Quantcast
Channel: Tech Insurance Small Business Center - Data BreachTech Insurance Small Business Center0.0000000.000000
Browsing all 465 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Apple & Google: We Won't Snitch

In moves that acknowledge public distrust of police and government agencies following Edward Snowden's "big reveal," two leading smartphone providers – Apple and Google – have upped their security,...

View Article


Image may be NSFW.
Clik here to view.

Antique Data Netting Canadian Man Thousands (So He Says)

This has been a huge year for data breach news – some of it was the "strange but true" variety. For example, take the recent story posted on Sophos's data security site Naked Security. Apparently, one...

View Article


Image may be NSFW.
Clik here to view.

Home Depot Data Breach Already Causing Customer Losses

The Star’s report on Home Depot's data breach shows just how quickly cyber criminals can make a profit from a cyber attack. The hackers have already used stolen data to drain bank accounts, purchase...

View Article

Image may be NSFW.
Clik here to view.

FBI Reports More Data Breaches from Disgruntled Employees

Last week, the FBI issued a cyber security warning, stating there’s been an increase in data breaches caused by disgruntled employees on or around the time they left their employer. Employees were...

View Article

Image may be NSFW.
Clik here to view.

Recommend IT Services to Clients? Know the Risks

It may seem unfathomable, but it's true: you can be sued when software, SaaS, cloud storage, or technology made by another company is hacked. Why are you liable for another company's products? It's...

View Article


Image may be NSFW.
Clik here to view.

Shellshock Sure Understands the Halloween Spirit

The Shellshock vulnerability – a bug that exposes Unix-based computers (including Mac OS X) to remote code-injection attacks – burst onto the scene just in time for Halloween. It's currently spooking...

View Article

Image may be NSFW.
Clik here to view.

In Data Security, Compliance Isn't Enough

The Telegraph reports a paradigm shift taking place among IT industry leaders: more data security consultants are realizing that merely complying with security regulations isn't enough to protect...

View Article

Image may be NSFW.
Clik here to view.

"BadUSB" Code Reminds Us All to Stay Paranoid

There's a page in many corporate IT handbooks that contains a warning about using USB devices like thumb drives on work computers. These devices could contain malware and should be quarantined.While...

View Article


Image may be NSFW.
Clik here to view.

Four States Update Data Breach Notification Laws

According to JD Supra, four states have changed their data breach notification laws in the wake of 2014's onslaught of data breaches. Here's what IT consultants need to know about new state...

View Article


Image may be NSFW.
Clik here to view.

Snapchat Leak Offers Liability Lessons for App Developers

The Washington Post reports that 13GB of "snaps" (Snapchat photos) have been leaked online on the hacker forum 4chan. A flaw in a third-party app that lets users save the otherwise temporary messages...

View Article

Image may be NSFW.
Clik here to view.

Loss, Theft of Devices Still Among the Most Common Data Breaches

The Dallas Morning News details a recent data breach in which a number of laptops with patient records were stolen from the back of city ambulances between 2011 and 2014. Do stolen computers count as...

View Article

Image may be NSFW.
Clik here to view.

The Free Security Tool Your Clients Probably Aren't Using

As IT security blogger Brian Krebs reports, last week saw a wave of critical security updates to Microsoft Windows, Java, and two Adobe programs.Your clients might not realize that by delaying an...

View Article

Image may be NSFW.
Clik here to view.

Phishing by the Dock of eBay

CIO Today reports eBay was hacked…again. Over the summer, nearly 145 million passwords were exposed, but this time hackers used a different approach to harvest data.Because eBay allows JavaScript and...

View Article


Image may be NSFW.
Clik here to view.

Beyond Passwords and PINs

From an IT perspective, a password or PIN is not a hallmark of security – it's a necessary evil. Ideally, there'd be a more secure way of encrypting and transferring data, but as it is, we're stuck...

View Article

Image may be NSFW.
Clik here to view.

Give This to Your Clients, Cut Your Cyber Exposure

One of the biggest challenges an IT consultant faces is getting clients to adopt basic data security measures that will protect their company from data breaches, accidental data leaks, and other data...

View Article


Image may be NSFW.
Clik here to view.

This Is What We Mean by "Reputational Damage"

Last week, a group of retailers known as MCX (Merchant Customer Exchange) made news when two members – CVS and Rite Aid – ditched their plan to use Apple Pay in favor of MCX's own mobile payment...

View Article

Image may be NSFW.
Clik here to view.

Should You Have a Data Breach Clause in Your Contracts?

The recent string of data breaches has shown how different industries respond to new fears about data security. For instance, in response to the growing concerns of clients, corporate lawyers are...

View Article


Image may be NSFW.
Clik here to view.

Why the 31% of Businesses without Cyber Insurance Should Scare You

Insurance Journal reports on a study that shows 60 percent of businesses think cyber risks are very high for them, but 31 percent still have no Cyber Liability Insurance whatsoever.You might be...

View Article

Image may be NSFW.
Clik here to view.

iOS Malware Accesses Devices through Third-Party App Stores

Apple earned its sterling reputation for device security in part because iOS hadn't been hacked by malware. However, the company's reputation recently took a hit when a new strain of malware called...

View Article

Image may be NSFW.
Clik here to view.

Getting Government Contracts: What Not to Do

Advisen reports that there's been a massive data breach affecting tens of thousands of government employees. When US Investigation Services – a longtime government contractor specializing in background...

View Article
Browsing all 465 articles
Browse latest View live