Business360 Blog

Our goal is to help drive small business success; thus, we focus on topics like risk management, insurance, and operations. We look at these as the fundamentals for small businesses to become sustainable.

Home » Blog

two parties signing a contract and entering into a contractual risk transfer
Risk Management

What is Contractual Risk Transfer?

Once you’re ready to sign a contract it can be tempting to look right at the dotted line and ignore all of the legal jargon. However, you need to know what you’re signing and how it affects the amount of risk you’re accepting. This article will help you understand how to transfer risk using contractual provisions and help ensure your organization won’t be caught in an unexpected dispute.

a person using a tablet to view people analytics
People & Culture

What is People Analytics?

Over the last decade, people analytics has gone from obscurity to being at the center of HR. HR used to rely on limited information and gut feelings to make decisions, but as organizations integrate people analytics, that’s all changing.

man on laptop being targeted with a business email compromise scam
Cybersecurity

What is Business Email Compromise?

Business email compromise (BEC) scams can lead to numerous consequences within your organization—including stolen data, financial hardship, and potentially severe reputational damages. Review this article to learn more about what BEC scams are and measures that your organization can implement to prevent such scams.

a senior man a victim of social engineering fraud
Business InsuranceCybersecurity

Social Engineering Fraud Coverage

Social engineering fraud (SEF) is a type of fraud that's become increasingly common over the past several years. Unfortunately, it's a type of fraud that can expose a business, even if they have both crime and cyber policies. In this article, learn about SEF, why your existing policies might not cover it, and what endorsements could shore up gaps in existing coverage.

HIPAA Rules and Requirements binder on an employers desk
Risk Management

HIPAA Rules for Employers

The HIPAA Privacy and Security Rules are complex and violations can trigger expensive penalties. This article can help employers understand how the HIPAA Rules apply to them and their group health plans.

a female gig worker working from her kitchen
People & Culture

The Role of Gig Workers in Today’s Workforce

The gig economy is a system in which organizations contract directly with individuals, usually for temporary job positions, instead of relying solely on full- and part-time employees. It’s quickly becoming a vital component of the world economy. This article discusses the role of gig workers in today's workforce.

a sign on a desk that reads "I'm on Sick Leave", which is a type of employee leave
People & Culture

Employee Leave – Legal Rules

Employees may request a leave for various reasons, including for their own medical situations or family emergencies. In general, when an employee requests a leave, employers should consider their obligations under federal laws, such as the FMLA, and any applicable state and local laws. This article summarizes the legal rules that apply to an employee's leave of absence.

forest fires approaching homes, which can be a named peril or open peril
Personal Insurance

Named Perils vs. Open Perils

Insurance policies are often filled with terms that can be difficult to understand, particularly for the average insurance buyer. Of these terms, “named perils” and “open perils” are some of the easiest to confuse. Read on to learn more.

Risk Management

What is Contractual Risk Transfer?

Once you’re ready to sign a contract it can be tempting to look right at the dotted line and ignore all of the legal jargon. However, you need to know what you’re signing and how it affects the amount of risk you’re accepting. This article will help you understand how to transfer risk using contractual provisions and help ensure your organization won’t be caught in an unexpected dispute.

two parties signing a contract and entering into a contractual risk transfer
People & Culture

What is People Analytics?

Over the last decade, people analytics has gone from obscurity to being at the center of HR. HR used to rely on limited information and gut feelings to make decisions, but as organizations integrate people analytics, that’s all changing.

a person using a tablet to view people analytics
Cybersecurity

What is Business Email Compromise?

Business email compromise (BEC) scams can lead to numerous consequences within your organization—including stolen data, financial hardship, and potentially severe reputational damages. Review this article to learn more about what BEC scams are and measures that your organization can implement to prevent such scams.

man on laptop being targeted with a business email compromise scam
Business InsuranceCybersecurity

Social Engineering Fraud Coverage

Social engineering fraud (SEF) is a type of fraud that's become increasingly common over the past several years. Unfortunately, it's a type of fraud that can expose a business, even if they have both crime and cyber policies. In this article, learn about SEF, why your existing policies might not cover it, and what endorsements could shore up gaps in existing coverage.

a senior man a victim of social engineering fraud
Risk Management

HIPAA Rules for Employers

The HIPAA Privacy and Security Rules are complex and violations can trigger expensive penalties. This article can help employers understand how the HIPAA Rules apply to them and their group health plans.

HIPAA Rules and Requirements binder on an employers desk
People & Culture

The Role of Gig Workers in Today’s Workforce

The gig economy is a system in which organizations contract directly with individuals, usually for temporary job positions, instead of relying solely on full- and part-time employees. It’s quickly becoming a vital component of the world economy. This article discusses the role of gig workers in today's workforce.

a female gig worker working from her kitchen
People & Culture

Employee Leave – Legal Rules

Employees may request a leave for various reasons, including for their own medical situations or family emergencies. In general, when an employee requests a leave, employers should consider their obligations under federal laws, such as the FMLA, and any applicable state and local laws. This article summarizes the legal rules that apply to an employee's leave of absence.

a sign on a desk that reads "I'm on Sick Leave", which is a type of employee leave
Personal Insurance

Named Perils vs. Open Perils

Insurance policies are often filled with terms that can be difficult to understand, particularly for the average insurance buyer. Of these terms, “named perils” and “open perils” are some of the easiest to confuse. Read on to learn more.

forest fires approaching homes, which can be a named peril or open peril
Loading...