x
x

News

Risk Management News

Phishing emails – Tips to help protect your business

Phishing emails and attacks are one of the most common and susceptible forms of cyber-attacks, due in most part to our increased use of digital tools in day-to-day life.

As these attacks become more sophisticated, the risk of you or a member of your staff becoming a victim increases. To help prevent this, we have put together a list of quick and actionable tips below to help you better understand phishing attacks and know the best practices to help protect yourself and your business.

Read more

Three topics to consider with rentcharges: freehold, estate and ground rent

Rentcharges have been in existence since the 1290 Statute of Quia Emtores, which was payable to the lord of the manor in perpetuity.  They became popular in the Victorian and Edwardian eras as a mechanism to release land from its manorial owners and get the land into use.  Once the land was developed, the subsequent owners would then be liable for a yearly charge, normally ranging between £2 and £10. 

Read more

Ignoring the risk of Japanese Knotweed could prove a costly mistake, personally, legally and financially

Japanese Knotweed (Fallopia japonica) is an invasive non-native species of weed, identifiable by its red bamboo-like stems and green spade-shaped leaves. Japanese Knotweed spreads quickly and is known to cause damage to the structures and substructures of buildings by taking advantage of weak points in the buildings' fabric, such as cracks in masonry, caused by movement in the substructure. Consequently, the presence of Japanese Knotweed is an important consideration during a property transaction or property development.

Read more

Understanding Your Cyber Risk in the New Threat Landscape

We have all seen many changes in 2020. One of these being a transformation to the cyber security threat landscape. The year has brought out all kinds of cyber criminals — from opportunistic COVID-10 phishers to amateur student hackers taking down educational systems to prevent access to online classes. As the cyber security threat landscape continues to change, so must we.

This post will identify current and significant threats to help you to prepare for whatever changes come next.

Read more

Protecting key staff during the COVID-19 pandemic: 5 top tips

Protecting key staff who are both crucial and influential is of paramount importance to any business. Key persons normally possess special skills, intellect, knowledge, experience and/or have valuable contacts, or they could be a person whose loss or replacement attracts significant financial expense. Examples might include an IT manager, an Account Director, or indeed COO and CEO’s.

Read more

COVID-19 Update - Unoccupied Property Stance

As a result of the distancing measures that have been implemented by the Government, we are aware that a large number of our clients will be in the situation where their property/properties may have become unoccupied.

As we are receiving varying advice/recommendations/requirements from all insurers, we have compiled a list of our key insurer's resources linking to their current stance on unoccupied properties. We felt that this would be an easier way of communicating than listing all of the insurers stances on one page.

Read more

UK firms buy themselves some time by stockpiling ahead of Brexit

Parliament remains in deadlock, and any hope of the UK leaving the EU with a deal before 23 May – when EU parliament elections are to be held – is at an all-time low. Faced with yet another likely cliff edge and no-deal outcome in October, large firms and SME businesses alike are still stockpiling resources in preparation for potential shortages and delays to their EU supply chains.

Read more

Cyber-extortion in 2018: are you prepared?

Is your anti-ransomware strategy in place? Are you adequately insured in the event of an attack? If the answer is NO to either question, then you need to review your cyber-security urgently.

Read more

Don’t put your money on the line. Watch out for ‘vishing’ scams

‘Vishing’ or 'voice-phishing' involves a fraudster making a phone call and posing as an official caller from a credible organisation, such as your bank, the police or your internet provider to gain access to sensitive personal information, such as financial details and security codes. Here are some of the latest scenarios these criminals are using to commit fraud.

Read more