Networks - Data Security/Technology

Colin Taggart and Raj Patel, Plante Moran
Thursday, May 9, 2019

Cybersecurity is a risk for children and adults alike. Learn how to protect your family from identity theft and cyberattacks at home and while traveling. If you know what to look for, you can dramatically reduce the risk of a cyberattack. 

Thursday, May 9, 2019

Technology is automating some tasks, but most jobs are not disappearing. They are evolving. Data shows that over the past two decades, the tasks that make up any one job have changed.

HUB International Personal Insurance
Thursday, May 9, 2019

Choosing a technology platform is a time-consuming process leading to a critical decision. You need to be confident that the platform supports your multi-year benefits strategy, and that the HR technology vendor you select will meet your needs today—and in the future.

Monday, May 6, 2019

The cybersecurity threat to the middle market is growing, but the organizations now in cybercriminals’ sights have only become more confident in current protections. Generally, companies have taken steps to improve cybersecurity, but criminals are becoming more sophisticated and determined.

Gary Newton, Lutz
Friday, May 3, 2019

Cyber security is a subject that continues to make headlining news. Because every business is at risk of a cyberattack, it’s important to know what types of threats your business could be subject to and understand the techniques you can implement to help prevent attacks from happening. 

Neil Wardyn, Lutz
Wednesday, May 1, 2019

If you find your growing business suffering from a lack of support in the technology department, then your company may benefit from outsourcing IT.

Hanna Vasina, Lutz
Wednesday, May 1, 2019

Potential drains on business efficiency include groups of remote workers unable to communicate well with one another, tools that make it hard to adapt to changes or new needs quickly, and the high cost of equipment and IT personnel. Cloud-based solutions address these areas and more.

HUB International Personal Insurance
Friday, April 26, 2019

New cyber breach scenarios are constantly emerging, and they bring with them a variety of new claims. The fact that there’s no industry-standard cyber policy language makes it a tremendous challenge to ensure your Cyber Risk insurance will really protect you.

HUB International Personal Insurance
Thursday, April 25, 2019

In a ransomware attack, a hacker penetrates an organization’s network and holds its data hostage until a specified ransom is paid. Hackers don’t discriminate based on business size or industry—any organization that stores its data on a network is at risk.

Vorys, Sater, Seymour and Pease LLP
Tuesday, April 23, 2019

Massachusetts Governor Charlie Baker recently signed House Bill 4806, amending the state’s data breach notification law.