Technology | By Sonus Benefits,

WEBINAR – IT Security in the Workforce – 7/25

 

Matt Jones | Chief Solutions Officer, World Synergy

IT Security can be a major issue for even some of the largest companies. Over the past few years companies like Netflix, Twitter, and Equifax have been a part of large data breaches. What can you do to protect your business, your client, and employee’s information? Join Matt Jones of World Synergy as he discusses IT Security in the Workforce and how you can get out in front of a potential threat.

Register Here>>

2018 Webinar Series

Webinars typically take place on scheduled Wednesdays from Noon to 1:00 PM Eastern Time

Key Takeaways:

Coming soon!

This webinar qualifies for SHRM, HRCI, and CEBS credits.
 The use of this seal confirms that this activity has met HR Certification Institute’s® (HRCI®) criteria for recertification credit pre-approval.

Visit www.hrci.org for more information.

 Benefit Advisors Network is recognized by SHRM to offer Professional Development Credits (PDCs) for SHRM-CP or SHRM-SCP. This program is valid for one [1] PDCs for the SHRM-CP or SHRM-SCP.

For more information about certification or recertification, please visit www.shrmcertification.org

 Educational sessions at this program can qualify for CEBS continuing professional education (CPE) credit.

Visit www.cebscpe.org for more information.

Technology | By Sonus Benefits,

WEBINAR – HR Technology Trends – 6/27

 

Josh HooverDirector, Client Relations & Strategic Initiatives, Benefit Technology Resources

During this webinar Josh Hoover helps attendees become more familiar with the different trends in HR Technology and how to best utilize their current systems, along with potentially evaluate new systems.

Register Here>>

2018 Webinar Series

Webinars typically take place on scheduled Wednesdays from Noon to 1:00 PM Eastern Time

Key Takeaways:

Coming soon!

This webinar qualifies for SHRM, HRCI, and CEBS credits.
 The use of this seal confirms that this activity has met HR Certification Institute’s® (HRCI®) criteria for recertification credit pre-approval.

Visit www.hrci.org for more information.

 Benefit Advisors Network is recognized by SHRM to offer Professional Development Credits (PDCs) for SHRM-CP or SHRM-SCP. This program is valid for one [1] PDCs for the SHRM-CP or SHRM-SCP.

For more information about certification or recertification, please visit www.shrmcertification.org

 Educational sessions at this program can qualify for CEBS continuing professional education (CPE) credit.

Visit www.cebscpe.org for more information.

Technology | By Sonus Benefits,

Just How Important Is Cyber Security?

Businesses of all shapes and sizes are increasingly reliant on the internet for daily operations. But this doesn’t come without risk. Heavy reliance on computers, phones, and internet makes protecting these resources increasingly important.

According to the Identity Theft Resource Center, data breaches increased 40 percent in 2016, with a total of 1,093 reported breaches. This trend continued in 2017, with over 1,120 cases reported by October.

Your company could be an attractive and potentially lucrative target for cyber criminals. Learning about cyber attacks and how to prevent them can help you protect your company from security breaches.

Could your company be compromised?

Cyberattacks include many types of attempted or successful breaches of computer security. Threats come in different forms, including phishing, viruses, Trojans, keylogging, spyware and spam. Once hackers have gained access to your computer system, they can accomplish any of several malicious goals: stealing information or financial assets, corrupting data, and causing operational disruption or shutdown.

Both third parties and insiders can use a variety of techniques to carry out cyberattacks. Techniques range from highly sophisticated efforts to electronically circumvent network security or overwhelm websites, to more traditional intelligence gathering and social engineering aimed at gaining network access.

Cyberattacks can result directly from deliberate actions of hackers, but they can also be unintentionally facilitated by employees by something as simple as someone accidentally clicking on a malicious link. According to historical claim data analyzed by Willis Towers Watson, 90 percent of all cyber claims stemmed from some type of employee error or behavior. The high-profile Equifax, Snapchat and Chipotle data breaches were all caused by employee error or behavior.

A breach in cyber security can lead to unauthorized usage through tactics such as the following:

  • Installing spyware that allows the hacker to track Internet activity and steal information and passwords
  • Deceiving recipients of phishing emails into disclosing personal information
  • Tricking recipients of spam email into giving hackers access to the computer system
  • Installing viruses that allow hackers to steal, corrupt or delete information or even crash the entire system
  • Hijacking the company website and rerouting visitors to a fraudulent look-alike site and subsequently stealing personal information from clients or consumers

Cyberattacks may also be carried out in a manner that does not require gaining unauthorized access, such as denial-of-service (DoS) attacks on websites, in which the site is overloaded by the attacker and legitimate users are denied access.

The Vulnerable Become the Victims

The majority of cyber criminals are indiscriminate when choosing their victims. The Department of Homeland Security (DHS) asserts that cyber criminals will target vulnerable computer systems regardless of whether the systems belong to a Fortune 500 company, a small business or a home user.

Cyber criminals look for weak spots and attack, no matter how large or small the organization. Small businesses, for instance, are becoming a more attractive target as many larger companies have tightened their cyber security. According to the industry experts, the cost of the average cyberattack on a small business is increasing exponentially— and shows no signs of slowing down.

Nearly 60 percent of small businesses victimized by a cyberattack close permanently within six months of the attack. Many of these businesses put off making necessary improvements to their cyber security protocols until it is too late because they fear costs will be prohibitive.

Simple Steps to Stay Secure

With cyberattacks posing such a prominent threat to your business, it is essential to create a plan to deal with this problem. Implementing and adhering to basic preventive and safety procedures will help protect your company from cyber threats.

Following are suggestions from a Federal Communications Commission (FCC) roundtable and the DHS’s Stop.Think.Connect. program for easily implemented security procedures to help ward off cyber criminals. These suggestions include guidelines for the company as well as possible rules and procedures that can be shared with employees.

Security Tips for Your Company

Cyber security should be a company-wide effort. Consider implementing the following suggestions at your organization:

  • Install, use and regularly update anti-virus and anti-spyware software on all computers
  • Download and install software updates for your operating systems and applications as they become available
  • Change the manufacturer’s default passwords on all software
  • Use a firewall for your internet connection
  • Regularly make backup copies of important business data
  • Control who can physically access your computers and other network components
  • Secure any Wi-Fi networks
  • Require individual user accounts for each employee
  • Limit employee access to data and information, and limit authority for software installation
  • Monitor, log and analyze all attempted and successful attacks on systems and networks
  • Establish a mobile device policy and keep them updated with the most current software and antivirus programs

Security Tips for Employees

  • Use strong passwords (a combination of uppercase and lowercase letters, numbers and special characters), change them regularly and never share them with anyone. Never repeat a password across accounts
  • Protect private information by not disclosing it unless necessary, and always verify the source if asked to input sensitive data for a website or email
  • Don’t open suspicious links and emails. An indication that the site is safe is if the URL begins with https://
  • Scan all external devices, such as USB flash drives, for viruses and malicious software (malware) before using

Securing Your Company’s Mobile Devices

Gone are the days when contact names and phone numbers were the most sensitive pieces of information on an employee’s phone. Now a smartphone or tablet can be used to gain access to anything from emails to stored passwords to proprietary company data. Depending on how your organization uses such devices, unauthorized access to the information on a smartphone or tablet could be just as damaging as a data breach involving a more traditional computer system.

The need for proper mobile device security is no different from the need for a well-protected computer network. Untrusted app stores will continue to be a major source of mobile malware which drives traffic to these stores. This type of “malvertising” continues to grow quickly on mobile platforms.

It’s important to stay informed about cyber security and continue to discuss internet safety with employees.

Don’t Let it Happen to Your Company

A data breach could cripple your small business, costing you thousands or even millions of dollars in lost revenue, sales, damages and reputation. But according to the DHS, 96% of cyber security breaches could have been avoided with simple or intermediate controls.

Strengthening passwords, installing anti-virus software and not opening suspicious emails and links are the first steps toward cyber security. In addition to the listed tips, the FCC provides a tool for small businesses that can create and save a custom cyber security plan for your company, choosing from a menu of expert advice to address your specific business needs and concerns.

It’s tempting to think a cyberattack won’t happen to you. But it’s far better to protect yourself, your employees, and your business so it can’t.

 

Is your broker thinking outside the benefits box? Are you confident your policies and processes are doing what they need to ensure that your company—and your employees— are healthy and productive? At Sonus Benefits, this is what we do for St. Louis employers every single day.

Content for this article was provided by Zywave, Inc. and is not intended to apply to specific circumstances or be used as legal advice.
Technology | By Sonus Benefits,

Safeguard Your Email to Safeguard Your Business

Email is an integral part of everyday business. From internal management to marketing outreach to direct customer support, we’re sending and receiving vast amounts of critical communication via email.

And although our various in-boxes are often overflowing with messages, the benefits of using email as a primary business tool still outweigh the negatives. But that doesn’t mean you should just set it up and forget about it. You’ll want to take precautions to make sure your customer and business information stays protected.

Here are 5 ways to make your company email safer and more efficient:

Set up Spam filters

Spam filters go a long way toward keeping suspicious and potentially damaging emails out of employee in-boxes. Not only does this cut down on the overall number of emails received, it cuts way down on the risk of people opening suspect emails and/or clicking on unsafe links that could lead to viruses or data breaches.

Train your employees on how to use email responsibly

Your IT department may be knowledgeable about these issues, but do your employees know the risks associated with day-to-day email exchanges? Malware and phishing schemes are becoming smarter and more sophisticated. Your staff needs to follow suit.

Protect sensitive information sent over email

Many assume their work emails are both private and confidential, but this may not be the case. If you don’t have to send sensitive information via email, don’t. If that’s not practical, you can help minimize risk by using encryption tools or file sharing services.

Implement an email retention policy

Many industries have strict requirements about how long they have to hang onto their emails. A clear, well-written policy will not only help you manage high volumes of messages, it will also keep you in compliance.

Develop an email use policy

Unfortunately, employees aren’t always responsible with their use of email. Setting specific guidelines for what is and isn’t appropriate can help protect you from the threat of data breaches or litigation stemming from careless use of company email.

Many people don’t think twice about sending or opening an email, but these simple actions don’t come without risk. Make sure your email isn’t doing more harm than good by investing in some basic security tactics. Your business (and your in-box!) will thank you.

Is your broker thinking outside the benefits box? Are you confident your policies and processes are doing what they need to ensure that your company—and your employees— are healthy and productive? At Sonus Benefits, this is what we do for St. Louis employers every single day.

Content for this article was provided by Zywave, Inc. and is not intended to apply to specific circumstances or be used as legal advice.
Technology | By Tom Murphy,

Harnessing the Power of Technology. And of Ignoring it.

Technology is an amazing tool, especially when it comes to communication. It can make us faster, more accurate, and more efficient.

We’ve happily replaced phone calls with emails and emails with texts. And in-person meetings? Forget about it! A quick conference call, webinar, or online chat is just as effective.

Or is it?

The other face time

Regardless of what business you’re in, the relationships you have with your employees and customers are critical to your success. But no matter how great your writing skills are, no text or email will ever connect with someone like you can— live and in person.

Of course, no one is suggesting you throw your devices out the window, but be honest with yourself: Are you so focused on technology-driven efficiency that you’re missing out on opportunities to personally interact with your staff and clients?

Maybe you’re relying on technology to do the heavy lifting when tough issues are involved. Yes, sending a well-crafted email to handle a delicate situation may be a good enough solution. But having a face to face conversation with someone when there are real problems to discuss? Now that’s an opportunity!

So, how can you tell if you are using technology as a security blanket? If the thought of making that phone call or having that face-to-face meeting gives you a sick feeling in your stomach, that’s a pretty clear sign. And that’s exactly when you need to pick up the phone or get in the car.

There are times when putting the right words in a letter, e-mail or text will work perfectly fine, but there are also times when you should really go old-school. Talk in person. Ask for a meeting. Be empathetic. Show that you care.

At the end of the day, your clients won’t remember all of those carefully crafted emails you sent, but they will definitely remember how you made them feel.

Sometimes you have to unplug to connect

Ever had your Internet go down at work? At first, people get flustered. Frustrated. Uncomfortable. Everyone looks around awkwardly. What on earth are we supposed to do now?

And then they start to talk. Make jokes. Maybe go for coffee. Talk about Game of Thrones. This is the stuff relationships are made of. You couldn’t pay someone to come up with a better team building exercise.

Should you use all of the technology available to you at your job? Yes! By all means. But you should also commit to connecting on a more personal level with one client or coworker at least once a week. Heck, once a day if you’re game! You may be surprised at where it takes you. And all without a GPS signal.

 

Tired of working with insurance salespeople who only think one year at a time? Wonder what it would be like to have a broker who looks beyond your annual policy? At Sonus Benefits, we’ll provide a corporate employee benefits strategy to help you achieve your long-term your vision. Get in touch to find out how.

Technology | By Sonus Benefits,

WEBINAR: New & Emerging HR Technologies – 10/25

Are you leveraging technology in order to improve and streamline your tactical processes? Are there any key strategic initiatives that technology can help you in accomplishing?

New & Emerging HR Technologies: on the heels of the 2017 HR Tech Conference we will discuss what the latest industry trends are and how HR Professionals can leverage technology in both tactical processes, and forward-thinking, strategic initiatives.

 

 

 

Technology | By Sonus Benefits,

4 Ways Technology is Changing Employee Benefits

Technology has had a dramatic impact on how employees choose and keep track of their benefits. The tedious and workforce-consuming task of educating and distributing information about benefits has now become efficient and effective. But, technology has the power to do more than just provide insight. It also has the power to reduce cost and change employee behavior.

In the process of reducing costs, technology is allowing employees to take control of their benefits. As a result, workers are able to make the best decisions to meet their needs. Here are some examples of how technology is transforming the industry.

1) On demand information

As mentioned, technology gives employees access to their benefits on demand. Online portals provide the platform to do this well and securely. Employers should make this the go to place for all questions related to benefits. The portal should be a library of important documents, notices, and updates. Furthermore, it should provide helpful tips on remaining healthy through insightful articles and engaging content.

2) Behavior enhancing tools

Changing human behavior is one of the singular most difficult things to do. Yet, technology is making the promotion of healthier behaviors much more effective. Employers are turning to game apps and points systems to make being healthy fun. When employers provide incentives like points or badges, it motivates employees to make changes. Game apps are a simple and fun way to get employees to soak in information you want them to know.

3) Virtual Healthcare

The changes made through the Affordable Care Act have prompted both employers and employees to focus on cost. Providing ways for employees to answer non-emergency medical questions without having to visit an office is a great way to reduce some of those costs. Whether via online portals, apps or remote technology – having reliable access to accurate information helps people take control of their own health. It also boosts productivity by reducing the amount of time spent going to doctor visits. Some employers are using systems in which they can get a direct response from a doctor about their medical problem.

4) Tailored programs

Big data (large amounts of information that can reveal patterns about human behavior) is another important tool that makes employer healthcare initiatives more effective. By analyzing data about your company, you can discover what is causing employees to use medical services. For example, some of the companies using the ‘ask a doctor’ systems described above began discovering an underlying cause for employee doctor visits: Employees simply didn’t know what was cause for concern. With this information, these employers were able to find a solution to the core problem. Big data helps companies develop effective programs.  The quality and type of data available will depend on how many employees are covered for a specific company.

Technology is changing how benefits are managed for the better. By mimicking how people use it, we can make managing health and insurance more intuitive and simple. With the use of these simple tools, your company will notice effective, long term results.