Plan Fiduciary Breach Complaints Rise as Markets Fall
The biggest thing that plan fiduciaries can do to prevent claims of fiduciary breach is to implement and follow prudent fiduciary policies, procedures, and practices. This would theoretically cover issues involving costs, conflicts, and due…
Read Moreabout Plan Fiduciary Breach Complaints Rise as Markets Fall
Recovering from a Data Breach Requires the Professionals
Managing and containing a data breach is not something a normal business person knows how to do. Cyber attackers are more sophisticated than ever and are going to stay a step ahead of a layman…
Read Moreabout Recovering from a Data Breach Requires the Professionals
ERISA Ambiguities Lead to Confusion Over Fiduciary Duties
More and more cases related to ERISA duties are winding their way through the courts and could have a large impact on plan sponsors and how they will be able to manage their employee benefit…
Read Moreabout ERISA Ambiguities Lead to Confusion Over Fiduciary Duties
Half of Manufacturers Have Had a Data Breach in the Last Year
Manufacturing is one of the biggest blue collar industries in the United States, but with technology making manufacturing processes more and more efficient and processes having to be expertly and exactly tracked by computer systems…
Read Moreabout Half of Manufacturers Have Had a Data Breach in the Last Year
Pension Professionals: Simplify the ERISA Bonding Process
Managing employee benefit plans seems to keep getting more and more complicated every year. Fiduciary duties remain opaque and retirement plans and benefits have morphed over time. One of the more confusing processes for the…
Read Moreabout Pension Professionals: Simplify the ERISA Bonding Process
Over a Third of Cyber Attacks Come From the Inside
You can install all the top of the line, cutting edge cyber defenses you want, but if your attackers are coming from the inside and already have access to your system, how well can you…
Read Moreabout Over a Third of Cyber Attacks Come From the Inside
Tactics Utilized in Data Breaches
The popular idea of a cyber attack or data breach usually involves a hacker breaking into a computer system. But that is usually not the case. There are a multitude of methods used by cyber…
Read Moreabout Tactics Utilized in Data Breaches
Phishing Attacks More Successful on Mobile
Viewing an entire email in a standard window on a desktop can make it fairly easy to figure out if an email you received is legitimate. You can easily see the sender address, all signatures…
Read Moreabout Phishing Attacks More Successful on Mobile
Who’s Behind Data Breaches?
When you’re implementing data breach and cyber attack protections, you’re probably thinking about agents from the outside trying to hack your system and expose your company’s sensitive data. But those are not the only people…
Read Moreabout Who’s Behind Data Breaches?