Deeley Serves – March 2019

Deeley Insurance Group is proud to sponsor the Willards Little League. Willards Little League provides baseball and softball programs for boys and girls ages 4 to 16 who live or go to school in Willards, MD. Programs include Tee Ball, Minor and Major League, Intermediate and Junior League, and Senior League. 2019 Opening Day is…

Details

Managing Remote Work Arrangements

Allowing employees to work remotely from home or other off-site locations can increase productivity for workers, reduce costs for the company and create beneficial flexibility to keep operations going if something happened to your business’s primary physical location. However, remote work, or telecommuting, needs to be conducted carefully with the help of established company policies…

Details

OSHA’s Silica Rule

About 2 million construction workers are exposed to respirable crystalline silica in over 600,000 workplaces. OSHA estimates that more than 840,000 of these workers are exposed to silica levels that exceed the new permissible exposure limit (PEL). Exposure to respirable crystalline silica can cause kidney disease, silicosis, lung cancer and other respiratory diseases. Here is…

Details

Impact of Emerging Technology on Equipment

Companies are becoming increasingly reliant on emerging technologies. Data centers are increasingly vital to business operations. Complex, digitally controlled, remotely operated machinery is replacing much of the manual operator control equipment. This rapidly evolving technology means new risks for businesses. While the term “equipment” once primarily referred to boilers, today’s equipment is more complex, and is controlled…

Details

5 Types of Cyber Criminals

Understanding the types of cyber criminals and their techniques can help protect your organization from a data breach. Travelers provides a list of common threats and prevention steps a business can take. #1 The Social Engineer Cyber criminals pretending to be someone else can trick unsuspecting employees to compromise data. In one scenario, a spoof email purporting…

Details