Keys to the Kingdom – Protect your data by implementing multifactor authentication

The past two years have seen record-breaking levels of cyber crime and related losses. As technology becomes ever more integrated in society and criminals become more sophisticated, this trend can only be expected to continue. The common denominator in many successful attacks often boils down to one thing: human error. Whether it’s clicking the wrong […]

The essentials of cyber security

by Scott Schleicher, Underwriting Manager, Cyber & Technology – AXA XL With cyber attacks on the rise, it’s important for organizations to be ever vigilant in their part to support cyber security initiatives and protect the safety of their valuable assets. The piece below, by Scott Schleicher, reminds Preferred members of the potential impacts of […]

What you can do to prevent cyber attacks

In today’s digital landscape, cyber attack threats in the public entity space are mounting. The consequences of such attacks can disrupt essential public services and compromise sensitive data. It’s important to prioritize cybersecurity measures to safeguard critical infrastructure and data and help maintain public trust and confidence in the services provided. Read more on the […]

Preferred Cybersecurity Bulletin

Local governments face significant financial loss when a cyber attack occurs. Recently there has been a sharp increase in the number of reported cyber attacks that target local governments using stolen logins and passwords. Cybercriminals often rely on human error such as employees failing to install software upgrades or clicking on malicious links to gain […]

How to prevent Workers’ Compensation fraud

Due to the prevalence of workers’ compensation fraud across the U.S., organizations are responding with a list of best practices to help fight this epidemic. You can apply many of these same tactics to help fight workers’ comp fraud in your own organization. We’ve compiled information from insurers, HR practitioners, attorneys, claims experts and more. […]

Termination tips and best practices

People are the backbone of your organization. These termination tips can be part of a one of the most critical steps in organizational practice, which is making a good hire. An individual who fits in well with the culture, who meets or exceeds job expectations, has excellent quality of character, and gets along well with […]

Cyber risks and liabilities: Responding to a data breach

No organization, big or small, is immune to a data breach. Many small employers falsely believe they can elude the attention of a hacker, yet studies have shown the opposite is true—a growing number of companies with fewer than 100 employees are reporting data breaches every year. Data breach response policies are essential for organizations […]

Cyber Risks and Liabilities – Email Security Best Practices

Since organizations rely heavily on email to communicate and conduct business operations, cybercriminals commonly target email as an entry point to access networks and breach valuable business data. In fact, 94% of malware is delivered by email, according to Verizon’s Data Breach Investigations Report. Following a cybersecurity breach, organizations may suffer financial, reputational and intellectual […]

How cybercriminals are weaponizing artificial intelligence

The past few years have seen artificial intelligence (AI) surge in popularity among both businesses and individuals. Such technology encompasses machines, computer systems and other devices that can simulate human intelligence processes. In other words, this technology can perform a variety of cognitive functions typically associated with the human mind, such as observing, learning, reasoning, […]