BLOGS

WELCOME TO THE ROCK AND THE HARD PLACE

woman typing on lap top with a cup of coffee How can you protect your business’ data without violating employee rights? Cyber security is a hot topic involved in all aspects of our lives, especially in our work and businesses. Everyone wants to remind you that your data is at risk and that more data breaches come from employee activity than any other area. From executives, chief officers, controllers, and human resource employees, companies are writing strict employee policies trying to protect their Confidential Information. “You cannot disclose any confidential or sensitive C...Read More
Twitter Google Linkedin

SERIES LLC: WHO HAS THEM AND WHAT ARE THEY

shutterstock_161596511A Series LLC is a unique limited liability company which provides individualized liability protection to a number of sub-companies (series) operated by one larger company. Assets owned by the individual series are shielded from the risks and liabilities of the other series within the Series LLC. It is easiest to imagine a Series LLC as one large company with several subsidiaries; each of which is separate and distinct from one another. The Series LLC is the large company and the series are the subsidiaries. Each series operates like a separa...Read More
Twitter Google Linkedin

DOCUMENT RETENTION TIPS FOR BUSINESSES

41397107 - protection concept: rows of pixelated red folder with lock icons around blue folder icon on digital background, 3d render DOES YOUR DOCUMENT RETENTION POLICY MAXIMIZE EFFICIENCY WHILE MINIMIZING RISK?   Implementing an effective record and document retention policy (“Document Retention Policy”) requires more than just an organized system of files. A good Document Retention Policy requires development of a comprehensive strategy that maximizes efficiency and effectiveness while minimizing risk. A Document Retention Policy identifies, establishes, and describes how a business and its employees are expected to treat and manage the business’s phys...Read More
Twitter Google Linkedin

CONFIDENTIAL VERSUS TRADE SECRET: HOW TO PROTECT BOTH

Opportunity   CONFIDENTIAL INFORMATION VERSUS TRADE SECRET Are You Protected? Tips on How to Protect Both As a business owner, the protection of your intellectual property, including your confidential information and trade secrets, is vital to the long-term success of your business. IS YOUR INTELLECTUAL PROPERTY, INCLUDING YOUR CONFIDENTIAL INFORMATION AND TRADE SECRETS, PROTECTED? This is something that must be done right away or you risk losing the protections as the information could be considered in the public domain or in the ...Read More
Twitter Google Linkedin

SCAM ALERT – BUSINESS EMAIL COMPROMISE

Woman in front of lap top upset   SCAM ALERT - BUSINESS EMAIL COMPROMISE SCAM  Be absolutely sure that email came from the correct and authorized sender before you send the wire… A serious cyber email scam has been making the rounds, affecting more than seven thousand (7,000) businesses in the United States and exposing hundreds of millions of dollars to potential theft[i]. According to the FBI, “The Business Email Compromise (BEC) scam is defined as a type of sophisticated scam targeting businesses working with foreign suppliers and/or businesses tha...Read More
Twitter Google Linkedin