My primary focus as the National Leader of Small Business Client Service is to ensure your experience with Gallagher is the best it can be. I work with great people every day who are dedicated to protecting your life’s work, which I find rewarding and especially inspiring. I keep my eye on all of our procedures and am continuously looking for ways to improve our service. My team proves to me that when you get the right people, with service in their hearts, you can achieve great things, have happy clients who remain loyal.
Loyalty is very big for me, which is probably why my favorite movie of all-time is Tombstone. I enjoy Italian food and listening to Chris Stapleton, but nothing compares to the time I get to spend with my kids.
The COVID-19 pandemic has changed how accounting firms deliver their services, changes that may become permanent in 2021. Are you ready to navigate the “new normal” in accounting? If not, check out our helpful guideposts.
Bookkeeping automation has swept the accounting industry in recent years. Will your small business survive the technology wave or will it sweep you away?
By now everyone has had their fill of COVID-19 related statistics, especially small business owners. The National Federation of Independent Business reports that 92% of all small business owners have experienced some sort of negative impact from the pandemic.
As a business owner it’s important to protect your business against cybercrime. While this may seem like an overwhelming task, it doesn’t have to be. Here are some simple tips to help implement a cyber-security program for your business.
Some dentists worry about getting sued for malpractice. Then they worry some more. A better approach is to learn how malpractice litigation arises and then to adopt risk-mitigation practices.
Have you accounted for the various liability risks your accounting firm faces? If not, this article helps you get started by explaining the essential role of professional liability insurance
Learn how to protect your small business from cyber attacks, including malware, ransomware, crypto jacking, denial of service, phishing, man-in-the-middle, zero-day exploits and SQL injections.