Are Hidden App Trackers Secretly Stealing Your Valuable Data?

By | Cybersecurity | No Comments

Recently, The Washington Post’s Tech Columnist Geoffrey Fowler conducted a privacy experiment on his iPhone that revealed 5,400 hidden app trackers collected data about him in a single week.  Apps on his iPhone sent data – such as PII (Personally Identifiable Information), phone number, email, exact location, IP address – to a multitude of third parties. Data is being sent to many companies without user knowledge.  App trackers decrease load times, squander battery life, and…

Read More

Intern Insights: Surveying Risk

By | Risk control | No Comments

Recently, underwriting interns Eric Benson and Jakob Krull visited TLC Electronics, Inc. to perform a risk control survey along with Technology’s Risk Control Specialist, Norine McVann and Underwriter, Andrew Doonan. They toured the facility and participated in a Q&A with the insurance buyer and facilities management team. This opportunity allowed Eric and Jakob to gain some hands on experience with this side of the insurance industry and they learned about many aspects of risk control,…

Read More

Peaks and Perseverance

By | OneBeacon Technology Insurance | No Comments

Our people are passionate about their work solving technology risk management needs. But, they’re also passionate about a variety of hobbies and interests outside of work, which is why they make such interesting colleagues! One great example is OneBeacon Technology’s Elizabeth Marazzo, who recently traveled to Peru where she summited the Pachututek Peak at an elevation of 15,354 feet! She showed perseverance during the difficult climb and also experienced the simple ways of the Inca…

Read More

Have a Cyber Safe Summer!

By | Cybersecurity, Safety Tips | No Comments

It’s the first day of summer – and by now, school’s out and students are free to spend even more time on electronic devices. This may be the perfect time to have a “cyber safety” conversation and encourage careful online behavior. According to SavvyCyberKids.org: 92% of teens are online daily, including 24% who are almost constantly online. 92% of two-year olds in the United States have an online record. Children are often introduced to electronic devices…

Read More

Advancements in 3D Metal Printing

By | Whitepapers | No Comments

With today’s technology advancements, 3D printing has been expanding considerably in a positive direction impacting the world of manufacturing. Though 3D printing can be traced back to the 1980s, it has grown immensely with each new development, with 3D metal printing projected to be a billion dollar market by 2023, impacting fields from the production of airplanes to costume design. Not only is this technology revolutionizing the industry with its ability to print in complex…

Read More

BlueKeep Cyber Vulnerabilities Persist: Stay Security Safe!

By | Cybersecurity, OneBeacon Technology Insurance, Safety Tips, Trends | No Comments

It’s been a month since Microsoft issued warnings about BlueKeep vulnerabilities affecting older versions of its Windows operating system. Ongoing warnings about its “wormable” pattern persist, meaning it is susceptible for exploitation. Microsoft has been comparing this vulnerability to the WannaCry event that spread globally, affecting millions of computers in 2017. We encourage you to ensure that your IT team has thoroughly reviewed your network and is patching any affected systems promptly. We are also…

Read More

Hurricanes, Before and After

By | OneBeacon Technology Insurance, Risk control, Safety Tips | No Comments

This article was authored by Hartford Steam Boiler (HSB) and originally published on their online Knowledge Center.  Planning for a Hurricane Take action now to help protect equipment and prevent property damage. Wind: A hurricane is defined and classified by wind velocity. Any hurricane force wind is capable of doing damage to structures and exposed equipment. Every structure and exposed equipment item should be evaluated as to its susceptibility to hurricane damage. It is best…

Read More

Reduce Security Risks with Digital Spring Cleaning

By | Cybersecurity, Safety Tips | No Comments

Spring is here! This means it’s time for some cleaning – and not your usual household cleaning. Keep in mind your computer and other electronic devices collect clutter overtime. Digital clutter can sometimes lead to a decrease in productivity, slow down the device, take up storage space and is a security liability. Storage capacity is constantly increasing and cloud storage is inexpensive making it easy to accumulate data. Old information and devices, in addition to…

Read More

World Password Day is Thursday, May 2!

By | Cybersecurity, Safety Tips | No Comments

The first Thursday in May has been designated World Password Day in an annual effort to promote better password habits.  Using the same passwords on multiple accounts, in addition to weak passwords, is less effective when it comes to protecting your identity, accounts and finances. Hackers are becoming more sophisticated, and security issues worsen with every data breach.  The ongoing flood of stolen passwords makes it increasingly easy for them to determine patterns and cross-reference…

Read More