
Keep up with our blog to get helpful information for making the best insurance choices.
5 Tips to Prevent Tree Trouble
Trees are pretty amazing things. They produce oxygen. They serve as natural air conditioners, both by blocking sunlight and evaporation. They even absorb sounds, helping to keep things peaceful.
These benefits, along with countless others, are great reasons to keep the trees on your property in good shape. Looking for another?
5 Tips to Prevent Tree Trouble
Trees are pretty amazing things. They produce oxygen. They serve as natural air conditioners, both by blocking sunlight and evaporation. They even absorb sounds, helping to keep things peaceful.
These benefits, along with countless others, are great reasons to keep the trees on your property in good shape. Looking for another? Unhealthy trees can actually pose a great danger to your home and property, as well as to your family and other people.
With these tips from the National Arbor Day Foundation, you can help prevent tree trouble – and potentially save yourself from a home insurance claim:
1. Inspect trees frequently. The size, color, and condition of leaves, and overall leaf cover, are good indicators of a tree’s health. Cavities or disfiguration can be a warning sign, although they don’t always mean a tree is a hazard. Just keep a close eye on it. Dead branches are a big risk because they can fall easily. Those that cross or rub can create weak spots.
2. Plant in an appropriate space. Putting in a tree that will grow to be large? Don’t put it near power or sewer lines, or close to your home. And avoid brittle trees – their limbs are weak and more likely to break and fall. Examples include Silver Maples and Willows.
3. Prune correctly. Cut outside the branch collar, and prune regularly as trees age. Don’t allow a tree to be topped.
4. Leave it to an expert. Once a year, have a qualified arborist thoroughly evaluate the trees on your property. An arborist can identify ones that need to come down immediately, as well as those to watch. In particular, trees that have been topped, or that have lost large limbs unexpectedly, could cause trouble. Taking down trees can be very dangerous, so leave it to a professional.
5. Remember, you’re responsible. Property owners are generally responsible when their hazardous trees cause damage or injury to others. So keep your trees healthy, your space beautiful and your liability low!
When a tree does fall, you may or may not have coverage through your homeowner’s policy for any damage it may cause. If you’d like to discuss your coverage, please contact us today. It may be a good time to think about adding extra liability coverage to your insurance portfolio with an umbrella policy.
Precautions for Better Cyber Security
Business operations in the technology industry revolve around the functionality of computers, network connections and the Internet. It’s no secret that computer use comes with many risks, including damaging viruses, hackers, the illegal use of your system to attack others, the use of sensitive data to steal identities and other illegal actions. As a result, companies must respond by preventing, detecting and responding to cyber attacks through a well-orchestrated cyber security program.
Precautions for Better Cyber Security
Business operations in the technology industry revolve around the functionality of computers, network connections, and the Internet. It’s no secret that computer use comes with many risks, including damaging viruses, hackers, the illegal use of your system to attack others, the use of sensitive data to steal identities, and other illegal actions. As a result, companies must respond by preventing, detecting, and responding to cyber-attacks through a well-orchestrated cybersecurity program.
Get Familiar with Risks
The first step in protecting your business is to take notice of the multitude of cyber risks:
Hackers, attackers, and intruders: These people seek to exploit weaknesses in software and computer systems for their personal gain. Although their intentions are sometimes benign, their actions are typically in violation of the intended use of the systems that they are exploiting. The results of this cyber risk can range from minimal mischief (creating a virus with no negative impact) to malicious activity (stealing or altering data).
Malicious code (viruses, worms, and Trojan horses):
Viruses: This malicious code requires a user to take action to let a virus into the system, such as opening an email attachment, downloading a file, or visiting a web page.
Worms: Once released, this code reproduces and spreads through systems on its own. They usually start by exploiting a software flaw; then, once the victim’s computer is infected, the worm will attempt to find and infect other computers through a network.
Trojan horses: This disguised code claims to do one thing while actually doing something else. For example, a program that claims to speed up your computer system but is actually sending confidential information to a remote intruder.
Risk Management Planning
To reduce your cyber risks, it is wise to develop an IT risk management plan for your organization. Risk management solutions utilize industry standards and best practices to assess hazards from unauthorized access, use, disclosure, disruption, modification, or destruction of your organization’s information systems. Consider the following when implementing risk management strategies at your organization:
Create a formal, documented risk management plan that addresses the scope, roles, responsibilities, compliance criteria, and methodology for performing cyber risk assessments. This plan should include a characterization of all systems used at the organization based on their function, the data stored and processed, and its importance to the organization.
Review the cyber risk plan on an annual basis and update it whenever there are significant changes to your information systems, the facilities where systems are stored, or other conditions that may affect the impact of risk to the organization.
In addition, your organization should take precautionary measures when selecting your internet service provider (ISP) for use for company business.
ISP Considerations
Almost all ISPs offer Web browsing capabilities with a varying degree of user support and Web hosting capabilities. Your company should determine what ISP to use, along with a plan for backing up emails and files and what firewalls to implement.
To select an ISP that will reduce your cyber risks, consider the following:
Security: How concerned with security is the ISP? Does it use encryption and secure sockets layer (SSL) to protect any information that you submit?
Privacy: Does the ISP have a published privacy policy? Are you comfortable with who has access to your information, and how it is handled and used?
Services: Does your ISP offer the services that you want and do they meet your organization’s needs? Is there adequate support for the services provided?
Cost: Are the ISP’s costs affordable and are they reasonable for the number of services that you receive? Are you sacrificing quality and security to get a lower price?
Reliability: Are the services provided by the ISP reliable, or are they frequently unavailable due to maintenance, security problems, and a high volume of users? If the ISP knows that its services will be unavailable, does it adequately communicate that information to its customers?
User support: Are there any published methods for contacting customer service, and do you receive prompt and friendly service? Do their hours of availability accommodate your company’s needs?
Speed: How fast is your ISP’s connection, and is it sufficient for your business needs?
Recommendations: What have you heard from industry peers about the ISP? Were they trusted sources? Does the ISP serve your geographic area?
Cybersecurity is a serious concern for your business. Contact the Arnold Insurance Agency to learn about our risk management resources and insurance solutions for emerging technology exposures.