Our Blog

  • Overview of Ransomware

    In a recent report written by the Institute for Critical Infrastructure Technology they describe ransomware as being used by criminals which attempt to prevent access to the victim’s data until a fee is paid, unlike hackers who attempt to infiltrate or manipulate data where it is stored, processed, or in transmission. Therefore, ransomware is less […]

    June 15, 2016

  • What is a Surety Bond?

    Definition A surety bond or surety is a promise by a surety or guarantor to pay one party (the obligee) a certain amount if a second party (the principal) fails to meet some obligation, such as fulfilling the terms of a contract. The surety bond protects the obligee against losses resulting from the principal’s failure […]

    May 24, 2016

  • Fraud in Workers’ Comp

    One of the best ways for businesses to control their workers’ compensation costs is to control the frequency of all insurance claims. There are legitimate claims however; unfortunately, there are also fraudulent claims. In addition to a well-planned safety program, your business should also address a zero tolerance for fraud as standard policy. The following […]

    May 18, 2016

  • Hurricane Season 2016 – What to expect?

    The 2016 Atlantic Hurricane Season officially begins June 1, 2016, and will end November 30, 2016. These dates historically describe the period each year when most tropical cyclones form in the Atlantic basin and are used as guidelines as to when hurricanes are most likely to occur. However, the formation of tropical cyclones is possible […]

    May 3, 2016

  • Earthquake –Are you ready for the next big one?

    Elevated risk of seismic activity has fueled concerns of “the next big one”. Catastrophic risk experts are diligent in recording seismic activity in an effort to predict when such an event may occur. Such as the Seismological Laboratory at Caltech that has statistical data dating back to before the 1900s of activity in California and […]

    April 26, 2016

  • Cyber-Information Systems Security Program

    It used to be that only large Fortune 1000 companies would purchase cyber liability insurance, but that is no longer the case. Any small to mid-size company that handles or obtains personal identifiable information on customers, employees or vendors is now responsible and required by law to protect that information.   Most companies use computers, tablets […]

    April 12, 2016

  • Protecting your Assets with Personal Insurance

    We work hard every day for the assets we acquire. Buying our first automobile and purchasing our first home gives us a sense of security in our future. But what happens when life’s unexpected occurs? Insurance products are there to help mitigate the financial loss associated with the expected as well as the unexpected. When […]

    April 5, 2016

  • Common Causes of Hotel Injuries

    When assessing the risks and hazards in your resort there are some key areas in which to consider for the safety of employees and guests. Swimming pools – We all know the dangers of swimming pools. When the perimeter area is too smooth, a guest or employee can easily fall. Because the surface is often partially […]

    March 29, 2016

  • Plan for a Flood

    Floods are the #1 natural disaster in the United States and even areas outside of those typically subject to flooding can be vulnerable. According to the NFIP (National Flood Insurance Program), people outside of the mapped high-risk flood areas file over 20-percent of all National Flood Insurance Program flood insurance claims and receive one-third of […]

    March 23, 2016

  • Identity Theft – What you need to Know

    Identity theft is an all too common occurrence that needs to be taken seriously by individuals as well as business owners who are responsible for the identity of employees, vendors and customers. In a recent case by the US Attorney’s Office-Eastern Division, a Delaware man Jean Baptiste Alvarez allegedly improperly obtained the personal identifying information […]

    March 9, 2016