show episodes
 
DHIA exists to help our customers and prospective customers find appropriate solutions for their business insurance needs. We created this podcast to provide an audio version of our informational resources. We deliver insightful information on Professional Liability Insurance, discuss business insurance solutions, and unpack the phases of running a business. Sign up for our email reminders on new episodes: https://share.hsforms.com/1oNwbKQW8SieD0oIeAMY1Hg34l7a
  continue reading
 
The Expert Podcast brings you firsthand narratives from experts across diverse industries, including private investigators, general contractors and builders, insurance agencies, vehicle specialists, lawyers, and many others.
  continue reading
 
Each Gatehouse Chambers Podcast episode gives an informal view of important legal issues impacting individuals as well as companies and other legal entities. They will be of interest particularly to legal practitioners, law students and those interested in joining the legal profession and also the general public. The Gatehouse Chambers Podcast series concentrates on topics arising from Chambers' key practice areas which are: commercial dispute resolution (including not only litigation in cou ...
  continue reading
 
Loading …
show series
 
In business, especially in the ever-evolving legal space, communication is an invaluable tool that has distinguished itself as the master key to success. Effective communication requires an understanding of various elements and quality communication requires deeper skills that can be enhanced. In this episode we discuss tone, body language, active …
  continue reading
 
In this episode, we delve into Social Engineering. We discuss the tactics of attack cybercriminals use and outline defensive best practices to implement in your law firm. While this episode focuses on Social Engineering, we also go over other common cyber threats law firms should be aware of and what should be included in cybersecurity training. Mo…
  continue reading
 
In today's digital age, the rise of cybercrime fuels the dreams and ambitions of cybercriminals. If you aren't actively defending your data and protecting your business with cyber insurance, you could be supporting their dreams. In this episode, we explore the costs and benefits of Cyber Liability Insurance. We'll discuss the differences between st…
  continue reading
 
According to IBM's 2024 Cost of a Data Breach report*, the global average cost of a data breach is at $4.88M, a 10% increase from last year. Many attorneys hear about these large losses and think they're immune. The reality is that law firms store sensitive information that is lucrative to cybercriminals. In this episode, we discuss the differences…
  continue reading
 
Overview: We provide an update on the Montana LLC loophole scam, highlighting recent enforcement actions and government responses to this evasion scheme. Background: The Montana LLC loophole involves forming an LLC in Montana to avoid state-specific car title requirements, sales taxes, or inspections. Montana's minimal requirements for inspections …
  continue reading
 
Introduction to Business Traffic: Traffic is the lifeblood of any business, whether it's showroom traffic, foot traffic to your location, or website traffic. Even with a 100% closing ratio, having no traffic means 100% of zero is still zero. Importance of Traffic: To boost sales, you need traffic. Increasing traffic means you don’t need to focus as…
  continue reading
 
Cyber Security Risk Overview: Ransomware is on track for its highest grossing year ever, with the average ransom payment rising significantly. Current Statistics: Median ransom payment in 2023: $200,000. Median ransom payment in 2024: $1.5 million. Total ransomware payments in 2024: $75 million, compared to $37.5 million in 2023. Trends in Ransomwa…
  continue reading
 
Description: Clean Technica has published an insightful article on purchasing used electric vehicles (EVs). They address whether it's wise to buy a used EV and provide valuable advice for potential buyers. Key Takeaways: Range: Look for an EV that had a minimum of 250 miles of range when it was new. This ensures the vehicle was designed with seriou…
  continue reading
 
Introduction One of the most common terms in our car title division is "abandoned vehicle." Clients often use this term when they've acquired a vehicle without a title and want to call it abandoned to obtain a title. Common Misconception People mistakenly believe that if a vehicle is abandoned, they can claim it as their own through a "Finders Keep…
  continue reading
 
Introduction: Recent developments regarding the titling and registration of Japanese mini trucks and cars. Discussion based on an article from ARS Technica, a highly respected automotive resource. Key Points: State Actions: Massachusetts joins other states like Alabama and Arkansas in banning these vehicles due to safety concerns. Some states allow…
  continue reading
 
Is Artificial Intelligence competent to give you good advice? The big question: Should you rely on AI, or do you still need human consultation? Many companies and individuals are debating the use of AI for providing advice. Microsoft's Warning: According to a press release from Microsoft, one of the largest AI providers, AI services should not be t…
  continue reading
 
Episode Summary: In this episode, we explore the growing issue of "zombie loans" and liens—old debts or judgments that resurface long after they were thought to be resolved. Learn how to address these issues to prevent future problems and ensure that your records accurately reflect the status of your loans. Key Points Covered: Introduction to Zombi…
  continue reading
 
Introduction: Discuss the influence of artificial intelligence (AI) on the cyber attack and cyber liability landscape. Highlight that the article reveals AI's dual role: aiding both hackers and insurance companies. AI and Cyber Attacks: AI is making it easier for hackers to execute millions of attacks. Hackers benefit from AI by improving their att…
  continue reading
 
Think you're protected? You might be surprised. Even after taking precautions, you could still find yourself facing a lawsuit. But why? In this episode, we break it down: Who owns the data when you use a third-party payment processor? Who is liable for a data breach involving third-party services? What about attorneys accepting credit card payments…
  continue reading
 
Certified and Licensed Vehicle Title Research: We are a certified and licensed vehicle title research company with over 20 years of experience in the industry. Member of EART: We are proud members of EART, an organization of large companies working to modernize vehicle titles and transition them to digital formats. Current State of Vehicle Titles: …
  continue reading
 
Introduction: Hello, this is Dave at Car Titles Lately. Lately, we've been receiving more requests for lien releases on vehicles from a lender called Yendo. About Yendo: Yendo is an innovative lending institution. They offer a line of credit tied to your vehicle, similar to a credit card. They hold the title of your car and provide you with a credi…
  continue reading
 
Overview: Common challenges with vehicle title paperwork and services offered. Key Points: Misconception about Paperwork: Many people think the hardest part is just filling out forms. The real challenge often lies in locating the correct forms and determining which ones to use. Importance of Process: It’s more than just filling in blanks; it involv…
  continue reading
 
Introduction Common questions about obtaining vehicle titles often involve using mechanics liens, storage liens, or declaring a vehicle abandoned. Many of these ideas stem from questionable online advice, so let's clarify the legal processes involved. Understanding Abandoned Vehicles and Mechanics Liens Abandoned Vehicles In most states, claiming a…
  continue reading
 
Episode Show Notes / Description: Can You Afford a Home? Many people believe they can't afford to buy a home and have to continue renting. However, a recent survey revealed that 8 million renters could have bought a house with 30% of their income or less if they understood the math behind it. Misconceptions About Homeownership: Many people think ho…
  continue reading
 
Overview: Settling an estate can be challenging, whether it's due to death, conservatorship, or executorship. Issues often arise when managing and distributing assets, especially when dealing with older family members or long-term care situations. Key Points: Estate Management: Assets need to be distributed according to a will, trust, or intestate …
  continue reading
 
Importance of Cybersecurity for All Businesses: Even small and medium companies need robust cybersecurity measures. High-profile hacks (e.g., CDK attack on car dealerships, AT&T breach) highlight the risks. Daily, hundreds or thousands of smaller cyber attacks target small businesses. Impact of Cyber Attacks on Small Businesses: Cyber attacks can d…
  continue reading
 
Introduction to Addictive Intelligence: We’ve explored the risks of AI in employment and industry, but today, we're delving into a more subtle threat—addictive intelligence. This concept involves AI being used to manipulate our engagement with various platforms, from social media and news sites to print advertising. Understanding Addictive Intellig…
  continue reading
 
Overview: Discover crucial updates in the personal auto insurance industry. No matter your state, car type, or coverage, these changes may impact how you insure and maintain your vehicle. Key Points: Parts Backlog Impact: Even minor repairs, like replacing an underpan, can face long delays (e.g., 4-week wait times). Rental Car Coverage Limits: Insu…
  continue reading
 
Intro We've covered this topic in some of our previous videos, but our involvement with the EAR coalition, which includes major companies like DocuSign, CarMax, and Carvana, is finally showing results. California DMV has digitized 42 million car titles on the blockchain, moving vehicle titling towards modernization. This significant development cou…
  continue reading
 
In this episode, we are discussing cybersecurity in your email inbox. Email plays a critical role in our lives, which makes it an attractive target for cybercriminals. Understanding the desire for email access and the tactics used to get in is paramount. Underestimating cybercriminals by thinking your email information isn't captivating is fallacio…
  continue reading
 
Understanding OSINT for Bank Account Searches Learn how open-source intelligence (OSINT) operates in the context of bank account searches. Unlike direct searches of banking records, which are private, OSINT identifies references to bank accounts from public sources, such as wire transfers, insurance payments, and direct deposits. Indirect Search fo…
  continue reading
 
Exporting Vehicles for Profit: Discover why some high-end vehicles, like Land Rovers and Mercedes, are bought in the U.S. and exported to countries like China and India, where these models aren’t sold. Wealthy buyers in these countries often pay a premium. Dealership Caution: Learn why dealerships are wary of selling vehicles that might be exported…
  continue reading
 
Exciting News in the Vehicle Title Industry: More states are adopting electronic title transfers, marking a significant shift from traditional paperwork. As founding members of the eART Coalition, we're excited to see more companies like DocuSign, CarMax, and Carvana pushing for modernization. New Developments: Michigan has introduced online vehicl…
  continue reading
 
Overview: Learn how you can earn money by discovering and reporting fraud. The US Department of Justice has launched a new trial program offering millions in rewards for tips on various types of fraud, including Ponzi schemes and bribery. Our Background: We have previously been a vendor and authorized agent for the DOJ, providing expert witness tes…
  continue reading
 
Episode Show Notes / Description: Warning about escrow fraud and verifying your escrow payments. Story of a Silicon Valley executive losing $400,000 to a scammer during a home purchase. Scammers hack into the email systems of real estate agents, home inspectors, mortgage companies, and title companies. They monitor transactions over the 30 to 45-da…
  continue reading
 
The leading cyber threat remains human error. A user's inadvertent actions create openings for cybercriminals to breach networks and gain unauthorized access to data. So, today, we are discussing how these errors happen, the tactics cybercriminals use to trick users, and some best practices for implementing and mitigating risk. Listen to our Season…
  continue reading
 
Introduction Discussing the importance of treating cyber security with the same seriousness as aviation and transportation safety. Highlighting a recent article from Defense One about having an investigative board for cyber attacks, similar to how we respond to airplane crashes. Key Points The need for active network monitoring and response protoco…
  continue reading
 
Introduction When preparing a lien release request package, it's essential to include a "letter of non-interest." What is a Letter of Non-Interest? A letter of non-interest is an alternate document used when a lien holder cannot sign a lien release. It indicates that the lien holder no longer has any interest in the vehicle. Why Use a Letter of Non…
  continue reading
 
Overview: Ever wondered how online scams operate and who’s behind them? This episode delves into the disturbing reality of the scam industry. We explore a recent Wall Street Journal article exposing the inner workings of these scams, revealing a shocking truth: the scammers themselves are often victims of severe abuse. Key Points: Scam Mechanisms: …
  continue reading
 
Current Car Market Drama: Jalopnik reports three million cars sitting on dealer lots—the highest in four years. The situation appears to be worsening compared to pre-pandemic levels. Automakers are struggling to move cars. Local Impact: Are dealerships in your area experiencing a backlog of cars? Have you noticed any changes in how dealerships are …
  continue reading
 
Summary: You can run a VIN (Vehicle Identification Number) online, but it likely won't provide all the information you need. Many believe vehicle records are accessible with a quick online search. However, these records are protected under federal law, particularly 18 US Code 2725. Complete vehicle information can only be obtained by authorized rec…
  continue reading
 
Common Concern: How to search for a beneficial trust or will when a family member passes away. Why It Matters: You may be entitled to assets such as bank accounts, real estate, vehicles, corporate assets, or other beneficiary items. Potential Issues: Suspicion of improper asset diversion by other family members for their own benefit. Key Steps: Ide…
  continue reading
 
Misconceptions: Online VIN checks (e.g., Carfax, VIN Che) are often only about 40% accurate. These online tools might not catch critical issues like liens, stolen status, or title limitations. Importance of Accuracy: For a 100% accurate VIN check, it's essential to perform checks in person. Convenience of online checks comes at the cost of potentia…
  continue reading
 
Good News & Bad News from the World of Cyber Attacks The Bad News: According to Reuters and the insurance industry, 75% of companies are prone to cyber attacks. Recent incidents like the AT&T breach, the CDK hack for car dealerships, and attacks on smaller companies highlight the growing risk. Hackers are becoming more relentless, sending out thous…
  continue reading
 
Key Points: Repair Frequency: According to Battery Technology Newspaper, electric vehicles (EVs) require repairs three times more often than gasoline vehicles. Internal Combustion Engine vs. EVs: Gasoline vehicles have been refined over 100 years, benefiting from extensive experience and engineering advancements. EV technology is relatively new, wi…
  continue reading
 
Today, we are taking a deep dive into ransomware attacks. What they are, how long they've been around, and proactive measures you can take to protect your law firm from this cyber threat. Ransomware attacks have been around for decades, starting with a floppy disk in 1989. Evolving and creatively attacking businesses and everyday users to encrypt s…
  continue reading
 
Why You Should Get a Cash Offer for Your Vehicle Regularly: Even if you're not planning to sell your vehicle, it's beneficial to get a cash offer 3-4 times a year. Places to get cash offers: Kelly Blue Book (KBB) TrueCar CarGurus CarMax Process: Enter your VIN number, ZIP code, mileage, and receive a bona fide cash offer. Benefits of Getting a Cash…
  continue reading
 
In this episode, we explore a compelling question: Are some news stories being written not for human consumption but for training artificial intelligence? Key Points Covered: News for AI Training: Is there a possibility that certain news stories are crafted to train AI systems like ChatGPT, rather than inform human readers? AI's Learning Process: H…
  continue reading
 
How the Scam Works: When buying a house, you need to transfer funds to a title or escrow company. The title company holds the funds and the deed, ensuring a secure exchange between buyer and seller. Scammers hack into emails related to the transaction, monitoring communication between buyers, sellers, and agents. At the right moment, they send a fa…
  continue reading
 
What is a Zombie Mortgage? A zombie mortgage is a loan placed on a property many years ago (e.g., 15-20 years). It often arises from a mortgage that was foreclosed, charged off, renegotiated, or adjusted. The problem occurs when a lien release is never filed in the property records, even if the mortgage was paid off or cleared. Impact on Borrowers …
  continue reading
 
Introduction Exploring why hiring an attorney can be challenging. Comparing hiring an attorney to hiring other service providers, like a roofing company. Why Attorneys Are Selective Attorneys differ from other professionals because they cannot guarantee a successful outcome. Law firms are cautious about taking cases with uncertain outcomes to avoid…
  continue reading
 
Introduction: Discussion on the significant increase in cyber attacks and ransomware. Overview of the rapidly growing cyber risk for companies. Key Highlights: 500% Surge in Ransomware Losses: Recent cyber security industry report shows a 500% increase in ransomware payments. The average ransom payment has skyrocketed from $400,000 to $2 million. E…
  continue reading
 
Topic: The recent cyber attack on CDK Global, a major provider of technical platforms for automotive dealerships. Case Study: This attack serves as a significant case study in understanding how cyber attacks impact businesses and the responses from clients, third parties, and insurance companies. Impact: The attack affected 15,000 car dealerships. …
  continue reading
 
Introduction: One of the most common questions our sales staff receives is about obtaining a title for an abandoned vehicle. Many callers believe that simply calling a vehicle abandoned will help them get a title, but this is not the case. What Constitutes an Abandoned Vehicle: An abandoned vehicle is one that has been discarded and not claimed by …
  continue reading
 
Introduction: Overview of the current state of lumber prices. Introduction of Dave Pelligrinelli, licensed building contractor and general contractor. Current Lumber Price Trends: Discussion on the recent crash in lumber prices despite the peak building season. Comparison to previous spikes and their predictions. Factors Contributing to the Price D…
  continue reading
 
Loading …

Quick Reference Guide