keyboard_backspaceBack to main blog page

Scurich Insurance Services - Blog

Scurich Insurance Services has been serving the Monterey Bay Area since 1924. Our mission is to partner with our customers and provide them superior service and value. We are a member of United Valley Insurance Services, Inc., a cluster of over 70 California Independent Insurance agencies, which produced over $530,000,000 of annual premium last year. At Scurich Insurance Services we understand your business and our community. Our customers look to us for comprehensive solutions. We have established relationships with more than 40 of the nation’s leading insurance providers, which allows us to deliver multiple, competitively-priced options and a team of experts to guide you through the process. When you need to file a claim, change a policy or process a certificate you can depend on Scurich Insurance Services to respond quickly to your request. SERVICES In order to provide value added benefits to our customers that go beyond the insurance policy Scurich Insurance Services offers the following additional services: Safety Programs – English and Spanish OSHA Compliance Safety Policies – English and Spanish Online OSHA 300 Log Safety Posters and Payroll Stuffers - English and Spanish Certificates of Insurance – If received before 3:30pm done the same day Risk Management Consulting Brokerage Services Represent most major insurance companies to better market your account. Safety tapes/DVD’s BUSINESS LINES Commercial Commercial Packages Business Auto Workers Compensation Umbrella Bonds Directors & Officers Professional Liability Employment Practices Liability Personal Auto Home Umbrella Recreational Vehicles Boatss Life & Health Individual Medical Individual Life Group Medical Group Benefits

Search Results

Posts tagged with photos - photos

Drip, Drip, Drip: Dealing With Water Damage

Author TonyScurich , 4/25/2016
3

Of all Homeowners insurance losses, those from water damage are among the most common. Many people often don't consider the potential risks in their own homes until it's too late.

To minimize hazards that can cause water damage claims, we'd like to recommend these steps:

  • Check for leaks. Periodically inspect the area around the refrigerator, washer, dishwasher, water heater, sinks, and toilets for drips, puddles, and discolored, warped, or soft flooring.
  • Pay attention to your water bill. Monthly fluctuations could indicate a leak.
  • Periodically check your water pressure. Water losses often occur due to excessive water pressure. Buy a pressure gauge at your local hardware store, and hook it up to a hose bib. If it's above 65 psi, install a water pressure regulator.
  • Before you go on vacation, take precautions. If temperatures in your area could dip below freezing, make sure that any exposed pipes are insulated, turn off the water supply to individual fixtures, and turn your furnace to low so that the pipes will stay warm enough to avoid bursting.

If you need to file a claim, follow these guidelines:

  • Stop the source of the water by turning off the water main.
  • Call your insurance company immediately. Most companies have staff 24/7 to help you set appointments with contractors who can dry out your house. Your insurer will also send an adjuster to assess the damage.
  • Don't start any major repair efforts until the adjuster has been to your home!
  • Determine what was lost and document it. Even if things were ruined, don't throw them away. Keep pieces of the damaged floor or ceiling, along with any valuable personal property, such as electronics or furniture. At a minimum, take photos or video of the damage.

For more information, give us a call at any time.


Cybersecurity Tips from a Professional Hacker

Author TonyScurich , 1/27/2016
Bookmark and Share "Cybersecurity is definitely no longer a server room issue," says David Finn, Executive Director at the Microsoft Cybercrime Center. "It's a boardroom issue." He notes that on average, it takes 243 days before an organization even knows that it was penetrated by a cybercriminal. Today, when one in five businesses are the target of a security breach, bad things are inevitably going to happen. That's why looking at your organization from "the bad guy's perspective," says Tiffany Rad, is crucial. Rad is rated one of Bloomberg's top "white hat" hackers (computer specialists who break into protected networks to test security and advise organizations on improvements). One of the most difficult things in Rad's industry is protecting against insider threats. But she notes there are products entering the market that have "an algorithm to check for abnormal patterns, when it looks like someone's going to sites perhaps that they shouldn't be during working hours or they're on different hours than normal." In terms of external threats, there's a lot of attention on protecting businesses as they move to the cloud. Ken Biery Jr., Verizon's Managing Principal of Governance, Risk and Compliance, explains that it's important to provide physical and logical security. Rad agrees, noting that in addition to firewalls and antivirus software, protection against malware is critical as more and more hackers look to steal intellectual property to give themselves or your organization's competitors a heads-up on what your organization is planning. You're "only as safe and secure as your weakest link," says Finn, admitting that when you rely on the cloud, "you trust that an organization is going to invest enormously in your security." But, as Biery sees it, "the good thing about a lot of the cloud providers that are out there is their default security, and the security they built into their environments are often better—especially for small and medium businesses—better than what they could do themselves." Biery also points out that companies need to stay in control with the advent of BYOD (Bring Your Own Device). With mobile device management, "you can take and keep your sensitive information in an encrypted container on that employee's phone. So it kind of exists as its own virtual machine in that environment," he says, explaining that you can delete access and the encrypted container without affecting personal data such as photos. The bottom line, agree the experts, is that companies of all sizes need to amp up protection. Even if you think your business information isn't of interest to others, Rad assures us that there will always be hackers that find your digital footprint interesting and will do something with it—if only because they can. Let us know how you keep your own business safe on Facebook and Twitter.

Social Media As A Hiring Tool - Employer Beware!

Author TonyScurich , 1/8/2016

4The spread of social media has revolutionized not only the way we connect with friends and family, but also how we conduct business. However, this asset can quickly turn into a liability if misused - for example, in recruiting your company's most valuable asset - its employees.

Many employers begin the hiring process by using social-media outlets to screen applicants. LinkedIn and Facebook can provide a wealth of information about applicants' education, their friends, and their personal behavior. Some companies reject candidates based on the content of their social-media pages. This might include anything from inappropriate photos or comments, discriminatory or slanderous statements, and references to alcohol and substance abuse, to sharing confidential information about their previous employers(s), displaying poor communication skills, or exaggerating their qualifications.

Although all of these indicators raise red flags, you could be risking a costly and annoying discrimination lawsuit if you access social-media sites which contain protected class information that's not privileged in the normal hiring process.

To minimize this risk, it makes sense to:

  1. When hiring, use outside third parties such as background-verification companies and/or recruiters who document content from social-media sites in selecting candidates
  2. Develop and enforce a comprehensive social-media usage policy.
  3. Purchase an Employment Practices Liability Insurance (EPLI) policy

For more information, please feel free to get in touch with our agency


Mobile Devices Pose Data Breach Threats

Author TonyScurich , 1/4/2016
2The widespread use of smartphones and tablets in the workplace is exposing more and more businesses to liability for sensitive data being compromised if these devices are lost, stolen, or hacked. How can your company protect itself against this threat - and how much authority do you have over an employee's personal device if it's also used for work-related activities?

What's more, because these gizmos are small and portable, it's easy to misplace them. (The federal Transportation Safety Administration recently leased a warehouse just to store those misplaced or left behind at airports.)

Another emerging risk linked to these devices is a "bring your own" policy that many companies have adopted as a way to save costs by having employees spend their own money on smartphones and tablets that are constantly evolving and updated. This approach raises questions about separating company data from personal information on the device. For example, when an employee leaves, does a business have the authority to wipe the information from his or her smartphone? According to some authorities, if an employee connects a personal device to a company network, the company has inherited responsibility for the data stored on it.

To deal with this risk, you need to provide every employee who uses these devices with training, updated annually, on how to respond in case of loss or theft. To minimize potential liability for lawsuits by customers and clients, make sure that the individual responsible for the mishap informs management immediately. The compromised information might include everything from sensitive data (financial or medical) contacts, photos, call history, personal notes - you name it.

You can also use insurance to protect yourself against losses from data breaches. A policy will provide Liability coverage that deals with legal costs and third-party expertise (such as forensics firms to analyze a breach and call centers to provide information and public relations. Coverage might also include services such as access to tools to estimate costs, a checklist for your planned response to a data breach, and access to experts who can answer questions and review your company's policies and procedures.

For more information, feel free to give us a call.


Compile an inventory of your important possessions

Author TonyScurich , 6/15/2015
In the event of severe damage to your home or business, having a current inventory of your possessions — including their make and model numbers — can help you get your insurance claim settled faster, verify losses for your income tax return and help you purchase the correct amount of insurance. While most people think of their home when discussing an inventory, it is important to document the contents of your business as well. Watch "Emergency Preparedness: How Taking a Home Inventory Can Help You Recover Sooner"

Here are some suggestions for getting started.

  • Take a picture. Take pictures of rooms and important individual items. Label pictures with a description, including where you bought it and the make, model and serial number. Remember items that are in storage closets or drawers.
  • Video record it. Walk through your home or office with a video recorder or tape recorder and describe the contents.
  • Create an electronic file – Use your computer or mobile device to create and store your inventory list. Take advantage of mobile applications or free online software like www.knowyourstuff.org to organize pictures or descriptions of your belongings by room or category.
  • Store the list, photos and tapes. Regardless of how you create it (written or electronic list, flash drive, photos, video or audio), keep your inventory along with receipts in your safe deposit box, on a disk or at a friend or colleague’s home. Doing so will help ensure you will have something to give your insurance representative if your home is damaged. When you make a significant purchase, add the information to the inventory while the details are fresh in your mind.
  • Consider expensive items. Valuable items like jewelry, art and collectibles may have increased in value since you received them. Check with your agent to make sure that you have adequate insurance for these items. They may need to be insured separately.

This information was taken from an article from the Insurance Information Institute (www.iii.org)


We have a winner!

Author TonyScurich , 11/20/2013
Congratulations, Teddy Rico from Watsonville, CA!  You are the winner of our iPad promotion! Photos to follow! Content provided by Scurich Insurance Services

Scurich Insurance Services, Watsonville, California

Scurich Insurance Services has proudly served the Monterey Bay area since 1924.  Scurich will take care of all of your insurance needs.  Are you a business owner, did you get a new car or maybe you are looking to protect your family in the event of a tragedy?  Give us a call, we can help! Let Scurich Insurance Services know if you are a Happy Customer! We are located at: Scurich Insurance Services 320 East Lake Avenue, PO Box 1170 Watsonville, CA 95077-1170 Office: 1-831-722-3541 Toll Free: 1-800-320-3666 Website | Facebook | Blog | LinkedIn | Happy Customer