Script curated for Berkley Healthcare is a risk management platform that offers resources that will help you manage enterprise risk. These resources, curated by The McCalmon Group, are provided as a complimentary service to our Financial Lines customers.

Member Login


Are you a new user? Register

Retrieve password

Latest

Oct 02

DeepSeek, Malware, And Stealing API Keys: What Should Organizations Consider?

Threat actors are exploiting the popularity of DeepSeek to steal API keys. Is that a threat? We explain.

Read more »

Sep 18

"Scattered Spider" Attacks Are Targeting IT Help Desks: What Steps Can Your Organization Take?

"Scattered Spider" is at it again - this time targeting airlines and prompting an FBI warning. How can your organization address the risk?

Read more »

Sep 11

SEO Poisoning: An Emerging And Harmful Social Engineering Scam

A U.S.-based cybersecurity firm discusses a new scam involving Google search. We examine and discuss.

Read more »

Sep 04

FBI Warns Of IoT Malware: How Does It Affect Video Surveillance In Organizations?

The FBI issued a warning about malware compromising certain IoT devices, including video surveillance equipment. We examine and provide IoT best practices for organizations.

Read more »

Articles

Is Gen Z Causing Management Turnover? You Make The Call

A survey shows that some managers are thinking about quitting because of the challenges presented by Gen Z employees. Is that happening at your organization? We want to know.

DeepSeek, Malware, And Stealing API Keys: What Should Organizations Consider?

Threat actors are exploiting the popularity of DeepSeek to steal API keys. Is that a threat? We explain.

Hidden Dangers Of Healthcare Data Breaches: Beyond Privacy To Patient Harm

We explore how stolen healthcare data can cause serious harm to patients, review past breach impacts, and suggests practical prevention strategies for healthcare organizations.

Fake Invoice Scams: The Internal Crime That Is Hard To Spot

An employee pled guilty to embezzlement after stealing thousands of dollars from her employer using a fake invoice scam. We examine.

Hidden Dangers In Plain Sight: How Malicious Apps Threaten Your Identity

We explore the hidden dangers of malicious apps, their role in identity theft, key warning signs, and practical steps for safeguarding personal information from digital threats.