Our Blog - Surety Matters

Our blog covering the latest in bonds and insurance
Displaying 302 results for: ERISA
Cyber for Plan Sponsors 07.02.2019

Half of Manufacturers Have Had a Data Breach in the Last Year

Manufacturing is one of the biggest blue collar industries in the United States, but with technology making manufacturing processes more and more efficient and processes having to be expertly and exactly tracked by computer systems…
Read Moreabout Half of Manufacturers Have Had a Data Breach in the Last Year

Half of Manufacturers Have Had a Data Breach in the Last Year
ERISA 07.02.2019

Pension Professionals: Simplify the ERISA Bonding Process

Managing employee benefit plans seems to keep getting more and more complicated every year. Fiduciary duties remain opaque and retirement plans and benefits have morphed over time. One of the more confusing processes for the…
Read Moreabout Pension Professionals: Simplify the ERISA Bonding Process

Pension Professionals: Simplify the ERISA Bonding Process
Cyber for Plan Sponsors 07.02.2019

Over a Third of Cyber Attacks Come From the Inside

You can install all the top of the line, cutting edge cyber defenses you want, but if your attackers are coming from the inside and already have access to your system, how well can you…
Read Moreabout Over a Third of Cyber Attacks Come From the Inside

Over a Third of Cyber Attacks Come From the Inside
Cyber for Plan Sponsors 07.02.2019

Tactics Utilized in Data Breaches

The popular idea of a cyber attack or data breach usually involves a hacker breaking into a computer system. But that is usually not the case. There are a multitude of methods used by cyber…
Read Moreabout Tactics Utilized in Data Breaches

Tactics Utilized in Data Breaches
Cyber for Plan Sponsors 07.02.2019

Phishing Attacks More Successful on Mobile

Viewing an entire email in a standard window on a desktop can make it fairly easy to figure out if an email you received is legitimate. You can easily see the sender address, all signatures…
Read Moreabout Phishing Attacks More Successful on Mobile

Phishing Attacks More Successful on Mobile
Cyber for Plan Sponsors 07.02.2019

Who’s Behind Data Breaches?

When you’re implementing data breach and cyber attack protections, you’re probably thinking about agents from the outside trying to hack your system and expose your company’s sensitive data. But those are not the only people…
Read Moreabout Who’s Behind Data Breaches?

Who’s Behind Data Breaches?
Cyber for Plan Sponsors 07.02.2019

How Internal Employees Cause Data Breaches

While the popular image of a cyber attack is from someone from the outside, more than a third of data breaches involve an internal actor. Misuse of existing privileges by these internal actors often are…
Read Moreabout How Internal Employees Cause Data Breaches

How Internal Employees Cause Data Breaches
ERISA 07.01.2019

NYC Law Firm Releases 2019 Fiduciary Guide

It is hard for a fiduciary to determine what exactly would be a breach of their fiduciary duty to a retirement plan. That is where New York based law firm Cohen & Buckmann, P.C.’s 2019…
Read Moreabout NYC Law Firm Releases 2019 Fiduciary Guide

NYC Law Firm Releases 2019 Fiduciary Guide
Cyber for Plan Sponsors 06.27.2019

The Different Types of Data Breaches

The popular image of a data breach is a hacker in his mother’s basement breaking into the mainframe and stealing everything they want. But data breaches very rarely happen in that manner. Cyber criminals keep…
Read Moreabout The Different Types of Data Breaches

The Different Types of Data Breaches