Lallis and Higgins Blog


Recent Posts


Archive

Ideas for the Perfect Staycation

- Wednesday, April 30, 2025
Lallis & Higgins Insurance - Family

You didn’t think we were going to help you set up your house and leave you, did you? Don’t worry, we’re experts in the art of staycations. Here are a few ideas that will help you kick your week off in vacation style:

Have a spa day.

It might not be as glamorous as a real day at the spa, but you can still make your own home feel like a peaceful retreat. Try a face mask with cucumber slices or an Epsom salt bath.

Take a day trip.

Looking for a little adventure? Try a road trip! Hit up that little town you’ve always heard about, try a new restaurant, or visit a new park.

Read a good book.

A staycation is the perfect opportunity to dive into a good read—or several! Set up a hammock in your backyard or lay out a blanket under a tree and let yourself unwind with a good book.

Explore your city.

Use your staycation to take in the sights and sounds of your city like a tourist! Get out there and visit free museums, bookstores and that coffee shop you’ve always meant to check out.

Camp out in the backyard.

Pitch a tent, light the fire, and make some s’mores. When it’s time to call it a night, crawl into the tent and sleep under the stars. (Or you can bring the gang back inside to sleep in your comfortable beds too—we won’t judge.)

Bring the water park to you.

Who needs a water park when you can make your own? For $15, you can find a kiddie pool or splash pad for the kids. And don’t forget the water balloons. Creating your own DIY backyard water park can save you about $50 per person!

Have a movie night.

You don’t have to leave your house to catch a good flick. Rent a movie—or even better, stream one for free. This is the perfect time to tackle a marathon of trilogies or introduce your kids to iconic classics for the first time (Star Wars, anyone?). But don’t forget the snacks! Grab some popcorn and candy from the dollar store and you’ll be set. Skipping the traditional ticket and concessions at the theater like this can easily save you $15–20 a person.

Stay somewhere new.

Let’s be clear: It’s okay to stay at your house during your staycation (and it saves major money not having to pay for a hotel or bed-and-breakfast). But if you do want to switch it up, check in to a local hotel or Airbnb for a night or two. It’s amazing how getting away to a new spot in your hometown can feel so refreshing.

Take up a DIY project.

Do you have a DIY project that you haven’t been able to get to? Use this free time on your hands to tackle it! Check your local museum or art studio to see if they’re offering pottery, painting or woodworking classes.

Plan a game night.

Dust off the board games and invite your family and friends over for some fun. Need to add a new game to the rotation? Check out Act Your Wage!—the first player to become debt-free wins the game. And if that sounds a little too much like real life (like if you’re laser focused on becoming debt-free right now), just play Monopoly instead!

Watch a theater production.

We know what you’re thinking—how can I see a show if I don’t leave my house? The magic of the internet, that’s how. BroadwayHD streams a ton of Broadway shows (everything from Oklahoma! to Romeo and Juliet). And with a seven-day free trial, that’s plenty of time to watch a few things while on staycation.

Go bowling.

Heading to a bowling alley during the middle of the week or at off-peak times can be surprisingly cheap. A lot of bowling alleys even let kids bowl for free. Check out the deals your local alley has and strike up a little friendly competition.

Go out for a special meal or have it delivered.

Some people find cooking relaxing, but it’s important to give yourself a break and take some time for a special meal that you don’t have to cook. Swing by that restaurant downtown that you’ve always wanted to try, or have food delivered from your favorite burger joint.

Go canoeing.

If you live within close driving distance of a river or another body of water, get out there on a canoe or a paddleboard—maybe even a surfboard if you’re near the beach (lucky!).

Have a date night.

Even if you’re in the middle of a family staycation with two toddlers, you can still carve out time for you and your spouse to sneak in an inexpensive date. The real tricky part is going to be finding a sitter to watch the kids, but it’s doable! Ask family or friends if they wouldn’t mind babysitting for an evening so you and your spouse can have a nice dinner. You can even sweeten the deal by offering to watch their kids sometime too.

Source: ramseysolutions.com


Cloud Security Best Practices: A Step-by-Step Guide, Phase 3

- Monday, April 28, 2025
Lallis and Higgins Insurance - Cloud Security Best Practices

Phase 3: Respond to cloud security issues

As your cloud services are being accessed and used, there will be incidents requiring either automated or guided response on a regular basis, just like any other IT environment. Follow these best practices to begin your cloud security incident response practice:

Step 1: Require additional verification for high-risk access scenarios.

If a user is accessing sensitive data in a cloud service from a new device, for example, automatically require two-factor authentication to prove their identity.

Step 2: Adjust cloud access policies as new services come up.

You can’t predict every cloud service that will be accessed, but you can automatically update web access policies, such as those enforced by a secure web gateway, with information about the risk profile of a cloud service to block access or present a warning message. Accomplish this through integration of a cloud risk database with your secure web gateway or firewall.

Step 3: Remove malware from a cloud service.

It is possible for malware to compromise a shared folder that syncs automatically with a cloud storage service, replicating the malware in the cloud without user action. Scan your files in cloud storage with anti-malware to avoid ransomware or data theft attacks.

As cloud services evolve, so do the challenges and threats you face by using them. Always stay on top of cloud provider feature updates that involve security, so you can adjust your policies accordingly. Security providers will adjust their threat intelligence and machine learning models to keep up as well. In the phases and best practices above, several key technologies can be used to accomplish each step, often working in conjunction with the native security features from cloud providers.

Cloud Access Security Broker (CASB): Protects data in the cloud through data loss prevention, access control, and user behavior analytics. CASB is additionally used to monitor IaaS configurations and discover shadow IT.

Cloud Workload Protection: Discovers workloads and containers, applies malware protection, and simplifies security management across IaaS environments.

Virtual Network Security: Scans network traffic moving in between the virtual instances held in IaaS environments, along with their entry and exit points.

Source: skyhighsecurity


Cloud Security Best Practices: A Step-by-Step Guide, Phase 2

- Monday, April 21, 2025
Lallis & Higgins Insurance - Cloud Security

Phase 2: Protect your cloud

Once you understand your cloud security risk posture, you can strategically apply protection to your cloud services according to their level of risk. There are several cloud security technologies that can help you accomplish the following best practices:

Step 1: Apply data protection policies.

With your data now classified as sensitive or regulated, you can assign policies that govern what data can be stored in the cloud, quarantine or remove sensitive data found in the cloud, and coach users if they make a mistake and break one of your policies.

Step 2: Encrypt sensitive data with your own keys.

Encryption available within a cloud service will protect your data from outside parties, but the cloud service provider will still have access to your encryption keys. Instead, encrypt your data using your own keys, so you fully control access. Users can still work with the data without interruption.

Step 3: Set limitations on how data is shared.

From the moment data enters the cloud, enforce your access control policies across one or multiple services. Start with actions like setting users or groups to viewer or editor and controlling what information can be shared externally through shared links.

Step 4: Stop data from moving to unmanaged devices you don’t know about.

Cloud services provide access from anywhere with an internet connection, but access from unmanaged devices like a personal phone creates a blind spot for your security posture. Block downloads to unmanaged devices by requiring device security verification before downloading.

Step 5: Apply advanced malware protection to infrastructure-as-a-service (IaaS) such as AWS or Azure.

In IaaS environments, you’re responsible for the security of your operating systems, applications, and network traffic. Antimalware technology can be applied to the OS and virtual network to protect your infrastructure. Deploy application whitelisting and memory exploit prevention for single-purpose workloads and machine-learning based protection for general purpose workloads and file stores.

Next week we'll talk about phase 3.

Source: skyhighsecurity


Cloud Security Best Practices: A Step-by-Step Guide

- Monday, April 14, 2025
Lallis & Higgins Insurance - Cloud Security in Weymouth, Quincy, MA

Cloud services are used for multiple purposes in corporate environments, from storing data in services like Box, to accessing productivity tools through Microsoft 365, and deploying IT infrastructure in Amazon Web Services (AWS). In all these uses, cloud services allow organizations to move faster, accelerating their business with more agile technology, often at a lower cost. However, the use of any cloud service comes with the challenges and risk of data security in the cloud. Security for the data created in the cloud, sent to the cloud, and downloaded from the cloud is always the responsibility of the cloud customer. Protecting cloud data requires visibility and control. In the steps below, we’ve outlined a core set of best practices for cloud security that can guide enterprises toward a secure cloud and address cloud security issues.

Phase 1: Understand cloud usage and risk

The first phase of cloud computing security is focused on understanding your current state and assessing risk. Using cloud security solutions that allow for cloud monitoring, you can accomplish the following steps:

    Step 1: Identify sensitive or regulated data. Your largest area of risk is loss or theft of data that will result in regulatory penalties, or loss of intellectual property. Data classification engines can categorize your data so you can fully assess this risk.

    Step 2: Understand how sensitive data is being accessed and shared. Sensitive data can be held securely in the cloud, but you have to monitor who accesses it and where it goes. Assess the permissions on files and folders in your cloud environment, along with access context like user roles, user location, and device type.

    Step 3: Discover shadow IT (unknown cloud use).

    Most people do not ask their IT team before signing up for a cloud storage account or converting a PDF online. Use your web proxy, firewall, or SIEM logs to discover what cloud services are being used that you don’t know about, then run an assessment of their risk profile.

    Step 4: Audit configurations for infrastructure-as-a-service (IaaS) such as AWS or Azure.

    Your IaaS environments contain dozens of critical settings, many of which can create an exploitable weakness if misconfigured. Start by auditing your configurations for identity and access management, network configuration, and encryption.

    Step 5: Uncover malicious user behavior.

    Both careless employees and third-party attackers can exhibit behavior that indicates malicious use of cloud data. User behavior analytics (UBA) can monitor for anomalies and mitigate both internal and external data loss

Next week, we'lll go to Phase 2!

Source: skyhighsecurity


Windows Safety Week

- Tuesday, April 08, 2025

Falls from windows are more common than people might think. According to a report by SafeKids Worldwide, an average of eight children age 5 and younger die and more than 3,300 are injured each year from falling out of windows.

The Window Safety Task Force offers these tips to help protect children from accidental window falls:

  • When young children are around, keep windows closed and locked
  • When opening a window for ventilation, use those located out of a child’s reach
  • Supervise children to keep child’s play away from windows, balconies or patio doors
  • Don't place furniture near windows that young children can climb on to gain access
  • Don’t allow children to jump on beds or other furniture to help reduce potential falls
  • Don’t rely on insect screens; they are designed to keep bugs out, not to keep children in
  • Install ASTM F2090-compliant devices that limit how far a window will open, or window guards with quick-release mechanisms in case of fire or other emergency
  • Teach your child how to safely use a window to escape during an emergency, such as a fire

Take 5 Minutes to Install Window Guards


Source: nsc.org

Distracted Driving Awareness Month

- Friday, April 04, 2025
Lallis & Higgin Insurance in Weymouth, MA - Distracted Driving Awareness Month

Distracted driving is any activity that diverts attention from driving, including talking or texting on your phone, eating and drinking, talking to people in your vehicle, fiddling with the stereo, entertainment or navigation system — anything that takes your attention away from the task of safe driving.

Texting is the most alarming distraction. Sending or reading a text takes your eyes off the road for 5 seconds. At 55 mph, that's like driving the length of an entire football field with your eyes closed.

You cannot drive safely unless the task of driving has your full attention. Any non-driving activity you engage in is a potential distraction and increases your risk of crashing.

Consequences

Using a cell phone while driving creates enormous potential for deaths and injuries on U.S. roads. In 2022, 3,308 people were killed in motor vehicle crashes involving distracted drivers.

Get Involved

We can all play a part in the fight to save lives by ending distracted driving.

Teens

Teens can be the best messengers with their peers, so we encourage them to speak up when they see a friend driving while distracted, to have their friends sign a pledge to never drive distracted, to become involved in their local Students Against Destructive Decisions chapter, and to share messages on social media that remind their friends, family, and neighbors not to make the deadly choice to drive distracted.

Parents

Parents first have to lead by example — by never driving distracted — as well as have a talk with their young driver about distraction and all of the responsibilities that come with driving. Have everyone in the family sign the pledge to commit to distraction-free driving. Remind your teen driver that in states with graduated driver licensing (GDL), a violation of distracted-driving laws could mean a delayed or suspended license.

Educators and Employers

Educators and employers can play a part, too. Spread the word at your school or workplace about the dangers of distracted driving. Ask your students to commit to distraction-free driving or set a company policy on distracted driving.

Source: nhtsa.gov



Get an insurance quote &
see how much you can save.