Winners of the Cincinnati 2013 Medical Mutual Pillar Award for Community Service

CINCINNATI, OH (Jan. 29, 2013) – Smart Business Network Inc. is pleased to announce the category winners of the 2013 Medical Mutual Pillar Award for Community Service program, presented by Smart Business and sponsored by The Eisen Agency, Duke Energy Center, Spectrum Global, and Prestige AV & Creative Services.

At an awards recognition program held at the Duke Energy Center on January 24, 2013, 14 organizations and individuals were unveiled as Pillar Award winners in five distinct categories and participated in a series of discussions about the tie between the for-profit and nonprofit worlds. This year’s winners were:

Pillar Award for Community Service
• dunnhumbyUSA
• Focus Solutions Inc.
• JANCOA
• KDM P.O.P. Solutions Group
• Messer Construction Co.
• PowerNet Global
• Systems Evolution Inc.
• The Hillman Group
• The Sheakley Group
• Union Savings Bank/Guardian Savings Bank

Medical Mutual SHARE Award
• Clark-Theders Insurance Agency Inc.

Executive Director of the Year Award
• Ellen Katz, president & CEO, The Children’s Home of Cincinnati

Nonprofit Board Executive of the Year Award
• Barbara Gould, advisory board member, Talbert House

Kent Clapp CEO Leadership Award
• Thomas Keckeis, CEO, Messer Construction

“This class of honorees, combined with this year’s group of finalists, is truly inspirational,” says Dustin S. Klein, publisher of Smart Business. “They give back individually and as organizations. They get involved in causes they care about. And the nonprofit leaders have forged meaningful relationships with the for-profit companies and their executive teams to better deliver upon their missions. All told, the Pillar Award class of 2013 truly understands how to strengthen the regional communities where we all live and work.”

The Pillar Award program was founded in 1998 and honors organizations and individuals that best demonstrate a commitment to making a difference. For information on the award winners, along with profiles of the finalists for this year’s Pillar Awards, visit www.sbnonline.com. To receive a nomination for the 2014 awards program, or to learn more about the Pillar Awards, contact Smart Business at [email protected] or (440) 250-7026.

Women: Start putting yourself first when it comes to your health

Women are notorious for putting the needs of others ahead of their own. When it comes to your health, however, that type of altruism can be dangerous.  It’s important not only to pay attention to your body in order to recognize when something isn’t right, but also to maintain a healthy lifestyle while following the recommended guidelines for preventive health screenings.  Cancer is the second leading cause of death in women. Early detection is key in treating breast, cervical, uterine and ovarian cancer.  

Follow these tips for a healthier lifestyle:

Maintain your ideal body weight. Cancer of the uterus, gallbladder, kidney, stomach, breast and colon has been associated with obesity.

Vary your daily diet. Eat in moderation a wide variety of food choices.

Eat five to nine servings of fruits and vegetables per day in at least three different colors. There are different bioactive ingredients in the pigment of fruits and vegetables that may reduce cancer risks.

Eat food that is high in dietary fiber, including whole-grain cereals, legumes and vegetables. 

Minimize your daily fat intake. Ideally, 25-30 grams of fat are enough.

Ask your doctor about risk assessment.  Find out if you are a candidate for chemoprevention of breast cancer. The FDA has approved two medications to reduce the risk of being diagnosed with breast cancer.

Get your vitamin D.  Take at least 1,000 IU of vitamin D daily.  If your levels are low, ask your doctor to recommend a dosage to meet your specific needs. 

Remember, moderation is important. Alcohol intake can increase your chance of getting breast cancer if you are over 50 and drink two or more drinks per day.

Stick to a regular exercise program (four to five times a week) or initiate regular activity such as walking.

If you smoke, STOP. If you are around someone who smokes, avoid the secondhand smoke. People who quit smoking – regardless of age – live longer than those who continue to smoke.   

Regarding preventive screenings for breast, cervical, uterine and ovarian cancer, Cleveland Clinic offers the following guidelines: 

Perform monthly breast self-exams. Most women do find breast lumps themselves. Examine your breasts each month after age 20. You will become familiar with the contours and feel of your breasts and will be more alert to changes. The best time to examine your breasts is after your menstrual cycle is finished.

Have your breasts examined by a healthcare provider at least once every three years after age 20 and every year after age 40. Clinical breast exams can detect lumps that may not be detected by mammogram.

Get a mammogram. The American Cancer Society recommends having a baseline mammogram at age 35 and a screening mammogram every year after age 40.

Have a pelvic exam – A pelvic exam allows doctors to look for signs of illness in the cervix, uterus, ovaries and vagina. Because the risk of cancer increases with age, having regular pelvic exams may help prevent certain cancers in both menopausal and postmenopausal women. Women who are or who have been sexually active should have a Pap test every 3 years after having 3 consecutive normal tests. Based on your personal health profile, your doctor can discuss with you how often you should have this test. 

Women face many of the same health concerns as men, such as heart disease and cancer, but they have unique health considerations as well. To address these needs, Cleveland Clinic’s one-day Women’s Executive Health Evaluation offers a comprehensive array of leading-edge diagnostics, treatments and lifestyle management techniques. More than a simple physical, this head-to-toe evaluation provides the knowledge and tools you need to take charge of your health. 

The Women’s Executive Health Evaluation includes a standard comprehensive physical examination, as well as mammogram and pelvic exam. Expedited access to additional Cleveland Clinic physicians and specialists is provided, if needed, and patients are also counseled by experts in nutrition, fitness and personal and executive coaching.  

This article is brought to you by Cleveland Clinic Executive Health. For more information about our Women’s Executive Health Evaluation or to schedule an appointment, please call 866.320.1385. For more information, visit clevelandclinic.org/exechealth.         

UPMC WorkPartners offers expert claims management services

  UPMC WorkPartners – which is part of UPMC, a world-renowned health system based in Pittsburgh – provides Workers’ Compensation services offering dollar-one coverage for Pennsylvania companies. 

"Since we began operations in 1997, WorkPartners has been providing expert claims management to self-insured companies across the region," said David M. Weir, President of WorkPartners. "Our Commercial Workers’ Compensation product allows us to also offer Pennsylvania’s fully-insured employers the same type of expert claims management along with our proven track record in managing workers’ compensation and overall health and productivity in the workplace.” 

Weir said health care reform is raising awareness in the employer community to not only control costs, but to find the right business partners.

“WorkPartners understands that finding the right business partner with the right expertise is a key part of creating a cost containment solution,” said Weir. “The WorkPartners’ approach is proactive — we take an active interest in your organization and can even help stop a claim before it happens. We’ll collaboratively assess current claims, identify measurable goals and objectives, and provide customized containment strategies.”

The WorkPartners’ difference is world renowned in-house resources. The staff includes risk control specialists, safety directors, claims adjustors, exercise physiologists, physical therapists, nurses, physicians, behavioral specialists, medical directors, registered dietitians, health and wellness experts, accomplished operations professionals, and IT and analytic experts.  

“We also provide ongoing review and recommendations on existing workers’ compensation panels, trend analysis, accident investigation, and training to help proactively identify areas for improvement,” said David Weir.

Last summer, WorkPartners introduced Leave Management services to help employers better manage absences related to the Family Medical Leave Act, military leave, and other employer-sponsored leaves.

This article is brought to you by UPMC WorkPartners. The WorkPartners team can provide quotes or answer questions. Please contact: 1-866-229-3507 or [email protected]. WorkPartners Insurance services are underwritten by UPMC Health Benefits, Inc. 

About UPMC WorkPartners UPMC WorkPartners, established in 1997, is part of UPMC Insurance Services Division. UPMC WorkPartners offers health and productivity solutions to high-performing companies. WorkPartners helps employers decrease cost and increase productivity with tailored, scalable, and integrated solutions, including Workers’ Compensation, disability and leave management programs, employee assistance, health and wellness programs, on-site medical services, and consulting services.

A look at cyberfraud

Recently, when high-level executives in major financial institutions and Fortune 500 companies received urgent e-mails containing subpoenas from the U.S. District Court, they clicked on a link within the e-mail to download the full subpoena. Suddenly, they had compromised company trade secrets, financial information and most other private data. Although a full subpoena appeared when they clicked on the link, keyloggers and data-mining software stormed their computers giving the crooks access to pretty much any information they wanted. This form of cybercrime, targeted to high-level executives in large businesses with deep pockets, is called whaling. It goes straight to the top, bypassing lower-level individuals, to get to the sensitive company information, and it is becoming increasingly prevalent. Cybercrooks with sophisticated knowledge of bypassing company security systems are out to grab some of the financial information that moves easily over the Internet.

 

Take the Money and Run

These scams are attempts to obtain log-on credentials, such as user IDs and passwords, to a business’s online banking system. Once this information is outside of the business, the business is open to all kinds of payments fraud. Unauthorized individuals now have access to the financial resources of the business and they are able to drain a business of its cash, and potentially access the various credit sources that a business has with the bank as well.

At one time, hackers were satisfied with the notoriety they garnered through media attention when they performed high-profile attacks on system networks. Hackers today are more subtle, quietly preying on vulnerable sites. Instead of fame, they are going for the gold –– literally. Hacking has morphed from learning computer language and systems into bypassing them to gain information that will divert people’s and business’s cash into their pockets.  In addition, these hackers are able to hack into company Web sites, where they embed a small amount of computer code, invisible to the naked eye. The code redirects those who visit the site to a malicious site that downloads harmful programs onto users’ computers without their knowledge. Often, if companies don’t see their Web sites as revenue generators, they don’t secure the site, which leaves those who visit the sites vulnerable to malicious software and keyloggers as well. 

All-Inclusive Crooks

Regardless of whom hackers target, they are trying to get personal or online banking information. They are running a business and they are in it for the money. No one is exempt from this kind of cyberfraud. Although crooks would prefer the big fish, they are not above catching everyone in their net. A relative newcomer to cyberfraud is smishing, which is the cell-phone equivalent of phishing. While phishing lures sensitive information from Internet users, smishing targets cell phone users. Text messages are sent that may say something like, “This is an automated message from your bank. Your ATM card has been suspended. To reactivate, call 866-XXX-XXXX.”  If they call the number, an automated voice message prompts callers to leave their account number and PIN, opening the door to fraud and identity theft. In other scams, a text message may announce that the recipient has won a prize and needs to call a toll-free number to verify where to send the money. The caller collects personal information such as Social Security and account numbers. Or the text message may simply be to a number that is not toll-free, and automatically creates a charge against the caller’s cell phone account. It bears repeating, not to click on links or attachments in suspicious e-mails. In fact, it’s good policy to always type the URL instead of going to a Web site through a link. Hackers can send viruses that embed in PCs, which can compromise or steal private information. 

Vigilance and Strong Authentication

Not falling prey to these cyberfrauds seems simple: Don’t be gullible and don’t respond to suspect e-mail, text messages or phone calls. But, as stated earlier, these crooks are sophisticated, and their tactics often appear to be genuine requests. So how can companies protect themselves? Never miss an opportunity to make employees aware of the latest scams and the company procedures to avoid them. Companies should run antispyware on all workstations. It is important to make sure that it is not turned off and that it is kept up-to-date.  Strong authentication and multifactor authentication are also measures that can help ensure safety. Strong authentication uses passwords, with multiple challenge questions that only the account holder would know the answer to.  The bank’s more high-risk accounts, however, often have multifactor authentication. The most common forms of online multifactor authentication work by requiring something you have and something you know, as opposed to just something you know (typically a password). The something you have is usually a piece of hardware that is difficult to duplicate. The something you know is typically a password or PIN. Multifactor authentication systems are secure because it is difficult for fraudsters to obtain both factors. A lot of attacks come through e-mail spam. I recommend keeping good antivirus software, and to update, patch and run the current versions of operating systems. If you believe your system has been compromised by suspicious e-mail, alert your bank immediately to the possibility.  

A Word to the Wise

Keeping information safe isn’t just the job of one person or entity. To help keep business and personal information out of harm’s way be sure to make use of the tools that your financial services provider has available for its online banking services. Use the dual-control features that require two or more people to initiate, approve and release an electronic transfer of funds out of the bank. Finally, make sure that your financial services provider uses authentication techniques that are appropriate to the risks associated with the Internet products and services you use.  It is critical for businesses to be a strong partner with their bank, educate employees and put in place their own policy- and technology-based controls. To review your business’s risk management processes and procedures or to learn more, contact an Associated Bank relationship manager at 312-565-5260. 

Protecting Your Business with OOBA

In addition to the strong authentication procedures that Associated Bank has in place to prevent unauthorized access to eManager+ Business Online Banking, we’ve introduced OOBA –– Out-of-Band Authentication.  OOBA adds another layer of security for customer access to high-risk services –– those that allow customers to move funds outside the bank –– within eManager+, such as Bill Pay, ACH, Wires and Company Admin. OOBA requires no additional hardware, as is required for other multi-factor authentication protocols. Instead, authentication is established by phone. This also provides a separate, secure channel in the event the primary Internet channel is compromised. For more information about OOBA, please contact an Associated Relationship Manager at 312-565-5260. 

This article brough
t to you by Associated Bank, N.A. Equal Opportunity Lender. Associated Bank, N.A. is a Member FDIC and Associated Banc-Corp.