Script curated for Berkley Healthcare is a risk management platform that offers resources that will help you manage enterprise risk. These resources, curated by The McCalmon Group, are provided as a complimentary service to our Financial Lines customers.

Member Login


Are you a new user? Register

Retrieve password

Latest

Apr 09

ClickFix Malware: How Fake Windows Updates Trick Everyday Users

ClickFix malware campaign is back with a new phase. We explore how scammers use realistic update screens and verification pages to make people install malware.

Read more »

Apr 02

Is Strict Control Of Business Applications Necessary To Protect Data?

A particular nation state bad actor is at it again - this time using business apps to hide malware. We provide the sourced reporting and some solutions.

Read more »

Mar 26

Weaponizing "Contact Us" Forms: Stopping "ZipLine"-Style Phishing At The Front Door

"Contact Us" phishing schemes are causing stress. We examine how ZipLine-style attackers turn routine web inquiries into a backdoor malware delivery system.

Read more »

Mar 19

Microsoft Teams Social Engineering Scams: Recognizing The Red Flags

Microsoft Teams is being used in social engineering scams. We examine the warning signs users should recognize and outline practical steps they should take if they suspect a compromise.

Read more »

Articles

ClickFix Malware: How Fake Windows Updates Trick Everyday Users

ClickFix malware campaign is back with a new phase. We explore how scammers use realistic update screens and verification pages to make people install malware.

From Policy To Practice: Making Anti?Retaliation Protections For Healthcare Staff Stick

A clinic settles a claim of retaliation with the EEOC. We comment on concrete steps organizations can take to translate written anti?retaliation policies into daily supervisory decisions that protect witnesses and preserve trust.

From Confidential To Compromised: Closing Trade Secret Vulnerabilities?

A chef is arrested for stealing secret recipes. We comment on how clear definitions, monitoring, and swift enforcement transform trade secrets from informal know-how into protected assets.

When Managers Are Happy, Are Your Employees Happy? You Make The Call

A survey reveals that when managers are happy, employees are happy. What do you think? You make the call and join the conversation.

Is Strict Control Of Business Applications Necessary To Protect Data?

A particular nation state bad actor is at it again - this time using business apps to hide malware. We provide the sourced reporting and some solutions.