Protect your organization from hurricane damage
![](https://www.publicrisk.com/wp-content/uploads/2023/06/PGIT-6.7-sm-building-hurricane-LARGE-BLOG-1024x683.png)
How to prepare your organization for a hurricane A hurricane’s path of devastation may be wide and ongoing for days, sometimes more than a week. For this reason, we’re arming you ahead of time with tips and advice on how to protect your organization from hurricane damage. By starting your planning early, you can take […]
Keys to the Kingdom – Protect your data by implementing multifactor authentication
![](https://www.publicrisk.com/wp-content/uploads/2024/03/4.14_cyber_security_BLOG-1.png)
The past two years have seen record-breaking levels of cyber crime and related losses. As technology becomes ever more integrated in society and criminals become more sophisticated, this trend can only be expected to continue. The common denominator in many successful attacks often boils down to one thing: human error. Whether it’s clicking the wrong […]
The essentials of cyber security
![](https://www.publicrisk.com/wp-content/uploads/2024/02/PGIT-3.6-computer-training-LARGE-BLOG-1024x683.png)
by Scott Schleicher, Underwriting Manager, Cyber & Technology – AXA XL With cyber attacks on the rise, it’s important for organizations to be ever vigilant in their part to support cyber security initiatives and protect the safety of their valuable assets. The piece below, by Scott Schleicher, reminds Preferred members of the potential impacts of […]
What you can do to prevent cyber attacks
![](https://www.publicrisk.com/wp-content/uploads/2024/02/PGIT-2.21-cybersecurity-LARGE-BLOG-1024x683.png)
In today’s digital landscape, cyber attack threats in the public entity space are mounting. The consequences of such attacks can disrupt essential public services and compromise sensitive data. It’s important to prioritize cybersecurity measures to safeguard critical infrastructure and data and help maintain public trust and confidence in the services provided. Read more on the […]
Thwart phishing scams and protect your data [infographic]
Preferred Cybersecurity Bulletin
![](https://www.publicrisk.com/wp-content/uploads/2024/02/ACM-5.11-data-breaches-BLOG.png)
Local governments face significant financial loss when a cyber attack occurs. Recently there has been a sharp increase in the number of reported cyber attacks that target local governments using stolen logins and passwords. Cybercriminals often rely on human error such as employees failing to install software upgrades or clicking on malicious links to gain […]
How to prevent Workers’ Compensation fraud
![](https://www.publicrisk.com/wp-content/uploads/2024/01/PGIT-1.24-wc-fraud-LARGE-BLOG-1024x683.png)
Due to the prevalence of workers’ compensation fraud across the U.S., organizations are responding with a list of best practices to help fight this epidemic. You can apply many of these same tactics to help fight workers’ comp fraud in your own organization. We’ve compiled information from insurers, HR practitioners, attorneys, claims experts and more. […]
Termination tips and best practices
![](https://www.publicrisk.com/wp-content/uploads/2023/12/PGIT-12.13-getting-fired-LARGE-BLOG-1024x683.png)
People are the backbone of your organization. These termination tips can be part of a one of the most critical steps in organizational practice, which is making a good hire. An individual who fits in well with the culture, who meets or exceeds job expectations, has excellent quality of character, and gets along well with […]
Cyber risks and liabilities: Responding to a data breach
![](https://www.publicrisk.com/wp-content/uploads/2023/10/PGIT-10.18-data-breach-1024x536.png)
No organization, big or small, is immune to a data breach. Many small employers falsely believe they can elude the attention of a hacker, yet studies have shown the opposite is true—a growing number of companies with fewer than 100 employees are reporting data breaches every year. Data breach response policies are essential for organizations […]
Cyber Risks and Liabilities – Email Security Best Practices
![](https://www.publicrisk.com/wp-content/uploads/2023/10/PGIT-10.4-email-LARGE-BLOG-1024x683.png)
Since organizations rely heavily on email to communicate and conduct business operations, cybercriminals commonly target email as an entry point to access networks and breach valuable business data. In fact, 94% of malware is delivered by email, according to Verizon’s Data Breach Investigations Report. Following a cybersecurity breach, organizations may suffer financial, reputational and intellectual […]