PSA Perspective Blog | Contact Us | (800) 677-7887 |

Risk Control

The PSA Safety consultants are devoted to your success. We use a five-step proven approach to proactively address your risks and help you control your costs. Following a comprehensive assessment of your operational exposures and gaps in existing policies, we help you develop and implement a safety management process that prevents losses and improves your company’s risk profile. We realize that it only takes a single, large loss to blemish your loss experience and hurt your credibility with insurers. Therefore, we monitor both our results and your satisfaction throughout the year to make any necessary service adjustments.

In addition, we have developed a one of a kind communication approach that sets us apart in the industry. We have found that the best outcomes are achieved when our clients directly cooperate with the insurance carriers’ safety representatives. Thus, we encourage an open line of communication while we actively coordinate with all parties to align loss reduction objectives. This approach builds and fosters stronger relationships that lead to smoother service, often lower costs and better risk management programs.

The PSA Safety experts have over 25 years of experience in custom designing safety management processes. Our goal is to prevent employee injuries, protect your properties, minimize business interruption, prevent fleet collisions, and protect you from liability claims. With our methods, resources and expertise our clients achieve significant results – to date we have helped save millions of dollars and prevent numerous injuries.

Our Risk Control team stays abreast of new developments in the safety profession by monitoring the marketplace for the latest technologies and best-practices, especially regarding engineering controls for risk exposures, which are constantly evolving. In addition to maintaining professional designations current, our specialists attend and participate in industry events and maintain relationships with a wide range of vendors.

Resources

VIDEO:

Distracted Driving Awareness

DD

VIDEO:

Space Heater Video

Safety Steve2

GUIDE:

Portable Space Heater in the Workplace

space heater cover.jpg

VIDEO:
Strategies for Managing OSHA Inspections and Reducing Citation Risks      

shutterstock_56171851

VIDEO:

Compliance Strategies for OSHA’s NEW Regulations

Slide1

VIDEO:
Preventing Heat Illness

Doc1

GUIDE:
Heat Illness Prevention

Heat illness cover.2016.small

Areas of Risk Management

Recent Blog Posts

Aug
10th
Game of Stones: Examining the Foundational Elements of Effective Negotiation

According to Mark Jankowski, founder of Amplified Learning, effective negotiation requires three things: attitude, tools, and skills. “You can have any one, or even two of those things, but if you don’t put them all together, you won’t be effective,” he said at a recent PSA Partnership Event, “Game of Stones.” Where did he first […]

Aug
3rd
Don’t let interview bias and other missteps lead to a bad hire

When you are recruiting for an open position at your company, you want to hire someone who will succeed in the role. But that’s not always what actually happens. Often, interviewers are drawn to the people they relate to or simply like the most, rather than the candidates who are the most qualified. While that […]

Jul
27th
HIPAA and the Cloud (Benefit Minute)

Cloud computing allows convenient on-demand network access to a shared pool of computing resources (such as networks, servers, storage and applications) that can be rapidly supplied and used with minimal management effort or service provider interaction.   The computing resources are pooled to serve multiple customers and can be scaled to meet changes in demand. 

Jul
20th
A Snapshot of Today’s Most Prevalent Cyber Threats for the Non-Technical Executive, Part 2

In a recent blog post, we shared two prevalent cyber risks that your organization should be aware of — phishing and malware. Of course, those aren’t the only two threats you face when using technology or handling electronic data. This blog post provides an overview of two additional cyber threats to help you build a […]