<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1557350231232256&amp;ev=PageView&amp;noscript=1">

Jen Rossi

Jen Rossi
Jen Rossi is a Business Development Coordinator and IT Associate at ECBM's Corporate Office in Media, PA. With her background in education including learning technology, Jen creates interactive and informational content for our blog subscribers. Follow Jen on twitter for tips on cyber security, tech, and digital marketing.
Find me on:

Recent Posts

The Road Ahead For Teams Working Remotely

More employers are opting for a remote workforce. Whether due to the recent COVID-19 health crisis's challenges, costs associated with a more traditional workspace, keeping your talent on the team after a move, or other issues with a conventional commute to the office more employers than ever are taking advantage of the availability of technology and the possibility of having remote team members. 

The Most Dangerous Social Engineering Scams of 2019

The problem of Social Engineering techniques called Phishing, Whaling, Spear Phishing, Pharming, or Impersonation Fraud has become significant and widespread in recent years. The insurance industry has made efforts to keep these risks in mind for cyber liability policies. Sometimes there is language added that will protect a company, but sometimes communication is added to a basic policy that would not protect a business against these specific risks. 

ECBM Insurance Brokers & Consultants Named in Business Insurance’s Annual Best Places to Work in Insurance 2016




ECBM Insurance Brokers & Consultants Named in Business Insurance’s
Best Places to Work in Insurance

Award Recognizes Outstanding Employers in the Insurance Industry

Infographic- Which Injuries Should Be Reported To OSHA?

Many Employers are Confused by the requirements, effective January 1, 2015 as to what types of injuries are reportable to OSHA. Check out the guide below as an easy reference:

How Prince’s Death Can Affect Your Cyber Security Efforts




The music artist Prince was found dead at his home in Minnesota Thursday morning. An autopsy will be done on Friday 4/22/2016.

Here’s why this is worth mentioning: usually when a musician passes away there is a bump in music downloads and people listen to streaming services to memorialize them. That’s usually all fine and good, album sales go up, there’s trending on twitter, and there is an overall virtual outpouring of support.

Unfortunately these sad times are the perfect opportunity for Social Engineering Scams. Celebrity Deaths (or even death rumors) are like natural disasters, holidays, and other major news stories. New websites are created, the high-demand content is scrubbed, dubious emails are drafted, and links to websites loaded with malware and viruses are circulated on social media.

What Snapchat's W-2 Leak Means For Your Business

What Happened?

How To Spot Powerball And Other Lottery Prize Scams

 This could be a scammer's chance for a big pay day

12 Tips To Help You From Being Hacked For The Holidays


It's the holidays for the criminals too, you know...

Social Engineering scams increase right around the holidays. With the increase of people shopping online and the odd-hours, hurried correspondence at work, it is getting harder to filter through which emails are legitimate and which ones could be a trap.

Know Your Limits This Holiday Season


The holiday season… it’s almost here. A mix of consumerism, parties, loved ones, responsibilities, traditions, and emotions is enough of make many panic when trees are set up, music tastes change, and this year’s must-haves start appearing on store shelves. (Take a breath, we’ll get through it together) The perceived bar that we set for ourselves can make a time of happiness into a time of financial burdens, anxiety, and stress that we feel… Even months after the last gift is exchanged.

Cyber Security: Safely Disposing of Your Devices

Getting a new computer, notebook, tablet or other technology for your business is often necessary to keep up with the times. After purchasing new technology, you may decide to dispose of your old devices. Whether you recycle, give to a family member or employee or donate to a charity, a school or a soldier, you need to protect the information on the devices from exposure. However, removing your information is harder than it seems.