Every year, wildfires burn millions of acres of land across North America. With the severity, occurrence and cost of wildfires increasing every year, the aftermath of these catastrophes — which can include devastating impacts to soils and vegetation — is resulting in an evolving environmental disaster. In this paper, we will discuss mudslides and debris flows caused by wildfires, impacts of mudslides and debris flows on structures, and outline what can be done to control and mitigate soil erosion and other environmental issues after wildfires.
Gunslinger is a relatively common term in certain industries. Lawyers, doctors and forensic engineers or experts can all be considered a hired gun based on the circumstance. And many may be more swayed to believe the use of a hired gun when it involves a large company versus an individual. But, it’s not really that black and white. There are ways to spot one, and we will tell you how.
Before international guidelines were in place, fire and explosion investigations were typically more aligned with the art of investigation, rather than art of science. Today, through the use of guidelines, scientific methods and protocols, it is much easier for a judge to accept an investigator’s opinion and/or evidence presented if the scene was conducted using such measures, and even more so when dealing with a subrogated claim.
Cyber breach claims can be complicated and confusing, but knowing what questions you need to ask in order to streamline the process is essential to a successful claim investigation. Here is a step-by-step guide to walk you through what information should be gathered in a cyber breach-related claim.
Summer weather and heat can wreak havoc on critical electrical equipment and systems. The most common electrical claims faced by insurers in the summer can be a bit tricky and complex. We'll outline the four threats that greatly impact electrical systems: lightning, flooding, tornado/wind damage and heat and give you tips on what to look for!
Recently, one of our Practice Leaders of Digital Forensics, Matt Scott, was invited to do a podcast with Howard Panensky of Willis on the Industrial Internet of Things (IIoT). The podcast is part of a series, Timely Notice, produced by Goldberg Segalla. Read through a short summary and click the link to listen to the full discussion.
Shortly after a catastrophe, organizations begin analyzing what can be done differently when the next one inevitably comes. In dealing with thousands of losses over the last 15 years, we created a list of the Top 5 lessons learned: Helpful tips for the upcoming CAT season, to help make sure we are all as prepared as possible.
Understanding the “ins and outs” of Daubert and Frye is second nature for attorneys, but for an expert or claims professional, fully understanding these standards can be a different story. And, lack of familiarity with these standards can be problematic for experts and clients alike. Read our blog and download our latest white paper.
Lithium-ion batteries are very popular, and can generally be found in laptops, tablets and mobile phones. However, aside from the many advantages, if a lithium-ion battery fails, it could burst into flame. Read more on how these fires start, and the advantages and disadvantages of lithium-ion batteries.
You may be asking yourself, what is National Maritime Day? Sea trade has been the largest carrier of cargo in the history of the world. National Maritime Day was created by the United States Congress on May 20, 1933, to commemorate the first transatlantic steamship voyage.
With summer nearing, claims may start coming in for "popped pools." But what are the common factors that can impact a pool enough and cause it to pop, or float? And what should be considered if you are assessing a claim for damages associated with a pool that has popped? These answers and more can be found in this week's blog.
Although this is an increasingly popular cladding technique, it comes with a very real concern: flammability. EIFS has had a reputation for moisture-related issues and flammability concerns amidst it's wide-spread use. So what's to come for the future of EIFS, where is it most prevalent and what about it causes ignition?
The U.S. tax season is upon us and the last thing we need, for ourselves or our company, is to attempt to file our taxes and receive a message, “Your taxes have already been filed.” Protect yourself and your company from these types of events with our tip list for hardening security and becoming less of an easy target.
After a catastrophic property loss to business critical equipment, claim professionals and business owners alike focus on restoring productivity as quickly as possible. But to do this, it’s important to make sure you understand all the options, so let's clear the air on some common misconceptions surrounding equipment replacement, reliability, damage and repair of contaminated equipment.
Many companies often do not think of the depth of their cyber policy until it’s too late. Some businesses may be covered to a certain degree for basic business interruption and data loss through their insurer, but rarely is it a fully underwritten, comprehensive cyber policy. And, depending on the depth of the firm’s attack, finding the extent of damage or loss to their equipment and systems is imperative.
Cell phones create the opportunity to recover and review more information than one may think. And despite the increased prevalence of call detail records being used in cases both for location and user activity, many are still unaware of how valuable this information can be in litigation or investigative matters.
In many parts of the world, it’s the frozen tundra days of winter, and if you aren’t in that part of the world, lucky you! It’s during these months where you’ll find claim after claim surrounding weather-related incidents. From pipe bursts, to ice damming, to commercial and residential roof collapses, winter can be a pretty rough time for home and business owners alike. Read on for some tips on how to prevent the worst from happening!
Many of us have seen self-driving vehicles in movies, and may have thought the reality of seeing those vehicles on the road, or even driving one, was incredibly far into the future. But as the marketplace primes for a full introduction of truly autonomous vehicles, there is a real need to assess and prepare for both security and liability risks. The autonomous vehicle system will be a massive undertaking, involving millions of connections and endpoints, in the public and private space, and is not immune to being hacked.
Knowing the most common hacking tactics is the first step to prevention. Because nearly every modern business uses digital systems, hackers only need Wi-Fi to access an unsecured system. Check out our infographic to learn more about digital scams and how to protect yourself while traveling.