cyberspace.

Encryption: This is the process of converting data from basic format into one that can’t be easily interpreted by those who are unauthorized to access it.

Hacker: A hacker is someone who attempts to gain access to a system in an unauthorized manner.

Incident response: When a cyberattack occurs, the activities that occur to address its effects are referred to as an “incident response.” This involves responding to the crisis, mitigating potential threats, preserving property and information, and analyzing response activities for optimal results.

Intrusion detection: These processes analyze information from security systems to determine whether a security breach has occurred.

Keylogger: This software tracks keystrokes to monitor a user’s actions. 

Macro virus: A macro virus can replicate and spread itself by attaching to documents and using the macro capabilities of an application.

Malware: This software performs unauthorized processes that compromise the integrity of a system.

Passive attack: With these types of attacks, the perpetrator doesn’t try to alter the system but simply makes use of it to obtain information.

Phishing: This refers to attempts to deceive people into providing sensitive information.

Redundancy: These are additional systems or subsystems that are operated to maintain functionality if another system should fail.

Spoofing: This involves impersonating an email address to gain unauthorized entry to a system.

Ticket: In relation to access control, a ticket is the data that authenticates someone, as a credential for that person to gain access.

Trojan horse: This type of computer program appears to be useful, but has a hidden function that circumvents security and accesses confidential information or otherwise negatively affects the system.

Worm: This program is self-contained and self-replicating and uses networking mechanisms to spread itself.

Would you like to learn more about cybercrime, cyber insurance, and what coverage is available to protect your business from cyberattacks? Contact our office to review your current policies and determine what coverage is appropriate for your company.

Deck the Office Halls…and Avoid Damage

A little festive cheer can boost office morale and make surroundings more appealing to employees and customers. With this in mind, many businesses decorate for the holidays; however, it’s important to also keep safety in mind. Unsafe decorating practices can lead to personal injury or property damage. To avoid these disasters and the ensuing claims, use the following precautions:

The gift of gravity: Don’t take chances when stringing lights on doorways or windows. Rolling office chairs do not make good step stools. Always use a stable, well-positioned ladder to reach decorative heights.

A sprinkling of good cheer: As you decorate, it might be tempting to hang items from sprinkler heads. Don’t do it. The decorations can prevent the system from working properly.

Chestnuts roasting on an open fire: Do you plan to plug in lights or other electrical décor? Inspect all cords before using them. If any items have frayed cords, exposed wiring, or damaged prongs, do not use them. These pose a fire hazard.

An extended holiday: If you need to use extension cords for your decorations, be careful about placement. Avoid stringing these cords in high-traffic areas or under rugs, as they can create a tripping hazard.

Stuffed with goodies: Be careful not to overload circuits when powering electrical decorations. You may cause shorts that damage office equipment or cause overheating that starts a fire.

To all a good night: Put a system in place to ensure all indoor and outdoor electrical decorations are turned off at the end of the day or before everyone leaves the building.