508.824.8666 info@fbinsure.com
  • Facebook
  • Twitter
  • Facebook
  • Twitter
FBinsure
  • Insurance Solutions
    • Personal Insurance
      • Auto Insurance
      • Homeowners Insurance
      • Renter/Condo Insurance
      • Boat/Marine Insurance
      • Life Insurance
      • Flood Insurance
      • Classic Car / Motorcycle Insurance
      • Wedding Insurance
    • Business Insurance
      • Construction
      • Cannabis Business
      • Distribution & Trucking
      • Manufacturing
      • Snow & Ice Management
      • Non-Profits & Social Services
      • Municipalities
      • Community Banks
      • Sports, Camps, & Facilities
    • Employee Benefits
      • Health Insurance & Core Benefits
      • HR & Compliance Support
      • Employee Education & Communication
    • Risk Advisory Services
      • FB Cyber Defense
      • FB Comp Advisors
      • FB Risk Advisors
  • Resources
    • Personal Resources
      • Pay Your Personal Insurance Bill
      • 24/7 Claims & Support
      • Document Library
      • Our Insurance Carriers
      • Policy Changes
    • Business Resources
      • Pay Your Commercial Insurance Bill
      • Employer Whitepapers
      • FBanytime
      • Client Resource Portals
      • Policy Changes
    • FB Seminars
  • Blog
  • About Us
    • About Us
    • FB Careers
    • FB University
  • Contact
  • Get A Quote
    • Personal Quotes
      • Personal Auto Quote
      • Personal Home Quote
      • Personal Insurance Review
    • Business Quotes
      • Business Insurance Review
      • Employee Benefits Review
Select Page
Are You a Soft Target? Consider Active Threat Insurance!

Are You a Soft Target? Consider Active Threat Insurance!

by edmcguire1 | May 25, 2018 | Business Risk, Commercial Insurance, FB CEO Seminar Series, Office Safety, Specialty Coverage

Let’s face it, the topic of an active threat is one that no one wants to think about. Senseless carnage is hard to swallow, but thinking about it happening to you or those around you is even more unsettling. Unfortunately, this is a very tragic reality that we are all...
Email Spoofing: What Is It And How To Spot It.

Email Spoofing: What Is It And How To Spot It.

by edmcguire1 | Mar 9, 2017 | Cyber Security, Data Security, Data Thieves, FBinsure, Uncategorized

Cyber scams are an everyday occurrence for individuals. Recent cyber scams have surfaced that involve senior executives (bosses) emailing requests to their employees asking the employee to confirm their Social Security numbers and also provide other confidential...
Are You Giving Away Money To Cyber Criminals?

Are You Giving Away Money To Cyber Criminals?

by edmcguire1 | Sep 23, 2016 | Cyber Security, Data Breach, Data Security, Data Thieves

Cyber Hackers never rest! Let’s be honest—criminal hackers are very good at what they do. As a matter of fact good criminal hackers are better at what they do for a living than what we legally do for a living. THIS is a link to the article written by an IT...
Do You Have A Data Breach Playbook?

Do You Have A Data Breach Playbook?

by edmcguire1 | Aug 25, 2016 | Business Insurance, business plan, Cyber Security

When any business regardless of size or industry discovers their data may have been compromised they usually, and without fail, have a knee jerk reaction fueled by panic. They take their eye off the ball and focus most of their energies on dealing with the compromise...

How to Spot Social Engineering Fraud

by edmcguire1 | Jul 7, 2016 | Business Insurance, Business Risk, Cyber Security, Data Breach, Data Security, Data Thieves, Identity Theft, Risk Management

To properly protect your organization you must understand the types of threats you face. Social engineering is a rapidly growing tactic for fraudsters and it is critical that employees know not only what to look out for, but how to handle an attempt. Watch as our own...
« Older Entries
  • Facebook
  • Twitter

Designed by Elegant Themes | Powered by WordPress

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}