10 things you can do to protect your tech business against cyber attacks
Your website goes down. Is it your web host? Has it been hacked? Is it being attacked? Is my customer data safe? These are just a few questions that you need to ask yourself when your business has...
View ArticleThird-Party Vs. First-Party Cyber Risk Insurance: Protect Your IT Firm Right
As you put together a risk management plan for your IT or technology business, you’ll no doubt find that Cyber Risk Insurance (also known as Cyber Liability Insurance and Data Breach Insurance) is an...
View Article8 Reasons Web Design / Graphic Design Professionals Should Have Insurance
As a Web design or graphic designers, you publish high quality designs on a schedule and budget to keep your clients happy - Word of mouth goes a long way, especially in website design. Sometimes the...
View ArticleFree Mobile Charging Stations: Data Breach Central?
This week, AT&T announced plans to set up free, solar-powered charging stations around the five boroughs of New York City. The project, apparently inspired by services AT&T offered following...
View ArticleHow Cyber Risk Insurance Can Save Your Business – Or Sink It
Major data security breaches can be disastrous for companies of all sizes. For smaller tech companies in particular, a significant breach can become a catastrophe that permanently dooms the business....
View ArticleWhat Cloud Computing Means for Cyber Liability
What was once floating above our heads is reachable – well, sort of…. Cloud computing has boomed over the past few years and is only continuing to grow. It saves individual companies storage space and...
View ArticleSamurai Tech Firms Self-Destruct to Protect Client Information
Late last week, the New York Times reported that two small email providers that offered encrypted communications options to their clients chose to shut down and destroy their servers rather than...
View ArticleA Security Flaw in Google Chrome Can Expose All Your Clients' Passwords:...
This week, there was a lot of buzz over the news that simply by typing in a certain address into your Google Chrome browser, a user could see all their stored passwords. Here's a review of the story in...
View Article$1.2 Million HITECH Fine Highlights Risks for IT Contractors Working with...
HealthcareITNews.com reports that Affinity Health Plan, a New York-based managed care provider, faces a Health and Human Services (HHS) fine of more than $1.2 million connected to a breach of patient...
View ArticleData Security Remains Top Concern about Cloud Computing Options
“Cloud Computing: Key Trends and Future Effects,” a study recently published by IDG Enterprise, highlights that, though cloud hosting and computing programs (including IaaS and SaaS) are growing in...
View ArticleBuild a Better Acceptable Use Policy: 3 Key Elements
Any organization that offers members access to the Internet or an intranet (including universities, schools, government entities, and businesses) needs an acceptable use policy (AUP) to outline the...
View ArticleHITECH: The Strictest Data Protection Law
In the age of big data, data protection laws are among the most important pieces of regulation for IT companies and independent consultants who work in technology fields. This month marks a major...
View ArticleWhat Is the Real Cost of a Data Breach?
The cost of a data breach will show up directly and indirectly in your business's bottom line. While hackers may steal money directly from your business, did you know that much of the actual cost of...
View ArticleWhat Is Cyber Liability?
With the news full of stories about the NSA’s Prism project, Edward Snowden’s status a fugitive, and Chelsea Manning’s recent conviction for leaking classified documents, more and more Americans are...
View ArticleTinder Security Breach Highlights E&O Exposure for IT Contractors
Have you heard of Tinder? It’s a date-finding app for young professionals (many have observed that it brings the capabilities of Grinder to a wider market). Tinder takes a new spin on the idea that...
View ArticleSecurity Analysis: Cloud Computing Solutions
Infonetics Research estimates that the cloud security industry is expected to grow by almost 11 percent annually for the next two to three years as more and more users store data online and have higher...
View ArticleThe Data Breach Statistics Nobody's Talking About
If you follow IT security news, you know that during the last six months, we've seen a rash of data breaches, which has led many people to wonder: Are these isolated incidents or part of a growing...
View ArticleBig IT Risk Management Mistakes to Avoid
For IT business owners and independent contractors in technology fields, performing IT risk assessment and risk management are often a crucial element of day-to-day operations. Even if you’re not...
View ArticleInsurance and Technology: Protect Your Business from Security Lawsuits
Whether it's for cloud computing, mobile apps, or other new technology, business insurance can cover all kinds of cyber liabilities, including those associated with data security breaches and credit...
View ArticleShould I Join the Cloud Security Alliance?
Staying on top of the latest threats to cloud networking is difficult. Many IT professionals turn to professional organizations like the Cloud Security Alliance, bloggers, and other sources for...
View Article