Our Blog - Surety Matters

Our blog covering the latest in bonds and insurance
Displaying 671 results for: Colonial products
Court Bonds 07.02.2019

Managing a VA Beneficiary’s Funds

So you have been appointed as a VA fiduciary by the United States Department of Veterans Affairs. Did you know that you have specific responsibilities when it comes to managing your VA beneficiary’s funds? VA fiduciaries have…
Read Moreabout Managing a VA Beneficiary’s Funds

Managing a VA Beneficiary’s Funds
Cyber for Plan Sponsors 07.02.2019

Over a Third of Cyber Attacks Come From the Inside

You can install all the top of the line, cutting edge cyber defenses you want, but if your attackers are coming from the inside and already have access to your system, how well can you…
Read Moreabout Over a Third of Cyber Attacks Come From the Inside

Over a Third of Cyber Attacks Come From the Inside
Cyber for Plan Sponsors 07.02.2019

Tactics Utilized in Data Breaches

The popular idea of a cyber attack or data breach usually involves a hacker breaking into a computer system. But that is usually not the case. There are a multitude of methods used by cyber…
Read Moreabout Tactics Utilized in Data Breaches

Tactics Utilized in Data Breaches
Cyber for Plan Sponsors 07.02.2019

Phishing Attacks More Successful on Mobile

Viewing an entire email in a standard window on a desktop can make it fairly easy to figure out if an email you received is legitimate. You can easily see the sender address, all signatures…
Read Moreabout Phishing Attacks More Successful on Mobile

Phishing Attacks More Successful on Mobile
Cyber for Plan Sponsors 07.02.2019

Who’s Behind Data Breaches?

When you’re implementing data breach and cyber attack protections, you’re probably thinking about agents from the outside trying to hack your system and expose your company’s sensitive data. But those are not the only people…
Read Moreabout Who’s Behind Data Breaches?

Who’s Behind Data Breaches?
Cyber for Plan Sponsors 07.02.2019

How Internal Employees Cause Data Breaches

While the popular image of a cyber attack is from someone from the outside, more than a third of data breaches involve an internal actor. Misuse of existing privileges by these internal actors often are…
Read Moreabout How Internal Employees Cause Data Breaches

How Internal Employees Cause Data Breaches
Court Bonds 07.02.2019

Conservatorship of an Adult

The court appoints a conservator when a person can no longer make financial or healthcare decisions. A conservator can be responsible for the daily care of a disabled person. For example, administer medication, take the…
Read Moreabout Conservatorship of an Adult

Conservatorship of an Adult
Court Bonds 07.02.2019

VA Beneficiary Rights

In most cases, Veterans Affairs beneficiaries are able to manage their own VA benefits. However, if a beneficiary is incapacitated by minority, injury, disease, or advanced age related reasons, the VA may conclude that that…
Read Moreabout VA Beneficiary Rights

VA Beneficiary Rights
Court Bonds 07.01.2019

When Does a Conservatorship End?

When someone is deemed to be unable to care for him or herself, another person is able to petition a probate court for control over their affairs. That control is a conservatorship (or guardianship, depending…
Read Moreabout When Does a Conservatorship End?

When Does a Conservatorship End?