Mega Menu

Mega menu is possible in BS5 but we will need to create a custom template layout for the navigation widget. The following is a hard-coded example.

Card Hero Template

This is the default Bootstrap 5 Hero card.

Click Here

Video Banner Header

This is an example of a video banner

Click Here

Font Awesome 6

FA6+ icons will work on all widgets.

The FMH Icon box will need a new version created because the styling is broken in Bootstrap 5 templates (this has nothing to do with FA).

FMH Icon Widget

Icons can now be used in Content blocks by pasting the HTML tags from www.fontawesome.com into the HTML editor.

Here are some new icons from Font Awesome 6

 face-awesome

 envelopes

 wheat-awn

Bootstrap Components

Code snippits from http://getbootstrap.com pasted into Content Blocks.

h1. Bootstrap heading

h2. Bootstrap heading

h3. Bootstrap heading

h4. Bootstrap heading

h5. Bootstrap heading
h6. Bootstrap heading

        

Nav Tabs

Nav Pills

Accordion

This is the first item's accordion body. It is shown by default, until the collapse plugin adds the appropriate classes that we use to style each element. These classes control the overall appearance, as well as the showing and hiding via CSS transitions. You can modify any of this with custom CSS or overriding our default variables. It's also worth noting that just about any HTML can go within the .accordion-body, though the transition does limit overflow.

This is the second item's accordion body. It is hidden by default, until the collapse plugin adds the appropriate classes that we use to style each element. These classes control the overall appearance, as well as the showing and hiding via CSS transitions. You can modify any of this with custom CSS or overriding our default variables. It's also worth noting that just about any HTML can go within the .accordion-body, though the transition does limit overflow.

This is the third item's accordion body. It is hidden by default, until the collapse plugin adds the appropriate classes that we use to style each element. These classes control the overall appearance, as well as the showing and hiding via CSS transitions. You can modify any of this with custom CSS or overriding our default variables. It's also worth noting that just about any HTML can go within the .accordion-body, though the transition does limit overflow.

Tables

# First Last Handle
1 Mark Otto @mdo
2 Jacob Thornton @fat
3 Larry the Bird @twitter

Alerts

Image Carousel

Modals

Sitefinity Widgets

Default, out of the box, Bootstrap 5 templates available for widgets.

The navigation template used above is called Horizontal.

Navigation Widget - Tabs Template

Navigation Widget - Pills Template

Breadcrumb

Card

This is an example of the Card template

Click Here
Simple Card

This is an example of the Simple Card template

Click Here

List Widget - Expandable List Template

Precision Claims FAQs

List Widget - Simple List Template

Crop Claims Reminders

  • How To Report MPCI Claims
  • MPCI Claim Reporting Deadlines
  • Appraisals
  • Production Records by Unit
  • Production Delivered to a Commercial Elevator
  • Production From Precision Farming Technology Systems
  • Production Weighed and Farm Stored
  • Authorization for Load Records, Storage Structure Marking, or Combine Monitor Records
  • Fed Production
  • Quality Adjustment
  • What is a Simplified Claim?
  • What can insureds do to expedite the claim process?

List Widget - Anchor List Template

Quality Control Review FAQ

Quality Control Review FAQ

What can an Insured do to prepare for a review?

Third party documentation (i.e. summary/settlement sheets from the elevator) is required when applicable and available. Insureds are expected to have available hard copy records that will 1) support the total production raised for the crop/county/year being reviewed and 2) that can demonstrate how production was kept separate between various units, practices and types (if applicable).

Insureds will also want make themselves available to meet with the quality control reviewer as the reviews will need to be completed before the claims can be processed.

What can Agents do to prepare for a review?

Agents can encourage their producers to begin assembling the production history documentation that will be necessary to complete the APH Review. Agents may also want to be sure all current year policy documents have been submitted to the FMH home office so that the Contract Review can be completed without delay.

How does the review process begin?

Once a claim is reported, FMH adjusters will be in contact with policyholders and/or agents. They will discern which policies will need a review and take the steps necessary to initiate these reviews. At that point FMH’s Compliance Field Specialist will oversee the review completion to ensure that all the components of the review are completed by objective and unbiased persons and according to RMA procedures.

Documents List - Documents List Template

Documents List - Documents List Template

News Widget - News List Template

News list template is the only template available by default.

Look Out for Phishing Emails

Jun 26, 2018, 15:47 by Katie Hultgren
Email has become one of the primary attack methods used by cyber attackers, called phishing. How can you protect yourself and your agency?

Email is one of the primary ways we communicate. We not only use it every day for work, but also to stay in touch with friends and family. Since so many people around the world depend on this technology, email has become one of the primary attack methods used by cyber attackers. This attack method is called phishing.

Phishing emails try to fool you into taking an action you should not take, such as clicking on a malicious link, sharing your password, or opening an infected email attachment. Attackers work hard to make these messages convincing and tap your emotional triggers, such as urgency or curiosity. They can even make the emails look like they came from someone or something you know, such as a friend or a trusted company, and may even use familiar logos within the message itself.

Protecting Yourself

In almost all cases, opening and reading an email or message is fine. For a phishing attack to work, the attacker needs to trick you into taking an action, such as clicking on a malicious link. Fortunately, there are clues that a message is an attack. Here are the most common ones:

  • A tremendous sense of urgency that demands “immediate action” before something bad happens. The attacker wants to rush you into making a mistake.
  • Pressuring you to bypass or ignore your policies or procedures at work.
  • A strong sense of curiosity or something that is too good to be true.
  • Requesting highly sensitive information, such as your credit card number, password, or any other information that a legitimate sender should already know.
  • The message says it comes from an official organization, but it has poor grammar or spelling, or uses a personal email address like @gmail.com.
  • The message comes from an official email but has a Reply-To address going to a personal email account.
  • You receive a message from someone you know, but the tone or wording just does not sound like him or her. If you are suspicious, call the sender to verify they sent it. It is easy for a cyber attacker to create a message that appears to be from a friend or coworker.

Ultimately, common sense is your best defense. If an email or message seems odd, suspicious, or too good to be true, it may be a phishing attack.

Source: SANS OUCH! Newsletter

Blog Posts Widget - Blog Posts Lists Template