News-to-Use

U.S.-Only Access and Enhanced Protection Against Suspicious Activity

Protecting employee data and maintaining compliance with regulatory requirements are core priorities at BAS. As part of our ongoing commitment to platform security, ...
READ MORE

Avoiding Shared Logins in HR and Benefits Administration

In HR and benefits administration, system access is often shared informally to save time or simplify workflows. While this may seem convenient, shared logins create ...
READ MORE

What Counts as Protected Health Information (PHI) in Benefits ...

Employers that offer health-related benefits often handle sensitive employee information, but not all data is treated the same under privacy rules. Understanding what ...
READ MORE

Best Practices for Safeguarding Personal and Health Data

Employers routinely collect and manage sensitive information as part of administering employee benefit programs. Enrollment records, dependent information, payroll ...
READ MORE

Strengthening Account Security with Multi-Factor Authentication

Protecting employee and benefits data requires more than a strong password. As cyber threats continue to evolve, layered security measures are essential to reduce the ...
READ MORE

Phishing Isn’t Just Email Anymore

Most people think of phishing as suspicious emails asking you to click a link. While email phishing still exists, attackers now use many different communication channels ...
READ MORE

Why Printing Payroll and HR Documents Creates Unnecessary Risk

In many organizations, payroll and HR teams still rely on printed reports for review, reconciliation, or record keeping. While printing may feel familiar or convenient, ...
READ MORE

Spotting Benefits-Related Scams

Benefits administration has become a favorite target for scammers. Open enrollment, COBRA notices, insurance verifications, and payroll changes all involve sensitive ...
READ MORE

Phishing Risks Tied to W-2 and Tax Season Requests

Tax season is a peak time for phishing attacks, and HR and payroll teams are frequent targets. Scammers know that W-2 forms contain highly sensitive information and that ...
READ MORE

Avoiding Accidental Data Exposure When Sharing Files Internally

Sharing files internally is part of everyday work, but it is also one of the most common ways sensitive information is accidentally exposed. Employee records, benefits ...
READ MORE