Honest Professionals.Handcrafted Protection.

CONTACT US

Local. Loyal. Lasting.

At Mason & Mason Insurance we are committed to serving our clients with a level of personal contact and professional accountability that is increasingly rare in an age of faceless financial services firms. Whether we’re working with a builder to minimize risk or supporting a homeowner through a challenging claim, we know our success is based on investing in our clients.

Insurance Offerings

Contractor

We use our decades of experience to build your insurance program right the first time.

LEARN MORE

Business

Hospitality, non-profits, condominium associations, small business, retailers  and more.

LEARN MORE

Personal

You and your family are worthy of far more than just a policy number.

LEARN MORE

Get a Quote!

For the fastest and most accurate quote, please fill in our form below and one of our team members will be in contact with you soon.

Our Blog

The Contractor’s Checklist for Properly Hiring ...

General contractors bear a great deal of responsibility when hiring subcontractors for a job. Not only is the GC putting his or her reputation on the line by choosing a sub to perform a certain function, but they are exposing themselves to significant risk by entrusting others to bring a project to fruition. For these reasons, it is imperative that GCs mitigate their risk by requiring that each subcontractor signs a subcontractor agreement before they are hired that entails the following minimum provisions:

  • The subcontractor must carry Commercial General Liability Insurance with at least $1,000,000 per occurrence and an aggregate of no less than $2,000,000.
  • Each subcontractor must name you, the GC, as an Additional Insured on the General Liability policy on a primary and non-contributory basis for on-going and completed operations.
  • All subcontractors must carry Workers’ Compensation insurance. It is important to note that the workers’ compensation law requires you as the GC to insure workers of uninsured subs and may even make you responsible under many circumstances to insure injuries to a sole proprietor. Without a Certificate of Workers’ Compensation from each subcontractor, an insurance auditor will likely make a charge for each sub who is lacking the insurance or proof of the insurance when the payroll audit is made.
  • A Certificate of Insurance (COI) must be provided before a sub starts any work. This must be an original COI with an original agent signature (no copies). Without an original COI, the subcontractor will not be paid.
  • The subcontractor agreement should include a hold harmless or indemnity clause. This states that the GC is not responsible for any claims, damages, losses, and expenses (including legal fees) arising out of the subcontractor’s work, as well as the work of the subcontractor’s subcontractors.

For more than three decades we’ve developed the industry know-how and trade organization relationships that are critical to proper insurance policy design. We understand the subtle nuances of construction insurance and how each detail affects the way you, as a contractor, do business. We’re happy to put that knowledge to work. Whether you are a general contractor and need guidance on how much insurance to require or you are a subcontractor who needs assistance making sure you are meeting the obligations of your contract, Mason & Mason is here for you.

The information provided above is for informational purposes only.  As an insurance agency and not a member of the Massachusetts or New Hampshire bar associations, we strongly suggest you consult an attorney before making any decisions on the wording and/or use of legal contract documents.


Rear End Collisions—How to Avoid Hitting ...

Perhaps the most preventable and inexcusable accident is caused by backing into a parked auto or a fixed object. You should never commit this type of error as a professional driver.

To keep from hitting someone in the rear:

  • Begin braking early—for reserve braking power as you near final stopping point.
  • Pay strict attention—Don’t daydream or look away from the road for more than one second. Keep in mind that a vehicle can move a considerable distance in one second. For example, at 40 mph, a vehicle travels 60 feet in one second.
  • Use good vision habits—Don’t crowd up so close that you can’t see ahead. Look through rear window area of vehicle ahead to see the road ahead. Look over the top of car ahead when on hills.
  • Look for things that could cause the driver ahead to stop—The other driver’s problems become your problems only a second or two later.
  • On icy roads, look for a swerve path to the right—Many times on ice you can steer around a vehicle that you could not stop for. Avoid swerving to the left—you’re inviting a head-on. Better yet, you won’t need a swerve path at all if you increase your following distance to allow for road conditions and weather.
  • Be patient—The hurry habit is the beginning of many a rear end mash-up. Stay Alert For Danger Signals Some signals to watch for:
  • Brake lights on the vehicle ahead— Get your foot off the gas pedal and to the brake pressure point quickly.
  • Diminishing distance between your vehicle and the vehicle ahead— You’re in a collision course. The vehicle on the road ahead is slowing down or it may be standing. Relate vehicles ahead to fixed objects out to the side.
  • Problems in adjacent lanes— Stay alert for brake lights and slow downs in adjacent lanes. Expect quick swerves into your lane by other drivers.

The recommendation(s), advice and contents of this material are provided for informational purposes only and do not purport to address every possible legal obligation, hazard, code violation, loss potential or exception to good practice. The Hanover Insurance Company and its affiliates and subsidiaries (“The Hanover”) specifically disclaim any warranty or representation that acceptance of  any recommendations or advice  contained herein will make any premises, property or operation safe or in compliance with any law or regulation. Under no circumstances should this material or your acceptance of any recommendations or advice contained herein be construed as establishing the existence or availability of any insurance coverage with The Hanover. By providing this information to you, The Hanover does not assume (and specifically disclaims) any duty, undertaking or responsibility to you. The decision to accept or implement any recommendation(s) or advice contained in this material must be made by you.
LC 11-389


A business guide to preventing, detecting, ...

Phishing attacks are becoming increasingly prevalent: 2016 saw more phishing attacks than any previous year on record according to the Anti-Phishing Working Group. At the same time, there is a growing level of sophistication of cybercriminals. This handout is available from the Department of Homeland Security’s Stop.Think.Connect campaign to help the American public be safe and more secure online.

Phishing attacks use email or malicious websites to infect your machine with malware and viruses to collect personal and financial information. Cybercriminals attempt to lure users to click on a link or open an attachment that infects their computer with viruses or malware, creating vulnerability to attacks. Phishing emails may appear to come from a real financial institution, e-commerce site, government agency, or any other service, business, or individual. The email may also request personal information like account numbers, passwords, or Social Security numbers. When users respond with the information or click on a link, attackers use it to access their accounts.

Phishing examples

The following messages, from the Federal Trade Commission’s OnGuardOnline website, are examples of what attackers may email or text when phishing for sensitive information:

  • “We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity.”
  • “During our regular verification of accounts, we could not verify your information. Please click here to update and verify your information.”
  • “Our records indicate that your account was overcharged. You must call us within 7 days to receive your refund.”

To see examples of actual phishing emails, and steps to take if you believe you received a phishing email, please visit www.irs.gov/uac/report-phishing.

Tips to prevent phishing

When in doubt, throw it out. Links in email and online posts are often the way cybercriminals compromise your computer. If it looks suspicious, even if you know the source, it is best to delete or, if appropriate, mark it as “junk email.” You may want to check with management and follow any company guidelines in place to protect against phishing attempts. You can also contact the company directly (via phone) to find out if the email is legitimate. Other tips to prevent phishing attacks include:

  • Think before you act: Be wary of communications that implore you to act immediately, offer something that sounds too good to be true, or ask for personal information.
  • Use stronger authentication: Always opt to enable stronger authentication when available, especially for accounts with sensitive information including your email or bank accounts. A stronger authentication helps verify a user has authorized access to an online account. For example, it could be a one-time PIN texted to a mobile device, providing an added layer of security beyond the password and username. Visit www.lockdownyourlogin.com for more information on stronger authentication.
  • Make passwords long and strong: Combine capital and lowercase letters with numbers and symbols to create a more secure password.
  • Install and update anti-virus software. Make sure all of your computers are equipped with regularly updated antivirus software, firewalls, email filters, and anti-spyware.
  • Be wary of hyperlinks: Avoid clicking on hyperlinks in emails. Type the full website address directly into the address bar instead. If you choose to click on a link, ensure it is authentic before clicking on it. You can check a hyperlinked word or URL by hovering the cursor over it to reveal the full address.
  • Advise consumers who have fallen victim to a phishing attack to change their passwords and report the attack to reportphishing@antiphishing.org. Also, forward phishing emails to the company, bank, or organization impersonated in the email.
  • Report phishing attacks to the Internet Crime Complaint Center, a partnership between the Federal Bureau of Investigation (FBI), the National White Collar Crime Center (NW3C), and the Bureau of Justice Assistance (BJA), at http://www.ic3.gov/default.aspx.

To learn more about Hanover Risk Solutions, visit hanoverrisksolutions.com


Copyright ©2019, ISO Services Properties, Inc.

The recommendation(s), advice and contents of this material are provided for informational purposes only and do not purport to address every possible legal obligation, hazard, code violation, loss potential or exception to good practice. The Hanover Insurance Company and its affiliates and subsidiaries (“The Hanover”) specifically disclaim any warranty or representation that acceptance of any recommendations or advice contained herein will make any premises, property or operation safe or in compliance with any law or regulation. Under no circumstances should this material or your acceptance of any recommendations or advice contained herein be construed as establishing the existence or availability of any insurance coverage with The Hanover. By providing this information to you, The Hanover does not assume (and specifically disclaims) any duty, undertaking or responsibility to you. The decision to accept or implement any recommendation(s) or advice contained in this material must be made by you.

LC FEB 2019 10-185H
171-0914 (1/19)