PSA Perspective Blog | Contact Us | (800) 677-7887 |

Commercial Property

At PSA, we work to understand our clients’ unique needs, exposures and loss profile and can provide coverage to protect your business’s property, including buildings, equipment, inventory and more

At PSA, we work to understand our clients’ unique needs, exposures and loss profile and can provide coverage to protect your business property, including buildings, equipment, inventory and more. Our relationships with over 30 carriers allow us to create customized insurance programs that provide extraordinary protection at an affordable cost. We’ll ensure you have a policy that in the event of a loss will help you replace, repair, or restore damaged buildings and equipment as quickly as possible – and cover the losses suffered while your business is unable to operate.

Employee Dishonesty Guide:
What Can You Do To Reduce Your Risk?


Areas of Risk Management

Recent Blog Posts

Aug
10th
Game of Stones: Examining the Foundational Elements of Effective Negotiation

According to Mark Jankowski, founder of Amplified Learning, effective negotiation requires three things: attitude, tools, and skills. “You can have any one, or even two of those things, but if you don’t put them all together, you won’t be effective,” he said at a recent PSA Partnership Event, “Game of Stones.” Where did he first […]

Aug
3rd
Don’t let interview bias and other missteps lead to a bad hire

When you are recruiting for an open position at your company, you want to hire someone who will succeed in the role. But that’s not always what actually happens. Often, interviewers are drawn to the people they relate to or simply like the most, rather than the candidates who are the most qualified. While that […]

Jul
27th
HIPAA and the Cloud (Benefit Minute)

Cloud computing allows convenient on-demand network access to a shared pool of computing resources (such as networks, servers, storage and applications) that can be rapidly supplied and used with minimal management effort or service provider interaction.   The computing resources are pooled to serve multiple customers and can be scaled to meet changes in demand. 

Jul
20th
A Snapshot of Today’s Most Prevalent Cyber Threats for the Non-Technical Executive, Part 2

In a recent blog post, we shared two prevalent cyber risks that your organization should be aware of — phishing and malware. Of course, those aren’t the only two threats you face when using technology or handling electronic data. This blog post provides an overview of two additional cyber threats to help you build a […]