Over 35 years in the business, We are here to help!
Call (800) 554-0098 or Email

Archive for March 2015

Highway Agency Probe Sought in Connection With Guardrail Safety

Six U.S. senators asked for an investigation of the Federal Highway Administration’s monitoring of roadside safety devices, including a common and allegedly defective guardrail system. The request on Tuesday is the latest in a series of actions stemming from scrutiny … Source: Claims Journal

Read More

Extreme Weather Hits U.S. Hard: Munich Re

Over the past years, persistent extreme weather conditions have triggered severe natural catastrophes and caused losses in the billions. There is a growing number of scientific studies that suggest an increase in quasi-stationary weather patterns and their correlation with the … Source: Claims Journal

Read More

Asiana Settles Lawsuits Over Crash at San Francisco Airport

Asiana Airlines Inc. settled 72 personal injury claims in lawsuits filed over a July 2013 crash landing at San Francisco International Airport and is continuing to negotiate with other passengers. The airline announced the settlement Tuesday in a federal court … Source: Claims Journal

Read More

Identity Theft Insurance: Is it Worth It?

Anyone who isn’t in a high state of alert about safeguarding his or her identity is either in massive denial or is a fatalist. The data breach at Anthem put about 80 million consumers at risk of ID theft, states … Source: Claims Journal

Read More

Top 10 States With Most Tornado Claims: State Farm

Tornado and high winds are some of the most destructive forces of nature. While tornadoes are frequent in the Great Plains, South, and Midwest, there is no state in the country that isn’t at risk. Insurance helps policyholders to recover … Source: Claims Journal

Read More

Federal Agency Outlines Common Cyber Threats and Risk

While cybersecurity threats are constantly evolving, many cyber criminals use variations of the same methods of cyber attack. Specifics of these attacks may differ, but the nature of the attacks stay the same. Cyber criminals take advantage of a user’s … Source: Claims Journal

Read More