Contact us

(831) 722-3541

Contact us

Contact details:

Message:

Your message has been sent successfully. Close this notice.

Commercial Insurance Quote

Coverage Information

Current Coverage Information

Contact details:

Your Quote Form has been sent successfully. Close this notice.

Auto Insurance Quote

Contact details:

Current Coverage Information

Your car:

Your Quote Form has been sent successfully. Close this notice.

Homeowners Insurance Quote

Your house:

Current Coverage Information

Contact details:

Your Quote Form has been sent successfully. Close this notice.

Life Insurance Quote

Life Insurance Details

Current Coverage Information

Contact details:

Your Quote Form has been sent successfully. Close this notice.

Health Insurance Quote

Coverage Information

Current Coverage Information

Contact details:

Your Quote Form has been sent successfully. Close this notice.
3 days ago · by · 0 comments

Because identity theft and data breaches are becoming an ever-growing problem, it’s important to not only have a different password for each account, but to make those passwords easy to remember and hard to guess. The following are tips you can use to make your password harder to crack:

  1. Change your passwords every 90 days. This might seem like a hassle at first, but hackers have a better chance at cracking your passwords if they never change. It’s also a good idea to avoid reusing passwords.
  2. Make your passwords at least eight characters long. Generally, the longer a password is, the harder it is to guess.
  3. Don’t use the same password for each account. Hackers target lower security websites and then test cracked passwords on higher security sites. Make sure each account has a different password.
  4. Include uppercase letters and special characters in your password. Special characters include symbols like “#,” “*,” “+” and “>.” These symbols can make your password more complex and harder to guess.
  5. Avoid using the names of spouses, kids or pets in your password. All it takes for a hacker to crack passwords that include these things is a little research on social media sites like Facebook and Twitter.

Read more

1 month ago · by · 0 comments

How To Stay Safe When You Use Public Wi-Fi

Public Wi-Fi allows your team to stay connected on the go. You have to be careful, though, because public Wi-Fi is notoriously unsecure. Cybercriminals could also log into the free network you use and access data on your devices, such as your login information or confidential client files. Exercise caution and stay safe in several ways as you use your laptop, tablet or smartphone on public Wi-Fi networks.

Verify the Network Name

Before logging in, research the network. Only log into Wi-Fi that originates from a legitimate source as you avoid a man-in-the-middle attack. For example, cybercriminals may name their network “Free Wi-Fi” or mimic the establishment’s name as a way to attract users. Ask the barista, librarian or other staff member to verify the name of their public Wi-Fi network before you log in.

Turn off File Sharing

Your team relies on file sharing, but this feature is lucrative for cybercriminals, too. That’s why you want to turn off file sharing when you use public Wi-Fi. This step protects your files and data you don’t want criminals to access.

Use a VPN

A virtual private network (VPN) encrypts data as it travels between your device and the server. Research free and paid VPN options, then add one to your devices for protection when you need it on the go. 

Check for HTTPS

If you see a lock symbol and HTTPS in front of the website address in the status bar, you’re browsing a secure site. You can also use an HTTPS extension for extra protection.

Enable Two-Factor Authentication

With two-factor authentication, you add an extra layer of protection to your online browsing. Even if cybercriminals gain access to your password, they probably cannot get into your account since they need to enter a unique authentication code also.

Update Software

Browser and software patches can improve security. Make it a habit to install these patches when you’re connected to a trusted network. Never update software when you’re connected to public Wi-Fi.

Forget the Network

After your public Wi-Fi session ends, log off all the websites you were signed into and tell your device to forget the network. This step prevents cybercriminals from connecting to your device automatically the next time you’re in the network area. 

Limit your Activity

It’s tempting to think that cybercrime couldn’t happen to you or that you can afford to be careless because you have cybercrime and business liability insurance. However, always use caution. Save sensitive or confidential work for when you’re on a trusted network.

Your company may utilize public Wi-Fi often to stay connected and get work done. Encourage your employees to use caution and follow these steps as they stay safe.

Read more

1 month ago · by · 0 comments

Facebook Security Breach Affects Nearly 50 Million Accounts

On Sept. 28, 2018, Facebook announced that nearly 50 million user accounts were compromised in a data breach. The breach, which can be traced back to July 2017, is one of the largest in the company’s 14-year history.

While investigations are ongoing, the company said hackers exploited a software vulnerability in Facebook’s "View As" feature to steal access tokens and gain control of user accounts. Access tokens are effectively digital keys to specific accounts, and stealing them allows attackers to view private posts or compose status updates without the knowledge of the affected user.

In addition, the attack allowed the hackers to see anything that users can see on their own profile, including the names and birth dates of friends and family members. Such information could be used in future phishing attacks.

In response to the attack, Facebook reset 90 million logins automatically, fixed the software vulnerability and informed law enforcement officials. While the company says that users do not need to change their passwords, individuals experiencing login issues should navigate to Facebook’s Help Center.

As a safety precaution, users are encouraged to log in and out of all of their accounts on every device. Users can see all of the devices they’re currently signed into here.

To learn more about the breach, read Facebook’s official blog post.

Read more

3 months ago · by · 0 comments

To Bundle, or Not to Bundle

If you’ve ever shopped around for insurance, you’ve likely been asked if you want to bundle your policies—in other words, combine your home or renters, auto and life insurance policies with the same carrier. Although you have the option to shop around individually for each policy, it almost always makes sense to have the same carrier cover as many of your policies as possible.

Benefits of Bundling

  • The discount—Most policyholders bundle their policies because of the promise of a discount. The amount varies by provider but can generally range between 5-25 percent.
  • The option of a single deductible—With bundled policies, your deductible may be cheaper in the event of a claim that affects multiple policies. For example, if your home and auto policies are with two separate carriers, and a hailstorm damages your home and your car, you’re responsible for paying both your home and auto deductibles before receiving payment. But if you bundle your policies, your provider may offer you the option to pay only the higher of the two deductibles.
  • Less chance of being dropped—If you’ve made claims or gotten tickets, having your policies bundled with one provider can decrease the chance of them dropping you.
  •  

When it Doesn’t Pay to Bundle

It isn’t always better to bundle your policies with one insurance carrier. Here’s when it may be better to split them up:

  • If you have tickets or past claims that make your auto insurance expensive—In this case, it may be cheaper overall to buy each policy from separate providers.
  • When premiums increase—Bundling discourages people from price shopping, which makes it easier for providers to increase their rates. Most assume that you won’t go through the effort of shopping around when your policies renew.
  • If policies aren’t technically bundled—Some carriers may insure you with an affiliated company. Although you may get a discount with that company, you’ll lose the convenience of paying your premium with one familiar provider.

A Few Tips to Consider

Although discounts are the main reason people bundle their insurance policies, never assume that bundling is the cheapest option. Your needs and circumstances will dictate whether you should combine your policies with one carrier. Consider the following tips:

  • Shop for new coverage when your policies renew, and ask for the price of the individual premiums as well as the price of the bundled premium so you can decide whether it is worth it. Just make sure you compare the same coverage when shopping for quotes from each carrier.
  • Ask if the provider uses a third-party insurance company. Remember that you may save money but lose the convenience of dealing with one provider and a combined bill.
  • Ask an independent insurance agent to get prices from multiple companies so you don’t have to do the legwork. An agent that is loyal to a particular carrier may be able to offer discounts that you can’t get alone.

With multiple factors contributing to the price of your insurance premiums, it is important to shop around in order to get the best rate for your insurance needs. Feel free to contact Scurich Insurance to determine if bundling is right for you and help you take advantage of all available discounts.

Read more

4 months ago · by · 0 comments

Stop Hackers With Strong Password Management

One of the first things hackers do when they attempt to infiltrate computer systems is to try using any common or stolen passwords. And, if your employees aren’t careful to use effective passwords and change them regularly, both they and your business can be exposed to data breaches, phishing schemes and other costly cyber attacks.

Most people don’t manage their passwords effectively because of the misconception that strong passwords need to be long and difficult to remember. However, there are a few simple steps you can relay to your employees in order to ensure that passwords are both hard for hackers to figure out and easy to manage:

Build passwords around familiar phrases. Long passwords are harder for computer programs to guess, so using a long but familiar phrase, like a favorite song lyric or quote, is a great start to making a password.

Use a password management service. Many people write their passwords down on paper or in a word processor, but keeping them anywhere insecure makes it easier for hackers to access them. Instead, encourage your employees to use a reputable password management service to keep all of their login credentials safe. Contact us today for more resources that can help improve your cyber security, including our new “Employee Cyber Training – Passwords” video.

Read more

9 months ago · by · 0 comments

Critical Cyber Exploits Affect Nearly All Computers

Cyber security researchers recently announced the discovery of two major security flaws that could allow hackers to bypass regular security measures and obtain normally inaccessible data. The flaws, referred to as Meltdown and Spectre, are both caused by design flaws found in nearly all modern processors. These vulnerabilities can be exploited to access all of the data found in personal computers, servers, cloud computing services and mobile devices.

Because Meltdown and Spectre are both caused by design flaws, experts believe that they will be harder to fix than traditional security exploits. Additionally, software patches that have already been released to help address the vulnerabilities can cause computer systems to slow down significantly, which may impact their ability to perform regular tasks.

Researchers believe that Meltdown and Spectre may be limited to processors manufactured by different companies, but also warn that the design flaws that contribute to Meltdown and Spectre have been present for years. Here are some key details about each flaw:

  • Meltdown: This flaw can be used to break down the security barriers between a device’s applications and operating system in order to access all of the device’s data. Meltdown can be used to access desktop, laptop, server and cloud computer systems, and can even be used to steal data from multiple users who share one device. Although researchers have only been able to verify that Meltdown affects processors made by Intel, other processors may also be affected. Many software developers have already released updates that prevent hackers from exploiting Meltdown.
  • Spectre: This flaw can be used to break down the security barriers between a device’s different applications and access sensitive data like passwords, photos and documents, even if those applications adhere to regular security checks. Spectre affects almost every type of computer system, including computers, servers and smartphones. Additionally, researchers have confirmed that the design flaw that enables Spectre is present in Intel, AMD and ARM processors that are used by nearly every computer and mobile device. Software developers are currently working on a patch to prevent the exploitation of Spectre, but some experts believe that future processors may have to be redesigned in order to fix the vulnerability.

When Meltdown and Spectre were originally discovered in 2017, researchers immediately

reported them to major hardware and software companies so work on security fixes could begin without alerting hackers. As a result, services and applications offered by companies like Microsoft, Google, Apple and Amazon have already been updated to help defend against the flaws. However, you shouldn’t rely solely on a software patch to protect against these vulnerabilities. Here are some steps you can take to protect your computer systems and devices from Meltdown and Spectre:

  • Update all of your devices immediately, and check for new updates regularly. You should also encourage your friends, family members and co-workers to do the same.
  • Contact any cloud service providers and third-party vendors you use to ensure that they are protected against Meltdown and Spectre. Cloud services and computer servers are especially vulnerable to the exploits, as they often host multiple customers on a single device.
  • Install anti-virus and firewall systems to protect against regular malware. Researchers believe that hackers need to gain access to a device in order to exploit Meltdown or Spectre, so keeping your devices free of malware can help prevent data theft.

For additional risk management updates, contact Scurich Insurance today.

Read more

Company information

Scurich Insurance Services
Phone: (831) 661-5697
Fax: (831) 661-5741

Physical:
783 Rio Del Mar Blvd., Suite7,
Aptos, Ca 95003-4700

Mailing:
PO Box 1170
Watsonville, CA 95077-1170

Contact details

E-mail address:
Info@ScurichInsurance.com

(831) 661-5697

Available 8:30am - 5:00pm