For many employers, performance evaluations have become obsolete and for others they still exist, but only as a small part of a much grander process. Unfortunately, the annual performance evaluation by itself seldom provides any benefit, is often dreaded by managers and employees alike, and can be incredibly time consuming.
You take steps to protect your business from perils such as fire and theft. But how do you start to understand a risk that you cannot see and perhaps have never experienced?
READ THE ARTICLE
Our update for December highlights malware, data breaches, a bomb scare, and more.
READ THE ARTICLE
Know the essentials before deciding.
You might be tired of hearing about new cyber risks, especially around the holiday season with all of its other stressors, but now is the ideal time to protect your family as smart devices are a very popular type of holiday gift. Like any evolving technology, smart home tech is especially vulnerable to hackers. Do you own — or are you thinking about purchasing — any of the following popular devices?
The Occupational Safety and Health Administration (OSHA) has made its list (and checked it twice) of the 10 most frequently cited violations of 2018. While the list does not change much from year to year, there are still lessons that can be learned from other employers’ mistakes. We present to this list to help you identify common pain points and keep your workplace on the nice list. Following a broad discussion of the top 10 violations, we’ll take a deep-dive look into each issue every month throughout 2019.
You take steps to protect your business from perils such as fire and theft. But how do you start to understand a risk that you cannot see and perhaps have never experienced? This is the predicament that many business executives are facing and the nature of cyber risk. As businesses become more connected and dependent on online systems and vendors, the risk of a data breach or crippling business disruption goes up. If you rely on email and access to the internet to conduct everyday business, you're at risk.
This month's Threat Intelligence Report is about a large hotel chain that reports an “unauthorized access” to its customer database since 2014, exposing data of 500 million guests; a vulnerability in a postal service site that left 60 million customers exposed for more than a year; a third-party vendor breach that exposes data of millions of healthcare patients; a new report that profiles notorious MageCart cyber criminals; court documents that reveal first-ever indictment on ransomware charges; and a bundled pack that makes SamSam and other ransomware easier for hackers to obtain and deploy.
Why do we fail to set safety goals? There is likely a long list with time and resources being at the top. Or maybe goals were set in the past and they were never met. Even with a mountain of data, goal setting is hard work. The right goals balance objectives, strategy and performance. When it comes to setting safety goals, we have identified five things you should consider to establish goals that motivate and spark renewed efforts toward safety.
Once upon a time, the price of a business insurance policy was determined, in large part, by an underwriter’s assessment of an organization’s risk. The underwriter would weigh the perceived risk the insurance carrier was taking on and determine premiums for taking on that risk. But as more and more data becomes digitized, data is playing a more central role in insurance carriers’ determinations — not only in pricing a risk, but whether to even take on the risk in the first place. Enter predictive modeling.
OSHA recently released a memo clarifying how to apply standards when conducting compliance investigations. The federal regulations are still in place and remain unchanged, but the memo raises some concerns about post-accident drug testing. If you’re going to conduct post-accident drug testing, you should still have some reason to believe that drug or alcohol use could have increased the likelihood of the incident occurring. Also, if you’re going to offer safety incentives for clean safety records, consider accompanying them with other incentive programs that more clearly reward actual safe practices or behaviors.
In this new Threat Intelligence report, we discuss some of the latest cyber risks, including Chinese involvement in U.S. hardware hacks; a study that reveals the ease at which criminals are using legitimate email credentials; a Canadian university that recovered $10.9 million in an $11.8 million fraud scheme; millions of voter registration records listed for sale ahead of the 2018 mid-term elections; companies impersonated by hackers in phishing schemes; and ransomware-as-a-service that is now offering exploit kits to users.
In March 2016, Congress established a Cybersecurity Task Force with the directive to determine the state of cybersecurity within the healthcare industry. They published their findings in June of 2017 and they were not good. It should come as no surprise then that healthcare continually ranks as experiencing the highest number of data breaches and cyber-attacks year over year.
Send a Message
Find a Location