Script curated for Berkley Healthcare is a risk management platform that offers resources that will help you manage enterprise risk. These resources, curated by The McCalmon Group, are provided as a complimentary service to our Financial Lines customers.

Member Login


Are you a new user? Register

Retrieve password

Latest

Dec 25

Malvertising's Hidden Pipeline: How Trusted Platforms Became Attack Vectors

We explore how criminal actors weaponize GitHub and digital advertising to distribute stealth malware that exploits corporate trust in legitimate cloud infrastructures.

Read more »

Dec 18

Beyond The Click: Building Employee Vigilance To Prevent Phishing Attacks

We explore proactive security behaviors critical to reducing phishing attacks and forming a frontline defense to protect organizational data and systems.

Read more »

Dec 11

Rise Of The Impostors: How Employees Can Thwart Tech Support Scams On Workplace Collaboration Tools

We discuss strategies for employees to resist sophisticated tech support scams by practicing verification and adherence to IT policies.

Read more »

Dec 04

Exorcising PLAYFULGHOST: How To Defend Your Network Against The Latest Stealthy VPN Malware

Learn the origin and evolution of the PLAYFULGHOST malware and practical steps to protect your devices and organization from this advanced cyber threat.

Read more »

Articles

Does Politics Divide Workplaces? You Make The Call

A nationwide survey claims politics makes employees uncomfortable. We want to know what you think.

Malvertising's Hidden Pipeline: How Trusted Platforms Became Attack Vectors

We explore how criminal actors weaponize GitHub and digital advertising to distribute stealth malware that exploits corporate trust in legitimate cloud infrastructures.

Strengthening Patient Safety With Comprehensive Staff Vetting

We provide commentary on how comprehensive criminal and reference checks in healthcare hiring are critical strategies for preventing sexual assault of vulnerable patients by staff.

Guarding Against Internal Crypto Crimes: Strategies For Organizational Resilience

We review how internal controls, transparent governance, and risk assessments can help organizations prevent internal crime and embezzlement in crypto operations.

Controlling Vendor Master Data To Block Fraudulent Payees

We comment on how organizations can design and enforce stronger vendor, data, and payment controls to prevent funds being misdirected to entities that appear related, but are not.