February 6, 2020 / by KMRD Partners / Blog, Webinars / 0 comments
On January 29, 2020, Ankura Consulting and KMRD Partners partnered to host a free webinar on how social engineering. Watch the webinar as Brian Heun and Clay Blankenship explain how cybercriminals use social engineering to manipulate employees into divulging sensitive information and how organizations can protect employees and secure assets from cyber attacks. You can watch a […]
Read more
Social Engineering Explainer: Webinar Recap with Video and Text Option
February 6, 2020 / by KMRD Partners / Blog, Webinars / 0 comments
On January 29, 2020, Ankura Consulting and KMRD Partners partnered to host a free webinar on how social engineering. Watch the webinar as Brian Heun and Clay Blankenship explain how cybercriminals use social engineering to manipulate employees into divulging sensitive information and how organizations can protect employees and secure assets from cyber attacks. You can watch a […]
Read more
Social Engineering and How To Protect Your Computer From Hackers, Viruses, and Spies
January 21, 2020 / by KMRD Partners / Announcements, Blog, From Brian's Desk, Insurance Coverage / 0 comments
While Social Engineering may sound like a way to encourage people to mingle at a dinner party, it is actually a devious plot created by hackers and spies to infiltrate your computer and business networks through a number of nefarious tactics, including the following: Phishing Chances are you’ve been the target of a phishing attack […]
Read more
GDPR Compliance In The USA And 7 Ways To Prepare Your Business
December 11, 2019 / by KMRD Partners / Blog, From Brian's Desk, Insurance Coverage
While the scope and territorial reach of European Union’s GDPR is broader, States have started the process of “falling in line” with GDPR. Until the Federal Government can reach bi-partisan grounds on a single law for the whole country, we are going to see more states being inspired by GDPR and one another. In varying […]
Read more
Social Engineering Webinar: How Criminals Exploit Human Behavior and How to Protect Your Enterprise
November 20, 2019 / by KMRD Partners / Blog, From Brian's Desk, General, Insurance Coverage
Social engineering is the art of exploiting human psychology to gain access to buildings, systems or data. Join us for this free webinar to learn how social engineering works and what to do to protect employees and your enterprise. Join top risk management and cyber insurance experts for an interactive discussion on how to protect […]
Read more
Innovative Safety – Meet FRED; The Material Handling Robot with SuperPowers
April 2, 2019 / by KMRD Partners / Blog, From Bob Dietzel's Desk, Risk Control
By Doug Fastuca and Bob Dietzel, ARM, CIC FRED is a hard working automated guided vehicle (AGV) that can make a difference in your business. For significantly less than other AGVs, you can be up and running with FRED in no time—without the need of IT support. Four reasons why FRED is the right choice: FRED […]
Read more
The Basics Of Arc Flash; And Why You Really Don’t Want To Perform The Arc Flash Hazard Analysis Yourself
October 1, 2018 / by KMRD Partners / Blog, From Bob Dietzel's Desk, Risk Control
By Glenn Eglinton and Bob Dietzel, ARM, CIC Hotter than the sun, with temperatures that soar as high as 35,000°F, the “arc flash” produces a blinding flash of light – followed by a dynamite-level explosion – that can vaporize metal and seriously injure anyone in its path. In this article, we’ll explain the arc flash and […]
Read more
5 Steps Every Employer Should Consider When Performing a Risk Assessment
August 27, 2016 / by KMRD Partners / One Minute From Normal Series / 0 comments
Effective risk management is critical in today’s regulatory climate. Rating agencies and regulators have come to expect companies to know their risk profiles and implement the correct structures and processes to reduce risks and exposure. Performing a risk assessment allows business managers to identify and control risks to build up high performance businesses. And while they can vary greatly from business to business, we tend to see the same five […]
Read more