Skip to main content
Category

secure

6 tips to secure your home computer network

By agent, antispyware, antivirus, breach, business, Business Insurance, cyber, data, encryption, financial, firewall, hack, hacker, independent, information, Insurance, internet, operating, password, personal, prevent, proprietary, protect, Risk Management, router, secure, security, software, SSID, system, vendor, VPN, wireless, work from home
home-computer-network

Even as many companies reopen offices to employees, surveys show remote work is likely here to stay, at least part of the time. It’s important to understand that working from home adds responsibilities for employees to secure the data flowing through their home information networks.

The post 6 tips to secure your home computer network appeared first on The Cincinnati Insurance Companies blog.

Read More

When kids come to work: 5 tips for businesses and parents

By abuse, agent, background, boundaries, business, Business Insurance, care, caregiver, child, childcare, children, Consumer Tips, coronavirus, criminal, emergency, hazard, independent, Insurance, kids, legal, Loss Control, organization, Pandemic, parents, physical, plan, prevent, protect, safe, Safety Tips, secure, work
kids-at-work

The coronavirus pandemic has prompted business owners and their employees to find new ways to keep employees and their families safe and secure. Many organizations are assisting working parents by allowing employees to bring their children to work. In areas where traditional daycare facilities may be unavailable, some employers are setting up temporary daycare services on-site.

The post When kids come to work: 5 tips for businesses and parents appeared first on The Cincinnati Insurance Companies blog.

Read More

Strengthen your data privacy practices

By access, agent, breach, business, Business Insurance, claim, compliance, confidential, control, cyber, data, electronic, HIPAA, independent, information, Insurance, loss, negligence, physical, prevent, privacy, private, proprietary, protect, protected, release, scam, secure, security, threat, unauthorized, vulnerabilities, vulnerability, vulnerable
data-privacy

Your business, whatever its size, most likely processes and maintains information every day. At least annually, take time to review your data privacy practices to reinforce your information security and to reassess your cyber protection.

The post Strengthen your data privacy practices appeared first on The Cincinnati Insurance Companies blog.

Read More

Halloween: Tips to make your celebration a treat

By adult, adults, agent, alcohol, burn, cab, candle, child, children, damage, fall, homeowner, independent, injure, injury, Insurance, liability, lights, liquor, personal, Personal Insurance, pets, policy, prevent, property, protect, secure, security, slip, supervise, treats, umbrella
halloween-liability

As you and your family bring out the Halloween decorations and prepare for parties and trick-or-treaters, take time to evaluate the liability exposures associated with having guests on your property.

The post Halloween: Tips to make your celebration a treat appeared first on The Cincinnati Insurance Companies blog.

Read More

Protect your privacy on the ‘internet of things’

By agent, city, concerns, connect, connected, connection, cyber, data, home, independent, information, Insurance, internet, Lifestyle, online, password, prevent, privacy, protect, secure, security, self, smart speaker, update, virus, wearable, wifi
cyber-internet-of-things

A man stops at the grocery store after work for a frozen pizza. As he gets back in his car, he uses his phone to tell his oven to start preheating. The man sits down to eat and realizes he is out of napkins. He tells his smart speaker to order some and grabs a paper towel instead. This man is using a collection of connected devices seemingly to make his life more convenient. This concept is called the “internet of things.”

The post Protect your privacy on the ‘internet of things’ appeared first on The Cincinnati Insurance Companies blog.

Read More