keyboard_backspaceBack to main blog page

Scurich Insurance Services - Blog

Scurich Insurance Services has been serving the Monterey Bay Area since 1924. Our mission is to partner with our customers and provide them superior service and value. We are a member of United Valley Insurance Services, Inc., a cluster of over 70 California Independent Insurance agencies, which produced over $530,000,000 of annual premium last year. At Scurich Insurance Services we understand your business and our community. Our customers look to us for comprehensive solutions. We have established relationships with more than 40 of the nation’s leading insurance providers, which allows us to deliver multiple, competitively-priced options and a team of experts to guide you through the process. When you need to file a claim, change a policy or process a certificate you can depend on Scurich Insurance Services to respond quickly to your request. SERVICES In order to provide value added benefits to our customers that go beyond the insurance policy Scurich Insurance Services offers the following additional services: Safety Programs – English and Spanish OSHA Compliance Safety Policies – English and Spanish Online OSHA 300 Log Safety Posters and Payroll Stuffers - English and Spanish Certificates of Insurance – If received before 3:30pm done the same day Risk Management Consulting Brokerage Services Represent most major insurance companies to better market your account. Safety tapes/DVD’s BUSINESS LINES Commercial Commercial Packages Business Auto Workers Compensation Umbrella Bonds Directors & Officers Professional Liability Employment Practices Liability Personal Auto Home Umbrella Recreational Vehicles Boatss Life & Health Individual Medical Individual Life Group Medical Group Benefits

Search Results

Posts tagged with risk - risk

Check Out This Social Media Use Checklist

Author TonyScurich , 10/21/2016
  Social media rules! In recent studies, Twitter, Facebook, and Tumblr users sent tens of millions of messages every day– and new players keep entering the marketplace. Although these platforms provide significant benefits for businesses of all sizes, they also pose a variety of risks. Everything from employment, privacy and security, through intellectual property to media-related liability. Chances are your employees are using social media, either at home or work, in ways that could put your business at risk. To limit this exposure, experts recommend creating social media guidelines based on a five-point checklist:
  1. Assess both your company’s general social media activities and individual social media campaigns, weighing potential risks against benefits as accurately as possible.
  2. Designate specific individuals and departments to develop, execute, and monitor a comprehensive and proactive social media strategy – and make a senior executive responsible for implementing it in a timely fashion.
  3. Have the policy reviewed by the relevant departments (human resources, IT, communications, and legal) and by an outside law firm.
  4. Because employees pose the biggest risk to a company, although often unwittingly,,provide educational programs about the danger of damage to the company by using social media on the job or at home.
  5. Create a social media agreement for employees to review and sign as a condition of employment and part of their employment contract. Update the agreement annually, or as often as needed, to address changes in social media that might impact your risk in new ways.
Following this checklist will help position your business to reap the enormous benefits that participationin social media offers. As always, we’re here to help you– just give us a call!  

Business Continuity Planning: A Three-Step Approach

Author TonyScurich , 10/19/2016
Every business is vulnerable to disruptions. Most companies have taken steps to mitigate the impact of major hazards. However many businesses have neglected smaller, more probable perils, ranging from inadequate fire protection and offsite data backup, through the death or disability of key personnel, to over-reliance on a limited number of vendors. While you can transfer many risks that could disrupt your business to insurance companies (through such coverages as Business Interruption and Extra Expense policies), this probably won’t be enough to ensure that the company will survive or continue its long-term growth and profitability. To prevent and/or reduce the impact of such a mishap, it makes sense to implement Business Continuity Planning (BCP). This process involves three key steps:
  • Pre-disruption planning. Assess the “risk and threat environment” of your business and take steps to reduce these hazards and weaknesses.
  • Disruption response. The extent and nature of losses will depend on the effectiveness of the emergency plans that you implement during the incident to provide a methodical, rational, and coordinated approach to dealing with the disruptions.
  • Post-disruption recovery. While the first two steps can reduce or mitigate risk, the recovery process focuses on rebuilding and restoration. Although many businesses depend heavily on central and distributed computer resources, a comprehensive BCP involves a wide variety of crucial activities that need to continue with minimal interruption.
Your BCP should not be a one-time project that involves creating a plan and then moving on to “business as usual” – but a long-term commitment to design, develop, implement, and maintain a comprehensive, company-wide strategy to keep your business running effectively.. We’d be happy to review the risks facing your business and tailor a Business Continuation Plan to your needs.

The EEOC Systemic Expedition

Author TonyScurich , 9/26/2016

In an issue of Corporate Counsel an article entitled It's a Systemic World Out There discusses the EEOC's pursuing large "systemic" cases. For example, in fiscal year 2011 they conducted 580 systemic investigations, filed 84 systemic lawsuits, and settled 35 systemic cases for total $9.6 million. Although your company might not be large enough to be on the EEOC's radar screen, I can tell you that attorneys are also suing small to midsized companies on a class basis. An employee walks into a lawyer's office because they didn't receive their final paycheck, and before you know it they're filing a class-action lawsuit against your company for missed overtime and meal periods. The article provided a few golden nuggets of advice:

  1. When responding to an EEOC inquiry, don't use the phrase "pursuant to our consistently applied policy." This only invites a broader request for information.
  2. Do not submit more information than is necessary.
  3. Conduct your own statistical analysis before submitting data.
  4. Do preventative analysis looking for adverse impacts in the hiring, promotion, or termination practices.
  5. Validate pre-employment tests.
  6. Conduct preventative compensation analysis periodically.
  7. Cover all internal analysis with attorney-client privilege. This might be impossible in smaller organizations, but you can certainly retain outside counsel to instruct you on how to conduct such analysis and report back to them.
  8. Listen to your employees. As I have always recommended, you should survey your employees, including use of the Employee Compliance Survey that can be found in HR That Works.
  9. Invigorate that underutilized internal complaint system. Again, go one step further and ask if there's a problem –don't wait for them to tell you there is one.
  10. Stay current with legal trends. This is one reason why HR That Works membership is so valuable.
  11. Walk the talk. Are you sensitive to the potential for your practices to cause adverse impacts? Frankly in my experience I can tell you that some business owners could care less about whether a practice causes an adverse impact. All they care about is getting the best employees they can, damn the EEOC. Of course, few companies appreciate a risk until they're hit with it.

Finally, the article points out how large corporations can gather the data requested by the EEOC easily because they have such large HRIS systems. However, most companies with less than 500 employees don't have this data readily available, and t collecting it can be an over-burdensome process. This is one reason to make sure that you hire an attorney any time you receive a communication from the EEOC or another regulatory agency.

 

Protect Your Business When An Employee Leaves

Author TonyScurich , 9/19/2016
eMPLOYEE It's always difficult to terminate an employee - especially in this age of employment litigation and privacy concerns. Even if a worker leaves voluntarily, you need to make sure that he or she no longer has access to confidential information

The key to making sure that you've covered all bases of your bases is to follow a Departure Checklist:

  • When an employee leaves, whether voluntarily or involuntarily, notify all staff immediately to help reduce rumors, hurt feelings, and concerns. Keep the announcement positive.
  • Remove the employee from your facility soon as possible. Offering to have the person stay is nice, but might not always be helpful. If you decide to let the employee stay for the customary two weeks, assign him or her specific tasks to complete. Collect keys immediately and assign someone to work with the departing employee for the duration of their stay.
  • Once the decision has been made, restrict the employee's access to sensitive company information at once; be sure that this restriction includes any VPN or private access.
  • Have the employee review all items on which he or she is working and write a synopsis of what's needed to complete each item. Then review these items to create a specific workload transition plan, and assign them to other employees. The sooner you do this, the better.

The more you think through this process before a problem arises, the more effectively you'll be able to deal with it. We stand ready at any time to help you develop and implement an effective plan that can go a long way to help you protect your business from this risk.

 

Construction Safety: Myth And Reality

Author TonyScurich , 9/9/2016
construction-646465_1920 Unfortunately, a number of erroneous beliefs about worksite safety are widespread in the construction industry. Here are seven common safety myths - and why they don't pass the reality check:
  1. Safety programs ensure worker safety. In practice, this means that binders on a variety of topics (usually regurgitated OSHA standards) end up gathering dust on a back shelf.
  2. Safety is common sense. Taking risk is a very personal matter. Some people skydive, others bungee jump; some race automobiles, others rock climb.
  3. Incentive programs improve safety. Because these programs usually reward not having a recordable incident, they benefit workers been lucky enough to avoid accidents - not to mention a natural tendency not to report injuries.
  4. Progressive punishment ensures safety compliance. The best punishment can do is achieve temporary compliance. Effective policing must be continuous and consistent, with clear consequences.
  5. Firing noncomplying workers solves safety problems. This is like trying to cure a disease by treating its symptom. Instead, find the error that led to unacceptable behavior and change it.
  6. Safety training is a leading safety indicator. The sign-in sheet shows only who attended the meeting. For training to work, managers need to test what individual workers learned - or didn't learn.
  7. Inspections and audits will uncover most workplace hazards. Inspections provide snapshots of workplace conditions at a given time, rather than an accurate picture of ongoing operations or activities.
Every construction firm needs to evaluate its safety systems, practices, and procedures critically, challenge the status quo where needed - and take decisive action. Our agency's professionals would be happy to offer their advice at any time, free of charge.

NIOSH Offers Tips On Preventing Work-Related Highway Crashes

Author TonyScurich , 8/26/2016
3

Employment-related accidents behind the wheel are the leading cause of death from traumatic injuries in the workplace, killing some 2,200 people a year and accounting for 22% of job-related fatalities. Deaths and injuries from these accidents increase costs and reduce productivity for employers - while bringing pain and suffering to family, friends, and coworkers.

Preventing work-related roadway crashes poses a significant risk management challenge. The roadway is a unique work environment. Compared with other work settings, employers have little ability to control conditions and exert direct supervision over their drivers. The volume of traffic and road construction continue to increase, while workers feel pressured to drive faster for longer periods, and often use mobile electronic devices that distract them behind the wheel.

To help reduce this risk, for both long-distance truck drivers and employees who occasionally use personal vehicles for company business, the National Institute for Occupational Safety and Health (NIOSH) recommends that employers follow these precautions:

  • Require drivers and passengers to use seat belts.
  • Ensure that employees who drive on the job have valid licenses.
  • Incorporate road fatigue management in safety programs.
  • Provide fleet vehicles with top quality crash protection.
  • Make sure employees receive training to operate specialized vehicles.
  • Offer periodic vision screening and physicals for employees whose primary job is driving.
  • Avoid requiring workers to drive irregular or extended hours.
  • Prohibit cell phone use and other distracting activities such as eating, drinking, or adjusting non-critical vehicle controls while driving.
  • Set schedules that allow drivers to obey speed limits.
  • Follow state laws on graduated driver's licensing and child labor.

For more information about how to prevent work-related driving deaths and injuries, just give one of our Risk Management experts a call at any time.


The Malware Epidemic: Seven Ways To Fight Back

Author TonyScurich , 8/5/2016
2

Recent headlines about electronic spies hacking into computer networks from the Pentagon to China reinforce the dangerous reality that a "malware" (software that accesses systems to steal sensitive financial and client information) is becoming increasingly sophisticated and widespread.

According to a recent report from the NPD Group, the average U.S. household with a Web connection has 5.7 devices - desktops, laptops, tablets, and/or smart phones -- which are highly vulnerable to malware attacks. The more workers who use these devices to access the Web sites of their employers, the greater the threat of cybercrime. To help protect the security of your company's data against intrusion from malware, experts recommend taking these precautions:
  1. Identify the business processes and data you need to protect and the risks associated with them.
  2. Limit access to sensitive data to authorized users. Provide them with strong passwords and don't allow any sharing.
  3. Make sure that employees use only secure wireless networks when connecting to your site.
  4. Provide users with strong authentication measures and anti-malware software.
  5. Know your users and their behavior. Compare details of incoming login connections with the information you have about the user. If you find anomalies, add such precautions such answering a security question.
  6. Look for corrupted devices. Authenticated users might acquire malware on their devices that puts your data at risk once they log in. For example, man-in-the-browser (MitB) attacks can hijack authenticated sessions.
  7. Secure high-value transactions. Identify these transactions and refuse to accept them from devices with suspicious configurations.
Our agency's specialists can work with you in developing and implementing a comprehensive anti-malware program for your company. Please feel free to get in touch with us at any time.  

EMPLOYEES AND E-MAIL: SECURITY VS. PRIVACY

Author TonyScurich , 8/1/2016
4

How can you oversee your employees' use of company e-mails without violating their privacy?

According to a recent nationwide survey, more than 40% of businesses monitor their workers' e-mails. If you're one of these companies, a disgruntled employee might well sue you for invasion of privacy (the number of privacy lawsuits has skyrocketed by 3,000% during the past decade). The best way to protect yourself against this risk is to create a written policy warning employees that you might be monitoring their use of e-mail. Bear in mind that because your business owns the e-mail system - software, network access, and computers - you have the legal right to oversee workers for misusing it to violate company policy or break the law. The first step in implementing this policy is to have all employees sign a disclaimer that acknowledges the company's right to monitor their e-mail. You can do this when an employee is hired, at contract renewal, or at a company meeting - and don't forget to circulate any updates to the policy throughout the company. Apply e-mail monitoring as uniformly as possible, because singling out an individual without a clear reason to do so could leave you vulnerable to a discrimination lawsuit. Finally, be sure to have your attorney review the policy. A comprehensive e-mail policy can: 1) provide an effective defense against invasion of privacy litigation 2) educate your employees on the proper use of e-mail - which should go far to reduce potential problems from misusing the system. If you'd like to learn more about how to balance protecting the integrity of your company's e-mail system with your employees' right to privacy, please get in touch with us. As always, we're here to help.

Mobile security and the ways to mitigate data risk in a BYOD environment

Author TonyScurich , 7/27/2016
Mobile devices are the mighty double-edged swords of today's workplace. On the one hand, they provide greater integration of information, on the other, they could be your business's one-way ticket to a catastrophic security breach. This week we had the amazing opportunity to speak with Anthony Kinney, Microsoft's Verizon Partner Manager, about mobile security and the ways to mitigate data risk in a BYOD environment. According to Kinney, the three main security risk areas associated with BYOD are:
  1. Data loss prevention, which has to do with securing the data on a device in the case of it being lost or stolen.
  2. Data in transit, which is most often protected by encrypting information to ensure that all communications between the device and backend infrastructure are secure.
  3. Data leakage, which is about keeping a user's work and personal information separate. In other words, "protecting users from themselves."
We asked Kinney what Microsoft is doing to make sure that moving to a pocket office doesn't mean introducing security risk. He discussed how our multilayered approach to security makes adopting a BYOD policy far less of a risk, with solutions like Secure boot technology, remote "wipe" capabilities, and automatic cloud storage (among other security solutions). What makes the greatest difference, however, are the actions a company takes to ensure that their data is secure. The way Kinney sees it, employees jailbreaking and rooting devices is one of the largest risk factors for companies who allow employees to BYOD. What those companies do is implement third-party services to "containerize the data," so it never actually goes onto the local device. According to Kinney, Windows Phone solves for this by protecting the data at the data center level before it even gets to the device. This means each document can have specific edit/view/share settings so that when it's accessed on a mobile device it can't be 'saved as' or forwarded to another cloud service, depending on what the settings permit. This way the phone fully understands the corporate policies on the document, helping IT to provide security—even at the file level. This level of device integration with your data allows your company to consider a BYOD or CYOD policy without the need for third-party security solutions—which themselves offer another point of potential failure and risk. By working with your existing desktop OS, email, and other systems, the native Windows Phone OS helps mitigate data loss risk for your pocket office by preventing it in the first place.

Car Insurance Deal-Breakers: Non-Renewal And Cancellation

Author TonyScurich , 7/25/2016

aquaplaning-83008_1280If your Auto insurance company sees you as a deadbeat or high-risk or driver, it might cancel or non-renew your policy.

Because insurers take cancellation seriously they won't eliminate coverage for a traffic ticket or two. What's more, state regulators ban cancellations under most circumstances. However, a company can non-renew your insurance at the end of each policy period (six to 12 months) or cancel the policy during the first 30 to 60 days that it's in force. The main reason for midterm cancellation is nonpayment. State regulators set the requirements, such as a written notice of non-payment, together with a 10 to 30-day grace period to pay. Some states allow insurers to cancel coverage, usually for an activity - such as a DUI conviction that involves bodily injury or substantial damage - which indicates you're at high risk for an accident; or for misrepresenting your driving history (for example, not disclosing that your teenager was behind the wheel instead of you when an accident occurred). Some companies will backdate coverage to the cancellation date, while others will not cover you during the period when you haven't paid your premiums. If you can't bring your account up to date or the company cancels you for a reason other than non-payment, your policy probably won't be renewed - which means you'll have to look for insurance elsewhere, probably at a higher rate. Depending on the reason for cancellation, some companies might refuse to write your business. In this case, you can to turn to the state's assigned-risk pool, which offers bare bones coverage at higher rates. Your best move is to do everything possible to avoid cancellation or non-renewal. For example, if you can't afford to premium payments, consider reducing your coverage rather than take the risk or cancellation. For more information, just give us a call. We're here to help!