Central Insurance Companies

Serve Up Stovetop and Oven Safety

Stovetop fire

I’ve written about stovetop fire extinguishers before, but I also want to share some general stovetop and oven safety tips with you. Since I’ve been working from home, I’m cooking a lot more and using my stovetop and/or oven daily, and that’s true for many others these days!

Read more…

Ladder Safety, One Step at a Time

Blog template - 600 x 380 (19)

Have you ever seen one of your family members or neighbors at the top of a ladder not being very safe? Maybe they were painting, taking leaves out of the gutters or cleaning windows, but they were making you nervous just watching them! Well, I’ve felt that quick moment of panic as I’ve seen some people misstep or reach too far and start to lose balance. At that point, I’m running over to the bottom of the ladder hoping I’m in time to steady it and prevent a fall.

Read more…

Springing into Strong Winds and Storms

Tornado - Blog

If the wind was strong enough to pick up Dorothy and Toto and pull her entire house into a tornado and send them to the magical Land of Oz, there is no telling what it could do to your property. Spring season is here, and with that comes storms. Rain, hail, wind, lightning, and those nasty tornadoes can cause serious damage. So, instead of getting your magical shoes ready, follow these simple steps to minimize damage to your home.

Read More

Extra Time on Your Hands? Why Not Spring into Spring?

Spring Into Spring

Spring has always been one of my favorite seasons. All winter I look forward to planting flowers, the warmer weather, and my birthday!

But spring also brings rain, storms, and other perils that could cause damage to your home. Most of us are under quarantine right now and have some extra time on our hands, so it’s a great time to follow this checklist to ensure that your home is ready for spring!

Read more…

Stay Cyber Secure When Connecting Remotely

Blog template - 600 x 380 (17)

COVID-19 has forced people from their workplaces and schools. Working from home and homeschooling means that millions of Americans are using video conferencing for the first time. With this surge in new users, there will be many cybersecurity challenges. Here’s some information to help you make sure your online video communications stay secure.

Pick a secure video conferencing service.

Now that more businesses, schools, and organizations are relying on video conferencing software for day-to-day communications, the question of their security, while always an issue, is mission-critical. Software companies have begun offering free, enhanced versions of their teleconferencing apps to facilitate the sudden shift in remote workers.

When selecting a platform, ask the following questions:

  • Is free ever really free? When services are free, they are often collecting information that they can monetize. Make sure you go to settings on whatever platform you’re using and set your privacy as tight as possible.
  • Does the service allow you to take screenshots or record a session? If so, does it provide notification? Sensitive information can be gleaned from the images generated during a video conference. A post-it with a password on the wall behind your desk, an image from your private life, or an account statement from your bank can be accidentally shared with attendees.
  • Does it allow you to record the session? All of the above should be remembered because many conferencing services allow users to record sessions for future reference. Any recordings, yours or that of a colleague, can represent a major data risk.
  • Does it allow a virtual background?  Virtual backgrounds do more than just hide a messy home office–they allow users to conceal potentially compromising personal details, including usable information, that can be leveraged against them by bad actors. Unless you’re speaking with trusted associates or friends, the fewer attendees are able to see, the better.
  • Does it allow you to select a participant and view their video? The worst that can happen is not a creepshot getting posted online. The images saved by a bad actor can be used to figure out where you live and other compromising details.
  • Is there known malware and/or poor security associated with the service? Most companies will scramble to patch a vulnerability in their software before they become public knowledge. Unfortunately, a single attendee that hasn’t updated to the most recent or secure version can potentially compromise an entire meeting. Look for a platform that can provide detailed information about their commitment to security, and that requires attendees to upgrade their software.
  • Does it provide end-to-end encryption? Public and shared Wi-Fi access can leave user data vulnerable to man-in-the-middle attacks. End-to-end encryption provides an extra layer of security by making conferences and communication significantly harder to intercept.  (This does little to prevent anyone within your physical proximity from eavesdropping, so exercise caution and common sense.)
  • Does it allow you to change your display name, create a burner number, or otherwise conceal your identity? One of the most effective tricks a hacker has in compromising a business is spoofing (i.e., pretending to be a co-worker, colleague, or associate). Make sure you’re using a platform that makes it difficult to conceal or change your identity and be sure to confirm that the person with whom you’re communicating is who they say they are before sharing any information. It’s good practice to ask every attendee to announce himself or herself at the start of a meeting.
  • Can meetings be restricted to attendees with PINs? Access to meetings can and should be restricted to invite-only. A secure platform will also provide a means of authentication. If you’re using one that doesn’t, consider changing to one that does.
  • In large meetings, do participants get displayed on multiple pages when attending a large meeting? This matters because often uninvited guests who log in late can lurk there, displaying only a phone number, which is easy to ignore in a meeting with 50+ attendees.

Beware of Phishing Links

The COVID-19 outbreak has meant more people relying on e-mail as a primary source of communication and hackers have taken notice. Be extremely cautious when opening any attachments or clicking on links sent via e-mail or text.

The risks are not new. Ransomware has the potential to effectively sever your communication to your workers, and there will be fewer resources for getting back online.

Additionally, hackers will be looking for opportunities to hack into companies with the mass change of behavior. Other vectors of attack may include phishing via text message (smishing) and vishing, where someone calls and poses as an employee.

Confirm E-mail Communications

A major tactic used in phishing scams is Business Email Compromise (BEC), where seemingly innocuous e-mails are sent from a known co-worker or colleague to get sensitive information such as network access, payment information, or even money transfers.

“BEC is a very damaging form of phishing – one that riffs off the whaling method, where the hacker’s goal is to trick a c-suite employee into clicking a link or opening an attachment,” says CyberScout founder Adam Levin. “BEC turns the whaling method around, spoofing the e-mail of a higher-up and sending an urgent communication to someone in a position to wire money.”

Google and Facebook were both hit with this tactic to the tune of $100 million in 2019 – if anyone in your office gets an e-mail asking for anything potentially sensitive, follow up with a phone call, Slack, text message, etc. Never trust an e-mail, even if it looks legitimate.

How Do Remote Workers Figure Into It?

It goes without saying that everything was not secure or cyber-safe before COVID-19. Any business with at least one computer, mobile phone, or Internet-connected device was and continues to be threatened on a regular basis by a wide array of malware, phishing scams, data leaks, ransomware, and more.

An entire office can operate on a single network with the bulk of its internet traffic channeled through that single Internet connection. This makes it easier to implement a firewall and security software specifically designed to block suspicious traffic and known threats. Also, IT and tech support staff usually have access to all devices connected to a company’s network, and for that reason can ensure software and firmware is patched and up to date. While that doesn’t protect fully against cyberthreats, it provides greater oversight and protection than workers have from their homes.

“This new situation has drastically increased our collective attackable surface,” Levin warns. “A spike in new cyber-attacks is inevitable when an entire workforce is connecting remotely.”

Blog courtesy of CyberScout. ©2020 CyberScout, LLC



World Backup Day! The 5 W’s of Data Backup

Blog template - 600 x 380 (16)

Times are really different right now compared to years past, but today is March 31, and that means it’s World Backup Day. As we’re quarantined and trying to stay healthy, it may be a good time to remind ourselves about the importance of protecting our valuable information. Data loss can strike at any time, and the cost of recovery could be high—unless you have a recent, usable backup. Take the first step by following the 5 Ws of backing up data: who, what, where, when, and why.

Read More

Why You Should Care About Your Child’s Financial Literacy

Blog template - 600 x 380 (15)

Families across the country are in quarantine and are likely keeping their children busy by assigning chores! Many of us will reward our children with an allowance or other form of compensation for completing those chores. So what better time to talk to your kids about responsibility in earning money and being smart with that money.

Read more…

Adjusting to Remote Work


Blog template - 600 x 380 (14)

So COVID-19 has turned you into a remote worker. Maybe you’ve always wanted to work at home. Or maybe you miss your coworkers. It’s an adjustment. Here are some tips that
can help you enjoy your new work environment.

Read more…

Working Remotely? Remember to Secure Your Webcam!

Blog template - 600 x 380 (12)

The Covid-19 pandemic, also known as the novel coronavirus, has affected daily life in unprecedented ways. Because of home-work and homeschooling measures, millions of Americans are using video conferencing for the first time. With this surge in new users, there will be many cybersecurity challenges.

Read more…

Digital Hygiene Tips for Coronavirus Scams

Blog template - 600 x 380 (11)

Coronavirus scams are everywhere.

During the evolving public health crisis surrounding COVID-19 (coronavirus), it is essential to remain vigilant in the days and weeks to come, online as well as out in the world.

Read more…