Print PDF version
Please contact me about a
quick, no-obligation insurance review
First Name :
Last Name :
Captcha AntiSpam Security
Please type in the code shown in the image.
are used to prevent automated software from performing actions which degrade the quality of service of a given system, whether due to abuse or resource expenditure.
Security Tips For Employee iPhones
Employees who use iPhones can stay connected to the office at any time. While iPhones have a reputation for security, they are vulnerable to cyber threats just like other devices. Encourage employees to follow several security tips as you protect your company.
Keep the Phone Intact
Jailbreaking an iPhone allows users to customize the device. Unfortunately, this technique also makes the phone vulnerable to malware, viruses and other cyber threats, so only allow employees to use intact phones.
Update the Phone
A phone with an updated system and apps is more secure and harder to hack. Remind employees to enable automatic updates and patches.
Use a Long Passcode
Instead of the traditional four-digit or six-digit PIN code, opt for a longer passcode. Employees can choose a strong mix of uppercase and lowercase letters, numbers, and symbols, too.
Enable Two-Step Authentication
In addition to a passcode, iPhones users can enter a one-time code, answer a security question or utilize the fingerprint or face ID feature. This two-step authentication process reduces unauthorized use of the phone.
Auto Wipe Content
After 10 unsuccessful attempts at entering the device’s passphrase, auto wipe will erase all content. While inconvenient for users, this tip can protect data. Users should backup data on iCloud before enabling this feature.
Turn off Siri
A hands-free assistant is helpful. Unfortunately, Siri also gives hackers access to data on the iPhone. Recommend that employees disable this feature to boost security.
The auto-fill feature on iPhones remembers login and credit card information, but it also poses a potential security risk. Anyone who picks up the phone could use this feature to access the information they shouldn’t have. For security, employees can disable auto-fill.
Audit App Permissions
Apps often request access to the camera, microphone and other phone feature in order to give users the best experience. Encourage employees to audit app permissions and remove unnecessary access.
Avoid Opening Unknown Links
Train employees to recognize potential threats that stem from unknown or suspicious links that include incorrect spelling or come from unknown senders. They can use caution with links found in emails and texts and on websites.
A thief can gain access to all the information on an iPhone via a stolen device. To prevent theft, employees can keep track of their phone at all times, use non-Apple earbuds and be alert to their surroundings.
Update Cybersecurity Insurance
If an employee’s iPhone is hacked, lost or stolen, your company faces severe financial liabilities and penalties. Utilize cybersecurity insurance to protect your company.
iPhones are some of the most secure devices available. Utilize these tips as you protect the iPhones your employees use and your company’s data.
Glenn Insurance, Inc
Using Outsourced Workers
HR That Works has an extensive report and checklist about what's known as the "contingent workforce." This includes temporary employees, leased employees, and more. Here are some questions to consider in these relationships:
Who is responsible for what?
-- As with any arrangement, it's important to study the contract. For example, if an employee isn't working out, who should be responsible for firing them? Consider every aspect of managing personnel from hiring through performance management and retention to termination.
How much are you paying to outsource various HR functions?
-- Whether you're outsourcing because you don't have the time, expertise, or desire to do the job in house, you'll have to pay for someone else to do it for you. What's the competitive rate? What about the provider's experience and results? Do your homework and interview at least a couple of providers and their clients before you choose one.
What is the provider's hiring process?
-- They should be able to show it to you in writing. If they can't, pick someone else. Make sure that the provider does proper skill testing, character assessments, background checks, extensive interviews, immigration checks and pre-hire physicals.
What references can the provider offer?
-- Don't just ask for references, get the names of companies who have used the vendor during the past year. See if the vendor is willing to share this information and allow you to interview those companies. Ask "What will these companies tell us?" Then do Google research to see what comments you can find online.
What's the knowledge on board at the vendor?
-- How long has the person who does the hiring and staffing been doing their job? What are their credentials? Is there expertise on board to help you with any compliance concerns?
Does the agent carry the right insurance?
-- Depending on whose payroll is involved, the law requires employers to provide Workers Compensation benefits, as well as withholding unemployment and Social Security taxes, and more. If the temp or leasing agency treats their workers as independent contractors you could end up being in a heap of trouble.
Does the agency provide employees benefits?
-- Remember, if a worker walks and talks like your employee, they're probably going to be considered your employee, whether they're a sole employee or in a joint employer relationship. If an employee receives no benefits from the provider, you can easily face a hefty benefits claim down the road.
What about union activities?
-- To what extent has the agency been faced with unionization efforts? Your temporary workforce might be considered part of an existing bargaining unit and thus covered by your union contract.
Glenn Insurance, Inc
Should Your Company Pay Ransomware?
Cyber threats known as ransomware can affect companies of any size. Before you face this malware attack, understand if you should pay ransomware.
What is Ransomware?
Ransomware describes a cyber attack that occurs when hackers prevent you from accessing your business’s files. You may need to pay a ransom of thousands of dollars in exchange for file access.
You could face two types of ransomware.
Lockscreen ransomware occurs when you’re unable to make calls, access applications or run anti-virus tools because of a persistent pop-up window.
File-encrypting ransomware allows your devices to operate as normal, but it scrambles your data files and prevents you from opening them. Often, a pop-up window offers to sell you a decryption key in exchange for access.
Is Your Business at Risk?
You may think that your business is not vulnerable to a ransomware attack because you don’t handle life-or-death situations or government secrets. However, consider the effects of a ransomware attack on your company.
How would your business, customers and productivity be affected if you couldn’t fulfill orders, take payments or access communication tools?
Would your business stay afloat if customers don’t trust your cybersecurity measures?
Can you afford to pay (or not to pay) the ransomware?
Weigh the costs of these risks as you decide whether or not you need to take steps to avoid ransomware attacks.
Should you pay Ransomware?
Certain companies, including healthcare providers, may advocate for paying ransomware because lives depend on the company’s access to data. However, paying the fee encourages future extortion and may not exempt your business from additional ransomware attacks.
For these reasons, if possible. Also, take steps to avoid ransomware scenarios.
Steps to Avoid Ransomware Scenarios
Protect your company from ransomware attacks with these steps.
Back up files.
Enable at least one form of backup for your files. It should update automatically throughout the day. Also, regularly verify the integrity of the backups.
To secure your systems at all times, understand your cyber risks, install updates automatically, patch all vulnerabilities, limit access to certain files, and filter email and web browsing.
Install anti-virus and anti-malware software.
Choose, install and regularly update both anti-virus and anti-malware solutions on your entire computer system and all devices.
Create an incident response plan.
Prepare for hackers with a response plan that includes your decision to pay or not pay ransomware.
Purchase cybersecurity insurance.
Cybersecurity insurance can offer financial protection if you become a ransomware victim. Shop around for a policy that meets your company’s specific needs and your budget.
Ransomware threatens your business. Carefully consider your options and take steps to prevent this cyber threat.
Glenn Insurance, Inc
Tips That Protect Customer Information In Your Open Office
Your customers entrust their personal data to you and your company. Your employees may easily share information, though, particularly if you operate an open office with little privacy. Protect your customers’ information and identities when you follow several tips.
Collect Only the Data you Need
Unless you need a customer’s driver’s license number or Social Security number for a specific purpose related to the transaction, don't collect this data. Ask only for the data you need, and reduce access to information that could be compromised.
Use Data Only for Legitimate Purposes
The data you collect may be used to complete a sale or open a line of credit, but don’t use a customer’s data for any other purpose. Improper use of data can compromise a customer and place your company at risk.
Store Data Properly
Protect sensitive customer data when you store it electronically and never on paper. Then encrypt all data and lock it in a centralized location, not on a USB drive or other removable media. When you’re ready to erase the data, wipe it from your system and shred any paper files.
Use a Dedicated Server
While you could use a shared server to save money, a dedicated server reduces a hacker’s ability to access your data. It reduces vulnerability and improves security.
Protect Your Network
Secure the information on your network when you update your system’s anti-virus and firewall protection and scan often for malware. Perform regular updates on all computers and other connected devices, too.
Secure Your Devices
Use only updated computers, tablets, smartphones, printers, fax machines and all devices as you improve security. Then ensure all devices that connect to the internet are kept locked when not in use. When employees must connect remotely to your network, ensure they use a secure VPN (Virtual Private Network).
Backup Data Regularly
Schedule data backups at least daily. This step secures data as you collect it and reduces the risks of theft.
Maintain a “need to know” attitude as you protect data. If employees don’t need access to the information stored on paper or electronically, they shouldn’t have access to it.
Educate your entire staff about how to protect customer information. They should know how to maintain confidentiality during every step of their customer interaction, including before the sale, when they collect payment and during any follow-up.
Employees should also know how to:
Lock computers when they’re not in use.
Avoid downloading malware.
Change passwords often.
Protect customer data in your open office when you take these steps. When you and your team secure data during every step of your customer interaction, you reduce the risk of an expensive cyber breach.
Glenn Insurance, Inc
Copyright 2019. All rights reserved.