The Race for 2018 Athletics Grants from California Casualty is in the Final Stretch

(PRWEB) December 18, 2017

Public middle and high schools needing a boost for their sports programs have until January 15, 2018 to apply for a 2017/2018 California Casualty Thomas R. Brown Athletics Grant. The application and information can be found at http://www.calcasathleticsgrant.com. Qualifying schools can receive up to $3,000.

The grant is named after California Casualty Chairman Emeritus Tom Brown, an avid sportsman who believes that teamwork, confidence and sportsmanship help develop high achievers in academics and in life.

Since its inception in 2011, nearly $600,000 has been awarded to more than 500 high schools across the nation to improve athlete safety, offset participation fees or purchase much needed equipment.

“All students should have the opportunity to compete,” said Lisa Almeida, Assistant Vice President. “California Casualty’s 66-year commitment to educators and schools also reaches to athletic fields.”

Applications are being taken at http://www.calcasathleticsgrant.com. The deadline for consideration is January 15, 2018, with 2017/2018 recipients announced in April.

California Casualty has served educators since 1951 and has provided the NEA® Auto & Home Insurance Program since 2000. The company gives back to educators through other community impact initiatives:

Headquartered in San Mateo, California, with Service Centers in Arizona, Colorado and Kansas, California Casualty provides auto and home insurance to educators, law enforcement officers, firefighters and nurses across the country. Founded in 1914, California Casualty has been led by four generations of the Brown family. To learn more about California Casualty, or to request an auto insurance quote, please visit http://www.calcas.com or call 1.800.800.9410.

Read the full story at http://www.prweb.com/releases/2017/12/prweb15019569.htm

Private Eyes Awarded Background Check Services Agreement with Premier

WALNUT CREEK, Calif. (PRWEB) December 18, 2017

Private Eyes has been awarded a group purchasing agreement for Background Checks with Premier. Effective March 1, 2018, the new agreement allows Premier members, at their discretion, to take advantage of special pricing and terms pre-negotiated by Premier for Background Checks Services.

“We are excited to continue our long-term relationship with Premier,” says Sandra James, CEO of Private Eyes. “We are grateful that since 2006, with Premier’s support, we have grown our market share in healthcare.”

Private Eyes, Inc.'s core business is focused on providing superior background checks. In order to meet the varying needs of their client base, they offer a variety of screening services including pre and post-employment screening, license, employment and educations verifications, drug screening and monthly monitoring.

Premier is a leading healthcare improvement company, uniting an alliance of approximately 3,900 U.S. hospitals and 150,000 other providers to transform healthcare. With integrated data and analytics, collaboratives, supply chain solutions, and advisory and other services, Premier enables better care and outcomes at a lower cost.

About Private Eyes:

Private Eyes is the leading protector of businesses in America by uniquely verifying their associates fast. Since 1999, the staff at Private Eyes has committed themselves to providing the best pre-employment screening for businesses seeking to reduce their liability risk in their hiring procedures. For more information, visit http://www.privateeyesbackgroundchecks.com.

Read the full story at http://www.prweb.com/releases/2017/12/prweb15019398.htm

Social Engineering Still Biggest Data-Security Threat, Attorney Writes

Atlanta, GA (PRWEB) December 18, 2017

As companies strive for better data privacy and cyber security, they should keep in mind that social engineering–often in the form of simple con jobs–remains the biggest threat, cautions LeClairRyan attorney John P. Hutchins in a new post on the national law firm’s Law & Technology blog.

“There’s evidence to suggest that users are getting suckered by fake messages more and more every year,” writes Hutchins, co-leader of LeClairRyan’s Technology & Innovations practice team and a shareholder in its Atlanta office. According to Verizon’s 2016 Data Breach Investigation Report, in fact, 30% of phishing messages were opened by their intended targets, and about 12% of recipients then went on to click malicious attachments or links.

In the Dec. 5 post (“Despite Equifax Breach Causes, Social Engineering Still Biggest Threat to Data Security”), Hutchins notes that complex technical issues related to cyber security and data privacy have been the focus of recent high profile data breaches, citing the massive data breach revealed by Equifax this past September as an example. While early media reports largely focused on the company’s alleged failure to apply a patch to fix a security hole in open source software called Apache Struts, Hutchins writes, many experts are not so sure this actually caused the breach. “Most security breaches are not the result of sophisticated technical hacks,” he writes. “The fact is that social engineering is the top method of gaining access to corporate computer systems and the sensitive data they hold.”

In the post, Hutchins describes common ways in which employees can be tricked into divulging confidential information such as passwords or ID numbers. Employees might, for instance, double-click email attachments that contain malicious code, thereby giving attackers access to computer systems and valuable data. Or they could be suckered into interacting with unexpected pop-ups, fake apps or games that request profile information and/or include malware. Social engineers are creative, the attorney writes, and are continually coming up with new twists on old techniques such as phishing emails or fake texts (“SMiShing”).

However, Hutchins writes, data thieves are also perfectly willing to take low-tech approaches such as dumpster diving for documents that should have been shredded, or just visiting an office and pretending to be a vendor, a rep from building management/security, a new employee who needs help, or someone from another office in the company. To illustrate, Hutchins cites the example of a “lurker” standing in the hallway carrying stacked boxes. “As you approach, he appears to clumsily reach for his key-card,” Hutchins writes. “You swipe yours instead, kindly holding the door for him as he walks in with his boxes. A con job like this gives the innocent-looking lurker access to files, the network, or other sensitive information or infrastructure.”

Simple impersonation tends to work because it leverages the human tendency to trust others–especially if they display credentials such as uniforms, badges or ID cards. “But these markers of legitimacy can pretty easily be faked,” Hutchins writes.

His post also covers common phone scams such as the infamous CEO/manager scheme. Here, attackers gather publicly available info about the target company, the CEO and those managers and employees who may be authorized to handle cash transfers. “The schemers use this data to make a call to a target employee, impersonating the CEO, and coercing the employee into making an urgent and high-dollar cash transfer to a designated bank account,” Hutchins writes. “You may ask yourself, ‘Who would fall for this?’ But it works far more often than you might expect.”

In the post, he advises that almost all social engineering depends on attackers establishing familiarity or authority to build trust. Companies should watch out for strangers making liberal use of company lingo, or mouthing details that seem to verify their claimed identities but that, upon further investigation, fall apart, he writes. “Social engineers like to try to create a sense of urgency, so the victim will act faster than usual and make the mistake the attacker is banking on,” Hutchins notes in the post. “Most often, if the target will take a few seconds to think it through, he or she will get the feeling that something’s not quite right, and that instinct is usually correct. Or if the target will make that one extra call to verify, the scammer claiming to be from ‘building maintenance’ will suddenly disappear.”

In conclusion, Hutchins cautions that social engineering is still very much alive. “Your company is most likely to be hit by a debilitating data breach because your employee base isn’t well-enough-equipped to recognize social engineering when it happens,” he writes. “That leaves your company at serious risk, regardless of how up-to-date your technical systems are. Regular and high quality training is readily available, and it is absolutely essential.”

Launched earlier this year, LeClairRyan’s cross-office, cross-disciplinary Technology & Innovations team focuses on ramping up service for companies that sell or are heavily dependent upon technology. Members include attorneys with broad experience in tech-related issues associated with transactions, litigation, IP, communications, regulations/compliance, deal making and more.

The full blog post is available at

https://lawandtechnologyblog.com/despite-equifax-breach-causes-social-engineering-still-biggest-threat-to-data-security/

About LeClairRyan

As a trusted advisor, LeClairRyan provides business counsel and client representation in corporate law and litigation. In this role, the firm applies its knowledge, insight and skill to help clients achieve their business objectives while managing and minimizing their legal risks, difficulties and expenses. With offices from coast to coast, the firm represents a wide variety of clients nationwide. For more information about LeClairRyan, visit http://www.leclairryan.com.

###

Press Contacts: At Parness & Associates Public Relations, Marty Gitlin, (631) 765-8519, durangitlin(at)optonline.net, or Bill Parness, (732) 290-0121, bparness(at)parnesspr.com.

Read the full story at http://www.prweb.com/releases/2017/12/prweb15016969.htm