Risk Management ( Page 2 )

  • Home
  • Risk Management
  •  ( Page 2 )

How To Create Effective Travel Risk Assessments For Work Trips

As the global landscape evolves, organizations must prioritize the well-being of their travelers through strategic planning and continuous improvement. Travel risk assessments are part of the foundation of that effort. INSIDE THIS ARTICLE, YOU’LL FIND:What is travel risk?What are the components of a travel risk assessment?How to prepare an assessment Every great organization that sends ...
Read more

Ransomware Costs Businesses Record-High $1 Billion in 2023: Your 5-Step Plan to Prevent Attacks in 2024

2023 was the most devastating year yet for ransomware attacks, with businesses forking over $1 billion in ransom payments for the first time ever – and 2024 is expected to be even worse. Beyond the payments, the average cost of each ransomware attack last year was over $5 million. Given these unprecedented statistics, ransomware attacks ...
Read more

Property Insurance Coverage for Emerging Risk: Underground Climate Change

Abstract: Studies have shown that heat emanating from basements, train tunnels, sewers, and other underground systems in major metropolises in the United States and Europe is heating the ground between city surfaces and the bedrock by as much as 27 degrees Fahrenheit. This “underground climate change” is affecting ground soil conditions, causing structural strains on ...
Read more

What is an Emergency Action Plan? A Guide for Businesses Preparing for Crisis

 An emergency action plan helps ensure safety and well-being within a workplace or community space during emergencies. How can you create and maintain one of your own?  Our interconnected and disrupted global landscape – rife with political, economic, and climate turmoil – is forcing businesses everywhere to prepare for various emergencies that could impact their ...
Read more

System hacked warning alert on notebook (Laptop). Cyber attack on computer network, Virus, Spyware, Malware or Malicious software. Cyber security and cybercrime. Compromised information internet.

Scammers Exploiting Corporate Transparency Act To Get Your Private Information

With the Corporate Transparency Act (“CTA”) going into effect on January 1, 2024, it should come as no surprise that bad actors are already exploiting the new law to collect personal information from companies and use it for unlawful purposes. As we discussed in an earlier CSG Law client alert, The Corporate Transparency Act: How Will ...
Read more

Asian Senior businesswoman executive travelling by a personal car.

Traveling Safely Abroad: Choosing Alternatives to Uber and Lyft

While rideshare apps like Uber and Lyft are predominately safe and reliable, they may not offer adequate security for travelers—learn more about transportation alternatives for secure travel when abroad. When traveling for work or pleasure, visitors need to decide how they’ll get around an unfamiliar destination. Rideshare apps like Uber and Lyft have revolutionized the ...
Read more

Colleagues are celebrating the end of the year

Ten Tips to Avoid Your Holiday Party Resulting in a Fa-La-La-La-Litigation

They say, “it’s the most wonderful time of the year,” but if you are a business owner, in-house counsel or HR professional, this can often be the most stressful time of the year, especially when it comes to hosting company parties. Such celebrations at this time of year, although well intended, can land your company ...
Read more

Businesswoman using laptop in the departure area at airport

Using Public Wi-Fi While Traveling? Here’s How to Protect Yourself

Learn about the security risks associate with using public Wi-Fi and review practical tips to ensure your digital safety while on the road. In a world where staying connected is paramount, public Wi-Fi spots have become ubiquitous. These convenient networks offer an instant gateway to the online world, where you can connect with family and ...
Read more

Robotic hand pressing a keyboard on a laptop 3D rendering

AI Notetaking Tools Are All the Rage – But Should You Use Them? Employers Should Weigh These Risks First

Perhaps you’ve asked an employee to take notes during a Zoom meeting, but they complained the task is difficult to manage while collaborating with teammates. Maybe you intended to document everything that transpired during an important call about a new strategic plan, but conversations moved too fast to track. Artificial intelligence can be a valuable ...
Read more

Ransomware Malware Attack. Business Computer Hacked. Security Breach

Are cyberattacks an OSHA Issue?

As technology evolves, unfortunately, so do ways to hack that technology. The recent cyberattacks in several casinos in Las Vegas are just one recent example of the growing concern about cyberattacks on businesses and the tremendous consequences and liability that may result from such attacks. Could OSHA be one such concern? At first blush, any ...
Read more