Skip to main content
Category

threat

Cyber security essential for smart homes

By agent, attack, camera, children, coverage, currency, cyber, data, door, extortion, firewall, hack, hacking, heat, home, independent, information, Insurance, lights, locks, management, network, personal, Personal Insurance, prevent, protect, risk, spy, technology, thermostat, threat
cyber-security-smart-home

Corporations are no longer the only ones looking at cyber security. Increasingly, homeowners whose networks can make them vulnerable to cyber extortion, cyberattack and online fraud are seeing cyber security as a necessity.

The post Cyber security essential for smart homes appeared first on The Cincinnati Insurance Companies blog.

Read More

How not to get stuck in a hospital far from home

By agent, app, application, care, claim, Consumer Tips, crisis, disaster, domestic, financial, form, Health, hospital, hospitalized, independent, Insurance, jet, language, medical, Medjet, MedjetAssist, MedjetHorizon, member, membership, mobile, MyCincinnati, natural, overseas, patient, payments, phone, protect, response, risk, security, service, support, terrorism, threat, transfer, transport, travel, treatment, violence, violent
medjet-service

You know how important it is to be treated by physicians you trust in a facility you choose. Yet many people, when faced with an accident or illness while traveling, find themselves stuck in a hospital far from home – at the mercy of health or travel insurance companies in determining the “acceptability” of a facility and the “medical necessity” of a transfer home.

The post How not to get stuck in a hospital far from home appeared first on The Cincinnati Insurance Companies blog.

Read More

Strengthen your data privacy practices

By access, agent, breach, business, Business Insurance, claim, compliance, confidential, control, cyber, data, electronic, HIPAA, independent, information, Insurance, loss, negligence, physical, prevent, privacy, private, proprietary, protect, protected, release, scam, secure, security, threat, unauthorized, vulnerabilities, vulnerability, vulnerable
data-privacy

Your business, whatever its size, most likely processes and maintains information every day. At least annually, take time to review your data privacy practices to reinforce your information security and to reassess your cyber protection.

The post Strengthen your data privacy practices appeared first on The Cincinnati Insurance Companies blog.

Read More

Strengthen your data privacy practices

By access, agent, breach, business, Business Insurance, claim, compliance, confidential, control, cyber, data, electronic, HIPAA, independent, information, Insurance, loss, negligence, physical, prevent, privacy, private, proprietary, protect, protected, release, scam, secure, security, threat, unauthorized, vulnerabilities, vulnerable
data-privacy

Your business, whatever its size, most likely processes and maintains information every day. At least annually, take time to review your data privacy practices to reinforce your information security and to reassess your cyber protection.

The post Strengthen your data privacy practices appeared first on The Cincinnati Insurance Companies blog.

Read More