ACH transactions are electronic money transfers made between banks and credit unions across the Automated Clearing House (ACH) network. While convenient and sometimes appropriate, you should NEVER fulfill a request to wire money from an email alone. Below are some examples of language vetted by a cyber law firm that can be helpful to include in your email signature as notice of your organization’s best cyber practices on this topic:

  • [CLIENT] will never send an email requesting that wiring, ACH, or other payment instructions be changed or altered.  if you receive a similar request from anyone, you should always confirm billing or payment instructions with a known contact in person or, if not possible, over the phone, so that you can confirm the identity of the sender.  If you ever receive or have received a request from [client] regarding payment instructions via email only, please reach out to a known contact at [CLIENT] in person or by phone.  Always contact our main number and do not utilize the phone number in the email you receive.   
  • Never wire transfer money based on an email request from our office without calling this office and speaking with someone personally to confirm wire information.  When calling, do not use the phone number from the e-mail signature line.  Even if an email looks like it has come from this office, or someone involved in your transaction, do not accept emailed wire instructions from anyone without voice verification.  You will never be instructed to wire money related to a payment without verbal consent.
Read More

Over the past several years, the United States has been plagued by property-related catastrophes, including, but not limited to, hurricanes, floods, tornadoes, convective storms, frigid temperatures, excessive snowstorms, hailstorms and wildfires. The sorority houses insured under the MJ Sorority Insurance Program have not been immune to these unfortunate events with a tornado significantly damaging two sorority chapter houses in 2022 and forty-four freeze claims in December 24-25, 2022.

Due to billions of dollars in paid insurance claims, all insurance carriers are struggling with how to handle the situation. Regardless of your current deductible, MJ Sorority appreciates your claims submissions, even if they will not meet your deductible. This information helps us provide historical data to our carrier, ensuring that we can communicate accurately the impact that these changing weather patterns, especially in wind and hail, have had on the program’s insured properties.

If your property suffers wind and hail damage, please be sure to contact us.

Read More

No industry or business is immune to a cyber-attack. Your organization, knowingly or not, has likely experienced some brush with a cyber breach, potential breach, or near miss. Cyber threats emerge and evolve quickly, making them both difficult to predict and potentially volatile to manage.

The Greek community in particular is ripe for attack due to the volume and breadth of members’ personal identifiable information (PII) that is collected and stored by organizations. A breach of this information causes not only tangible and quantifiable harm, but also reputational harm, which can take years to rebuild, and in some cases, is lost forever.

Proactive risk management can make all the difference in the event of a cyber threat or breach. With that in mind, MJ Sorority has assembled a Cyber Toolkit to help your organization engage with key leadership, employees, and members to keep your operations safe and prevent business disruption due to cyber related incidents.

Here’s a peek into what’s included:

  • An overview of free and discounted services offered to CHUBB cyber clients, including a breach response plan builder and external vulnerability monitoring
  • An overview of MJ’s Cyber Resilience Program, designed to address pre- and post-loss strategies, including a cybersecurity risk assessment, leadership education, employee training and coverage analysis with MJ Cyber Lead, Carol Scully (for a fee);
  • Resources on identifying and preventing deep fakes, phishing, and other types of cybercrime on the rise;
  • Overview of simulations services your team can engage with to prepare for a cyber event;
  • And additional resources on best practices to prevent and respond effectively to cyber incidents.

This kit equips your team to respond efficiently and effectively in the event of a breach or cyber-attack. We hope that you use the opportunities outlined in this communication to gain valuable insights about your current cyber security and make updates where you may be vulnerable. While this kit is not comprehensive, it can certainly help inform your next steps in creating and maintaining a secure environment for your employees, members, and other stakeholders.

Through education and proactive measures, we can mitigate the risks posed by malicious actors and safeguard sensitive information in an increasingly interconnected world.

If you have any questions about the programs and resources provided by MJ Sorority and our partners, please reach out to Kit Clark Moorman at kit.moorman@mjsorority.com.

Deepfakes

With new artificial intelligence (AI) technologies emerging every day, the threat of deep fakes is becoming more prominent and more dangerous, fooling even the keenest of eyes. A deepfake is a fabricated, extremely realistic image or video that has been digitally altered to impersonate someone else. They are typically used to spread false information or trick individuals into complying with the requests of a cybercriminal.

With the ability to convincingly impersonate real people, cyber criminals are able to orchestrate highly effective phishing scams, identity theft operations, and other cyber crimes that can have huge impact on your business operations and the safety of your personally identifiable information (PII).

Learn more about the threat of deepfakes and how your organization can get ahead of cyber criminals using this technology for malicious purposes here.

Complimentary and Discounted Cyber Services for Clients

Through your CHUBB policy (check with your client executive to see if you are covered), clients have access to a selection of essential mitigation tools and advisory resources that can help reduce your exposure. From cyber incident response solutions to education and training, CHUBB has compiled a group of experts to offer their services at a significant discount, sometimes even free of charge.

You can check out a full list of offerings here and learn more through CHUBB’s eRisk Hub. In addition, we have pulled a few FAQs and basic, complimentary services that you can learn more about in this loss mitigation article.

If you have questions about setting up or logging into your eRisk account, please contact your client executive.

Malware Response

Malware, short for malicious software, refers to intrusive and harmful programs or files developed by cybercriminals to steal, damage, or destroy data. Typically hidden in files, images, malware is usually distributed through malicious websites, emails and software.

We are all vulnerable to clicking on a link or attachment that contains malware, usually inadvertently. This article helps outline the important and immediate steps you and your organization should take in the event of a malware infection.

Managing Cyber Risk

Over the last decade, cyber security has evolved from a niche concern of IT professionals to a major priority for CEOs and Boards of Directors. Company leaders are now charged with managing cyber risk with the same urgency that they have treated tradition business risk in the past.

This paper explains the different forms of cyber risk and shows how the threat level has risen in recent years. It provides a basic framework for managing cyber risk. It also poses five key questions that business leaders should ask themselves to ensure their cyber risk stance is sufficiently robust and resilient to meet evolving threats.

The MJ Companies Cyber Practice

The MJ Companies has a specific cyber insurance practice, which has also developed several resources and services for your benefit. Please see the links below to engage with some of MJ’s free resources and for information on reviewing and assessing your organization’s cyber resilience with our team of experts.

  • Cyber Quick Response: Drafting Your Team (free webinar) – Drafting your cyber expert teams before an event is one of the most important steps you can take. Where do you start, who are the experts you need to connect with, how do you evaluate them, and how can you be sure they are aligned with your carrier providers?
  • Reducing Reputational Risk (free webinar) – Don’t let a cyber breach devastate your organization’s finances and reputation. On average, organizations take around 277 days to fully identify and contain a cyber-attack, leaving them vulnerable to lasting damage.
  • Cyber Resilience Planning – MJ service offered for a fee

Phishing

A common form of social engineering, phishing, occurs when a bad actor communicates via email, phone or text, requesting that a recipient take action, such as click on a link or provide account information. The collected information is then used to gain unauthorized access to protected PII or other data that isn’t meant to be shared.

See this article for examples of phishing attacks. The examples provided cost the victim-companies millions of dollars, with bad actors using a combination of phishing scams and business email compromise to manipulate people into sharing PII and in turn using that information to collect funds.

Phishing attacks can be particularly problematic as hackers use our own instincts against us, gaining access to PII by a victim’s own hand. KnowBe4, a partner of The MJ Companies and CHUBB, offers phishing simulations to help train employees to be wary of this kind of attack, discounted for MJ clients. To learn more, please reach out to Kit Clark Moorman at kit.moorman@mjsorority.com.

Business Email Compromise

In today’s digital world, the growing impact of cyber-attacks have become an ever-pressing concern for businesses of all sizes and across industries. While ransom events tend to capture the brunt of media attention, Business Email Compromise (BEC)—a type of cyber-attack where hackers gain access to a business email account and trick employees into sharing sensitive information or transferring funds—is actually among one of the most prevalent and damaging.

Check out this free webinar on the topic, hosted by MJ’s Carol Scully.

ACH Transactions Language

ACH transactions are electronic money transfers made between banks and credit unions across the Automated Clearing House (ACH) network. While convenient and sometimes appropriate, you should NEVER fulfill a request to wire money from an email alone. Below are some examples of language vetted by a cyber law firm that can be helpful to include in your email signature as notice of your organization’s best cyber practices on this topic:

  • [CLIENT] will never send an email requesting that wiring, ACH, or other payment instructions be changed or altered.  if you receive a similar request from anyone, you should always confirm billing or payment instructions with a known contact in person or, if not possible, over the phone, so that you can confirm the identity of the sender.  If you ever receive or have received a request from [client] regarding payment instructions via email only, please reach out to a known contact at [CLIENT] in person or by phone.  Always contact our main number and do not utilize the phone number in the email you receive.   
  • Never wire transfer money based on an email request from our office without calling this office and speaking with someone personally to confirm wire information.  When calling, do not use the phone number from the e-mail signature line.  Even if an email looks like it has come from this office, or someone involved in your transaction, do not accept emailed wire instructions from anyone without voice verification.  You will never be instructed to wire money related to a payment without verbal consent.

Data Privacy Provisions for Vendor Agreements

When contracting with third party vendors, it is important to be sure that you are reviewing contracts for appropriate data privacy provisions. Privacy provisions explain how a third party can collect, use and distribute PII and what other obligations that vendor will have with regards to the PII you share with them. See this document, compiled by CHUBB partner McDonald Hopkins, for some suggested language to look for or add to vendor contracts that addresses the handling of PII.  

Sorority Program Claim Examples

Click here for examples for the MJ Sorority program that help demonstrate the need for risk management around cyber risks.

Read More

Ensuring the safety and security of the chapter house is obviously a top priority. The chapter house is not just a residence; it is a home where members build lifelong bonds, create cherished memories, and engage in activities that shape their futures. Given its significance, implementing robust security measures is essential to protect both the physical space and the well-being of its residents. One of the most advanced and effective security solutions available today is biometric entry systems.

Enhancing Security with Biometric Entry Systems

Biometric entry systems utilize unique biological traits, such as fingerprints, facial recognition, or iris scans, to grant access. Unlike traditional locks and keys or even electronic keycards, biometric systems offer several distinct advantages that make them particularly well-suited for sorority chapter houses.

  • Improved Access Control: Biometric systems ensure that only authorized individuals can enter the chapter house. Unlike keys or keycards, which can be lost, stolen, or duplicated, biometric traits are unique to each person and cannot be easily replicated. This significantly reduces the risk of unauthorized access.
  • Enhanced Safety: The presence of a biometric entry system can deter potential intruders and enhance the overall safety of the chapter house. Knowing that the house is equipped with advanced security technology can provide peace of mind to members, their families, and alumnae.
  • Convenience and Efficiency: Biometric systems streamline the process of entering the house. Members no longer need to worry about carrying or losing keys and keycards. Access is granted swiftly and efficiently, making it easier for members to come and go while ensuring that security is never compromised,
  • Accurate Tracking and Monitoring: These systems provide precise records of entry and exit times for all members. This feature is particularly useful for monitoring the house during events or identifying who was present in case of any security incidents. It also helps in managing the house occupancy efficiently.
  • Durability and Low Maintenance: Biometric entry systems are typically more durable and require less maintenance compared to traditional locks. They are designed to withstand frequent use and are less susceptible to wear and tear. This longevity ensures a more reliable security solution over time.

If your chapter house utilizes a biometric security system, it is prudent to provide annual written notice to all individuals whose biometric information identifiers are collected or stored and specify the purpose of the collection and length of time the information identifiers will be held, stored, and used. Written consent and release of this information should be included in an annual housing agreement. Read more about our suggestions for Housing Agreements here.

Investing in a biometric entry system for the sorority chapter house is a forward-thinking decision that prioritizes the safety and well-being of your members. By leveraging advanced technology, the chapter can provide a secure, convenient, and efficient environment that supports the flourishing of its community. In a world where security concerns are ever-present, adopting biometric entry systems reflects a commitment to excellence and proactive care for all members of the sorority.

Read More

From May 2024 News & Notes

In times like these, the stability of your insurance companies is critical. The pandemic challenged every aspect of the fraternal community. Both your insurance companies and MJ Sorority, as your insurance agent, made significant concessions to help alleviate some of the pressures your organizations have faced.

The insurance industry went from the chaos of the pandemic to the chaos of the effects of climate change, specifically the catastrophic weather events we’ve experienced over the last several years. Insurance coverage and policy terms and conditions are on a collision course with the changing climate in many states, most notably in Florida and Louisiana. The seriousness of changing climate patterns is further compounded by the fact that in Florida’s southwestern coastline, sea levels have risen eight inches since 1950, and the risk of storm surge is estimated to double by 2030. Louisiana’s coastline is facing a similar risk. Florida is by far the most worrisome for standard property insurance companies. Several insurance companies providing property insurance in the state have gone insolvent despite state and industry efforts to prevent insolvency. To stabilize the insurance market, the Florida state government began the Florida Hurricane Catastrophe Fund in 1992. The Fund reimburses insurers for a percentage of catastrophic hurricane claims. Insurers of last resort were formed and in 2002, both carriers merged to become Citizens Property Insurance Corporation. Some additional insurance capital (or capacity) is returning to Florida in 2024, however, this has not provided much, if any, relief to consumers trying to find insured coverage for their property.

As we’ve discussed repeatedly in this newsletter, the property insurance market has been chaotic for several years. Recently, the MJ Sorority program has experienced rate increases and changes in wind and hail property deductibles in certain parts of the country.

It’s natural to feel that these changes suggest your insurance companies are abandoning the program. However, these actions are actually positioning the program for a stable future.

Without the stability of the MJ Sorority program and our partnering insurance companies, your insurance coverage would be far more vulnerable. The saying, “you get what you pay for,” is especially true for the insurance program provided by MJ Sorority. Otherwise, you risk compromising your crucial protection.

Should you wish to discuss the property insurance industry concerns further, please do not hesitate to contact us.

In the News 
The property insurance crisis has been making headlines outside of your typical insurance industry publications. To learn more, we recommend the following:

  • Motley Fool: How property insurance will be impacted specifically in all 50 states
  • New York Times: Insurers Around the U.S. Bleed Cash From Climate Shocks
  • The Daily Podcast: The Possible Collapse of the US Home Insurance System
  • Fox Business: Insurance costs could surge even higher as states brace for ‘hurricane season from hell’
  • Marketplace: The main reason for higher home insurance costs is climate change, which is increasing the frequency and severity of extreme weather events.
Read More

As weather patterns continue to evolve, it is crucial for housing corporations to update their chapter house roofs to withstand the increasing intensity of wind and hail events. Convective storms in particular are a major cause for concern. Convective storms are extremely severe storms with defining characteristics of high winds, sudden temperature changes, and severe thunder and lightning.  

In light of these more severe weather conditions across the country, carriers are isolating geographic areas at greater risk to weather perils and are requiring additional measures be taken to update roofs. It is imperative to consider retrofitting affected chapter house roofs to mitigate risk.

Also at issue are state building codes. Many states have not updated their building codes to prepare for more severe weather, leaving existing and new structures vulnerable to sever weather damage. Building codes set the minimum standards for construction, however these standards may not always align with insurance requirements, leaving sorority houses vulnerable to potential coverage gaps. Furthermore, in many states and municipalities, building codes are not adequately enforced.

It is crucial for chapter houses in areas with inferior building codes to exceed minimum building code specifications to meet insurance expectations. This reduces the risk of roof damage and associated expenses if a convective storm hits a property. Housing corporations should be particularly wary of properties in the west and mid-west, where predictive modeling has determined a sharp increase in the frequency and severity of wind and hailstorms. Fortunately, universities are rarely near coastal areas, so that minimizes some of the increased risk of severe hurricanes.

MJ Sorority has consulted extensively with industry experts to create a list of recommendations for your chapters as they consider updating or replacing their chapter house roofs. At a minimum, we recommend that all of your chapter houses do an intake on the age and condition of their roof, which many roofing companies will do free of charge!

When it comes to fortifying your existing roof or installing a new one, MJ Sorority recommends the following:

  • Stronger Edges: strengthening the edges of your roof can help prevent wind uplift during storms, which can lead to roof edge failure. By reinforcing the edges with hurricane straps (not just for hurricanes!) or other secure attachments, the edges of a roof can withstand far greater wind speeds.
  • Sealed Roof Deck: adding a layer of protection against water helps minimize the risk of leaks and water damage during heavy rainfall, snow, and hailstorms. Sealing your roof deck not only strengthens your roof but protects the attic and building more generally from potential water damage caused by storms.
  • Better Attachment: improving attachment is the best defense for preventing wind and wind-driven debris from breaking your roof loose from the rest of the structure.
  • Impact-Resistant Shingles: investing in stronger shingles provides an additional layer of defense against hail and wind-driven debris impact. Designed to withstand high velocity impacts, these shingles reduce the likelihood of damage and the frequency of repairs.
  • Wind and Rain Resistant Attic Vents: upgrading attic vents maintains stable ventilation to the home’s interior, while simultaneously protecting against water and debris that may damage your roof and attic during a storm.
  • Impact Protection for Windows and Doors: the use of impact resistant materials to reinforce windows and doors mitigates the risk of them breaking or coming lose, leaving your property vulnerable to water and debris. An additional benefit to impact protection is security, making it nearly impossible to break through a window, even when the top layers of glass have shattered.

Given the heightened risk of volatile weather, it is imperative that organizations do an intake and analysis of the health of chapter house roofs. Taking proactive measures to update and fortify roofs and bridging the gap between building codes and insurance requirements can mitigate the risk of roof damage and will maintain the safety and longevity of your properties. Prioritizing the fortification via the recommendations above will not only enhance the overall structural integrity of the properties in question but will also undoubtably contribute to the long-term sustainability of these important spaces for members.

Further Reading:

Read More

So, we’re betting at least some of your apps and online accounts have asked, “Do you want to opt into two-factor identification?” And, if you’re like many people, all that texting and code retrieval might seem just a little too much trouble.

Is all that security really necessary? Short answer: YES. And it doesn’t have to be hard.

Why should you use two factor identification?
Cyber attacks, personal data leaks, and phishing scams are becoming more common as hackers get more sophisticated and as we conduct more of our personal and financial transactions on apps and online. Scary factoid: the FBI’s Internet Crime Complaint Center reported that people lose $57 million in phishing and smishing schemes each year.1

Two-factor identification (2FA) provides an extra layer of protection to help safeguard your personal data and your dollars when you are accessing websites and apps.

What exactly is two-factor identification?
Also referred to as “two-step authentication,” “two-step verification” or “multi-factor authentication,” 2FA is an electronic security protocol that prevents you from accessing a website or an app until you validate your identity with two or more pieces of proof. This helps ensure that unauthorized users can’t pretend to be you.

Multi-factor identification “secures your logins from attackers exploiting weak, stolen, or leaked credentials,” says Laura Bennett, Senior Vice President, e-Consumer North America for BlinkSM by Chubb®.

How do you enable 2FA protection?
Many widely-used internet service providers (e.g. Google, Apple, Amazon) and social media platforms (e.g. TikTok, Snapchat, Facebook/Instagram), as well as financial sites, productivity, and personal apps (e.g. Paypal, Slack, Fitbit) have 2FA capability.

  • A helpful website that lists sites currently offering multi-factor identification can be found here: 2FA Directory.
  • Enabling 2FA is typically done through your user account and/or security tab. Instructions vary, so check with the individual sites or apps for specifics.
  • There are a number of authentication apps that consolidate and streamline your 2FA efforts. In other words, the app automatically authenticates you and eliminates the code sending step. The advantages of using these are that they typically work even when you don’t have access to cell service, and they are considered more secure than text messages. Some of the most popular apps are Authy, Google Authenticator, Duo, and Microsoft Authenticator.

We do not endorse any particular vendor or brand of 2FA, but consumers should take time to research options along with the benefits of utilizing 2FA for their circumstances.

Is two-factor identification foolproof?
Currently, 2FA apps are the most secure user authentication methods. However, it is important to always practice good cyber hygiene habits:

  • “Leverage alerts on all accounts (especially financial) to warn you of suspicious activity,” Bennett advises.
  • Use a strong and unique username and password and never save passwords in your web browser.
  • Keep your computer’s operating system up to date. This is to ensure you have the latest security features in place.
  • Be wary of emails, texts, or attachments from unfamiliar or suspicious-looking senders especially those that ask for personal data.
  • Avoid using open wi-fi networks, which are easily hacked.

We do not endorse any particular vendor or brand of 2FA, but consumers should take time to research options along with the benefits of utilizing 2FA for their circumstances.

Source: Chubb, the cyber insurance provider for MJ Sorority

Read More

Note: We have recently had several check fraud claims. We asked our partners at The National Bank of Indianapolis to write the following article to help you protect yourself from check fraud. See also our previous article on the subject.

Financial losses due to fraud are increasing every year. According to the FCC, losses due to fraud were up by more than 30% in 2022 compared to 2021. Nonprofit organizations tend to be particularly at risk due to 990s and other information useful to fraudsters being publicly available.

Particularly alarming is the rise in check fraud. FinCEN released a recent report indicating that check fraud occurrences reported by banks increased to 680,000 in 2022 from 350,000 in 2021.  
It is often recommended that we minimize the use of paper checks as much as possible.  Electronic credit card and ACH payments (with verified and secure payment portals), while not perfect, are much more secure. Credit cards also tend to have the most generous reimbursement terms if fraud does occur.

While this is sound advice, it is sometimes simply unavoidable to use paper checks as a form of payment.  Here is some general information and steps you can take to help protect your organization:

Check Processing and Check Fraud Trends:
Today, the processing of checks by banks is nearly all automated.  Gone are the days of banks examining individual checks and matching to signature cards.  Anyone with your account and routing number can easily create fake checks. On the bright side, bank processing software has become more sophisticated in detecting anomalies in check style and out of sequence check numbers.  

In response, the criminals are now trending back to intercepting real checks and changing the payee information.  This way, an altered check can be paid, and possibly go unnoticed for a much longer period of time.  Unless cancelled checks are examined closely, they can reconcile correctly, and not be noticed until the intended payee calls.  Depending on the payee’s accounts receivable systems, this is sometimes months later.

How to Protect Your Organization:

1. Positive Pay:  Most banks offer this service for a fee, and there is no better defense against check fraud.  It works by matching all checks that are drawn on your account to a file you send to the bank at the time you issue them.  If any information does not match, you are notified and have the opportunity to deny payment.

Some banks have different versions of Positive Pay, so make sure that your service is verifying the payee name as well as the other information on the check.

There is a similar “ACH Debit Filter” product which protects against unauthorized ACH debits which is also highly recommended.

Should you reject this optional risk management too, it will be incumbent upon you to manage your financial transactions in a more timely and more thorough manner.

2. Outsourced Payables Processing: Many organizations hire third parties to manage the processing of payables. The processors generally prefer to send payments via ACH, and only use paper checks when necessary. Usually, they will debit your account once and pull the funds into their bank account, and then make payments to your vendors from there. They should all have Positive Pay, but sometimes fraud still occurs. It is important to review their contracts and disclosures carefully to understand how fraud is handled and who is liable. Some of them have time limits after which they will not reimburse for fraud losses.

3. Reconcile and review account activity frequently: Identifying fraud as soon as possible is critical as the chances of recovering the funds diminish quickly with time. If a fraudulent check is reported within 24 hours, it can usually be returned before funds ever leave your account. Organizations that choose to not incur the expense of Positive Pay must be particularly vigilant.

4. Report fraud to your bank no later than 30 days from the incident. Regulation CC (the Federal regulation governing check processing and liability) requires the bank of first deposit to conduct specific actions if it is notified within 30 days. After that, the opportunity for recourse is greatly reduced.

5. Secure Check Stock: Protecting both unused check stock, and outgoing checks is another critical aspect of protection. Many of the intercepted checks are stolen from the mail. Unsecured mailboxes should be avoided.

What To Do if Fraud Occurs:

1. Notify Your Bank Immediately: The sooner the bank is notified the better the chances of recovering the funds. Your bank should also guide you through the process and advise on next steps.

2. File a Police Report: In addition to getting the police involved, this is a very important step to document the occurrence for potential insurance claims, and disputes down the road with intended payees.

3. Contact the Postal Inspector’s Office – If a check was stolen in the mail, be sure to file a report with this office. They also tend to be more proactive about pursuing fraudsters than the police.

4. Contact MJ Sorority to alert them to the incident and determine any additional action that needs to be taken.

In Summary:

As the threat of check fraud continues to evolve, we all must remain vigilant and proactive in educating ourselves and our employees . Staying informed about emerging trends, leveraging advanced banking technologies, and adopting best practices will help fortify our defenses. It is important to have a good relationship with a knowledgeable and responsive banking partner who can help develop and continuously improve your defenses against losses due to fraud.

Read More

We have seen a recent uptick in phishing scams among MJ Sorority clients. In today’s digital age, the threat of phishing is more prevalent than ever before. Did you know that over 90% of successful hacks and data breaches start with phishing scams? It’s a sobering statistic that underscores the importance of staying vigilant against this pervasive threat.

But what exactly is phishing? Simply put, it’s the process of attempting to acquire sensitive information, such as usernames, passwords, and credit card or bank account details, by masquerading as a trustworthy entity. Phishers often use bulk emails that try to evade spam filters, claiming to be from popular social websites, banks, auction sites, or IT administrators. It’s a form of criminally fraudulent social engineering that preys on unsuspecting individuals.

Understanding the Techniques

Phishing techniques have evolved over the years, becoming increasingly sophisticated and diverse. From traditional email and spam campaigns to more targeted approaches like spear phishing and session hijacking, cybercriminals employ a wide array of tactics to deceive their victims. They manipulate links, inject malicious content, and even resort to voice calls and SMS messages in their quest to obtain personal information.

Stay Vigilant

So, how can you protect yourself against phishing attacks? Awareness is key. Familiarize yourself with the common techniques used by cybercriminals, and adopt anti-phishing strategies to safeguard your information. Be cautious when clicking on links or downloading attachments from unknown sources, and always verify the authenticity of requests for personal or financial information.

At MJ, we utilize KnowBe4, a firm that provides security awareness training to members of your organization. Each quarter, they produce an infographic with the top types of phishing attacks, as excerpted above. For the full infographic and associated data, click here. KnowBe4 also offers a free phishing security test that you can utilize to see if your employees are susceptible to phishing attacks – learn more here.

Read More

The past year saw a surge in severe convective storms, particularly hailstorms, causing billions in insured losses across the US. This trend is likely to continue in 2024 and beyond, impacting insurance premiums and available coverages, especially for properties like sorority chapter houses.

The graphic above shows the increase in the number of hail storms and the severity of the damage associated with them over the last twenty years. To zoom in and read the entire report, which we found very informative, click here.

These storms, packing powerful winds, hail, and heavy rain, pose a significant threat. In 2024 and beyond, the risk of severe convective storms looms large, driven by a combination of factors such as warmer atmospheric temperatures, higher moisture content, and shifting wind patterns. These storms can unleash destructive winds, large hailstones, torrential rainfall, and even tornadoes, causing extensive damage to buildings and infrastructure in their path.

Sorority chapter houses, often located in areas prone to severe weather, often face heightened exposure to convective storms. Their typically large, historic structures may be more susceptible to damage from high winds and hail, leading to costly repairs or even total reconstruction. Furthermore, the social nature of sorority houses means that they are frequently occupied, putting members at risk during severe weather events. 

Insurance companies take these risks into account when setting premiums for property coverage. As the frequency and severity of convective storms increase, insurers may adjust their pricing models to reflect the heightened risk. Other options for insurers in this new environment include: stricter requirements for risk mitigation measures, such as installing impact-resistant roofing materials or reinforcing windows and doors against high winds. 

In response to these challenges, sorority chapters must prioritize proactive risk management strategies. These strategies include the following recommendations and resources:

By staying informed and taking proactive steps, sorority houses can weather the storm – both literally and figuratively.

Read More

Water damage poses a significant threat to sorority chapter houses, often resulting in costly repairs, business interruptions, and reputation damage. In this resource, we share tips and strategies to effectively prevent water damage and safeguard the integrity of sorority chapter houses. For a shorter, visual resource, click here.

Prevent sewer and wastewater system backups

  • Pay special attention during times of heavy rain, as sewers can get overwhelmed, becoming blocked, resulting in a back-up causing polluted water to flow directly into the chapter house.
  • Have an emergency plan for shutting down inflow systems.
  • Install water detection sensors behind these systems.

Prevent Water Heater Issues

  • The typical lifespan of a water heater is 8-10 years so have a replacement program in place.
  • Routinely look for signs of rust and corrosion.
  • Keep water pressure no higher than 80 psi / 552 kFa
  • Install a catch pan (drip pan) under the heater to catch small leaks
  • Install water detection sensors behind these systems

Keep HVAC Equipment Working Well

  • Look for clogged drains, frozen evaporator coils, and pipes not properly connected, which are primary culprits of HVAC leaks.
  • Change filters regularly to keep unit from overworking.
  • Make sure condensation drain line is clear on a monthly basis.
  • Install water detection sensors especially in unheated spaces that have piping concealed.

Pay Attention to the Plumbing

Domestic plumbing is the primary culprit of water damage. Most claims involve leaking pipes caused by corrosion, pipe burst, or failure. Failure to prevent and control corrosion is the root cause. Unfortunately, most corrosion is internal and is not easily identified. Galvanic corrosion is one of the most common types of corrosion.

  • Look for visible corrosion
  • Listen and watch for rattling, shock or vibration when water is turned on or off, which might indicate a piping support issue
  • Replace piping that is over forty years old
  • Look for blue or green staining on sinks or taps, which indicates high concentrations of carbon dioxide.
  • Check for acidic water and treat hard water.

Plumbing in Bathrooms and Kitchens

  • Keep an eye on toilets, sinks, and other common bathroom fixtures, especially in multi-story houses with stacked plumbing. Make sure resident members bring all leaks to the attention of either the House Director or the Collegiate House Officer.
  • Inspect all plumbing hoses periodically, especially their coupling connections.
  • Replace hoses that show signs of imminent failure. Most manufacturers recommend hoses to be replaced every 3-5 years.
  • Install water detection sensors under sinks, dishwashers, ice makers, laundry washing machines and other appliances.

To Keep Roofs from Leaking

  • Conduct routine inspection and maintenance
  • Repair all conditions that affect the viability of the roof
  • Unclog roof drains and gutters
  • Safely remove excess snow and ice from the roof
Read More

Water is invasive and there are some things even the very best insurance coverage can’t replace. When it comes to water, the best protection is risk prevention and it’s more critical than ever. 55% of property claims in the MJ Sorority program are due to water-related issues, from burst water pipes to sewer and drain backups. Given the age of many of our properties, these occurrences are not unexpected. For more information on how and why to install leak protection systems, including a 5% premium credit, please refer to our paper on leak protection.

Therefore, proactive risk prevention measures are paramount, especially in the face of these challenges. Adopting technological solutions can greatly enhance a chapter house’s water protection system. Here are four key types of technology solutions that can be employed:

  1. Smart Leak Detectors / Sensors: These devices serve as the frontline defense against water damage by detecting moisture and leaks throughout the property. Strategically placed sensors can promptly alert housing corporations and property managers via mobile notifications upon detecting any signs of leakage.
  2. Smart Water Monitors: By monitoring water flow within the chapter house, these devices can identify abnormal patterns indicative of leaks. They can be integrated with plumbing systems to provide real-time alerts in case of leaks, and some models offer insights into water usage for efficient conservation.
  3. Smart Water Shut-Off Valves: These valves provide a proactive approach to mitigating water damage by automatically shutting off the water supply in the event of a detected leak. Remote activation capabilities enable housing corporation personnel and property managers to control the valve even when away from the property.
  4. Freeze Sensors: Designed to prevent frozen pipes, these sensors detect temperature drops within the property and trigger alerts or notifications when temperatures reach critical levels, typically around 45°F (7°C).

In addition to technological solutions, implementing a comprehensive preventative maintenance program is essential. Regular inspections by professionals can identify vulnerable areas and minimize downtime, enhancing overall reliability.

Given the persistent challenges posed by water damage, the MJ Sorority Program strongly recommends the adoption of these advanced technologies. Because of the potential damage caused by water leaks in the chapter house, we have negotiated with the property insurance carrier to offer our clients who install leak detection systems with the applicable monitoring functionality a five percent credit to their property premium.

Consider using one of these best-in-class leak detection technology companies:

Other leak detection companies that we have researched include the following:

Failure to address water damage proactively may lead to increased insurance deductibles and further financial strain. As such, property managers are urged to explore and implement these solutions to safeguard their chapter houses effectively.

Read More