BYOD Moves Beyond Office to Classroom
Bring-Your-Own-Device policies (commonly called BYOD) in small technology companies are becoming more and more common, as TechInsurance mentioned earlier this year. Now, according to the New York...
View ArticleDeath and Taxes… And Data Breaches?
Once upon a time, the only things that were sure were death and taxes. But as more and more top-tier companies (including Apple, the New York Times, LinkedIn, and Zappos) announce that they’ve been...
View ArticleCyber Risk Management: the Green Choice
It’s Earth Day, which means people around the world are celebrating the planet and working to raise awareness about environmental protection and preservation. It’s easy to think of eco-consciousness as...
View ArticleGet Your Gadgets Ready for Summer
If you’re like most owners of IT and tech businesses, there’s a good chance that you or your employees rely on mobile gadgets for certain work-related activities, whether those include sending emails...
View ArticleUse a Coworking Space? Make Sure You Know the Risks
In recent years, coworking – the practice of freelancers and small-business owners working in communal spaces designed for that purpose – has risen precipitously in popularity. A survey of independent...
View Article10 things you can do to protect your tech business against cyber attacks
Your website goes down. Is it your web host? Has it been hacked? Is it being attacked? Is my customer data safe? These are just a few questions that you need to ask yourself when your business has...
View ArticleThird-Party Vs. First-Party Cyber Risk Insurance: Protect Your IT Firm Right
As you put together a risk management plan for your IT or technology business, you’ll no doubt find that Cyber Risk Insurance (also known as Cyber Liability Insurance and Data Breach Insurance) is an...
View Article8 Reasons Web Design / Graphic Design Professionals Should Have Insurance
As a Web design or graphic designers, you publish high quality designs on a schedule and budget to keep your clients happy - Word of mouth goes a long way, especially in website design. Sometimes the...
View ArticleFree Mobile Charging Stations: Data Breach Central?
This week, AT&T announced plans to set up free, solar-powered charging stations around the five boroughs of New York City. The project, apparently inspired by services AT&T offered following...
View ArticleHow Cyber Risk Insurance Can Save Your Business – Or Sink It
Major data security breaches can be disastrous for companies of all sizes. For smaller tech companies in particular, a significant breach can become a catastrophe that permanently dooms the business....
View ArticleData Security in the Cloud: Concerns for IT Firms with Legal Clients
If your IT firm counts any lawyers or law firms among its clients, you probably already know that the data security rules are stricter in legal fields. But exactly how strict are those rules? And what...
View ArticleTinder Security Breach Highlights E&O Exposure for IT Contractors
Have you heard of Tinder? It’s a date-finding app for young professionals (many have observed that it brings the capabilities of Grinder to a wider market). Tinder takes a new spin on the idea that...
View ArticleErrors & Omissions Insurance: Protect Your Hardest-to-Manage Reputational...
A study recently conducted by insurance company ACE European Group found that more than four-fifths of businesses interviewed (81 percent) cited reputational risks as their most difficult to manage....
View ArticleSamurai Tech Firms Self-Destruct to Protect Client Information
Late last week, the New York Times reported that two small email providers that offered encrypted communications options to their clients chose to shut down and destroy their servers rather than...
View ArticleA Security Flaw in Google Chrome Can Expose All Your Clients' Passwords:...
This week, there was a lot of buzz over the news that simply by typing in a certain address into your Google Chrome browser, a user could see all their stored passwords. Here’s a review of the story,...
View Article$1.2 Million HITECH Fine Highlights Risks for IT Contractors Working with...
HealthcareITNews.com reports that Affinity Health Plan, a New York-based managed care provider, faces a Health and Human Services (HHS) fine of more than $1.2 million connected to a breach of patient...
View ArticleData Security Remains Top Concern about Cloud Computing Options
“Cloud Computing: Key Trends and Future Effects,” a study recently published by IDG Enterprise, highlights that, though cloud hosting and computing programs (including IaaS and SaaS) are growing in...
View ArticleBuild a Better Acceptable Use Policy: 3 Key Elements
Any organization that offers members access to the Internet or an intranet (including universities, schools, government entities, and businesses) needs an acceptable use policy (AUP) to outline the...
View ArticleGet Your Gadgets Ready for Summer
If you’re like most owners of IT and tech businesses, there’s a good chance that you or your employees rely on mobile gadgets for certain work-related activities, whether those include sending emails...
View ArticleUse a Coworking Space? Make Sure You Know the Risks
In recent years, coworking – the practice of freelancers and small-business owners working in communal spaces designed for that purpose – has risen precipitously in popularity. A survey of independent...
View Article