The Million-Dollar Client Conversation
Wouldn't it be great if there were a simple way to reduce the likelihood and cost of a data breach? Well, there is. Simply having a conversation can fix many of the misconceptions employees and clients...
View ArticleDoes the Bitcoin Model Offer the Future of Technology Insurance?
Since Mt. Gox, Poloniex, and other Bitcoin exchanges (and mobile software) were hacked, developers have increasing concerns about digital security and data breach lawsuits. Bitcoins can be a polarizing...
View ArticleWhen a Client’s Data Breach Is Good News
In a bizarre twist of fate, the company that makes Target's security software saw its stock price jump after the data breach. How did this happen?In order to understand why the Target data breach is...
View Article$3 Million Settlement Paves the Way for Non-Identity-Theft Data Breach Awards
Computer World reports that a federal court in Florida just issued a game-changing verdict about data breaches. The court decided that companies are liable to pay damages to all customers whose data is...
View ArticleGmail Just Got Safer (But You Could Still Be Sued)
According to the corporate law magazine InsideCouncil, Google has increased its Gmail security standards in order to ease customer concern and provide a more secure email platform to companies that...
View ArticleYour Clients Want Mobile Payments? Here’s What to Tell Them
What do fast food companies Wendy's and Burger King and the fashion store Express all have in common? They've recently announced they will be accepting mobile payments.This is part of growing trend to...
View ArticleWhat Happens if I Don’t Update Windows XP?
As an IT professional, you've probably heard the news that Microsoft will no longer be supporting Windows XP, but what do you do about clients who are still using this old Windows operating...
View ArticleHow You Should Deal with Heartbleed
In a jaw-dropping report on PCMagazine published less than a week ago, security analysts at Google and Codenomicon revealed that there is a major bug (aka the “Heartbleed” bug) in OpenSSL, which is a...
View ArticleWhat IT Businesses Need to Know about the Future of Identity Theft, Data...
While you might assume that the Target data breach was caused by a coordinated and sophisticated malware attack, the truth is much more frightening.SecurityWeek.com profiles MacAfee's investigation of...
View ArticleOscar Pistorius Trial Highlights New Revenue Source for IT Professionals
Last year, Olympic track star Oscar Pistorius allegedly shot and killed his model girlfriend, Reeva Steenkamp. The trial, which has just entered its fourth week, will now extend into April. But what...
View ArticleData Breach Laws? Looks like Europe Took Care of It for Us
Industry news site Net-Security.org reports that a recent bill voted on in the European Union parliament might increase the data security burden U.S. companies have, even if they don't directly do...
View Article$3 Million Settlement Paves the Way for Non-Identity-Theft Data Breach Awards
Computer World reports that a federal court in Florida just issued a game-changing verdict about data breaches. The court decided that companies are liable to pay damages to all customers whose data is...
View ArticleData Breach vs. Identity Theft: Help Your Clients Understand the Difference
What is the difference between a data breach and identity theft? In the media, many people toss around these terms willy-nilly. They are connected, of course, but understanding the difference is...
View ArticleCourts Slowly Build Tech Case Law: App Thieves Punished
Political news site The Hill reports good news for mobile app developers: the Justice Department has officially convicted its first mobile app pirates. These criminals set up app piracy sites called...
View ArticleSurvey: 28% of U.S. Companies Have No Mobile Strategy. Make Them Your Clients
Broadband and telecom news site Telecompetitor reports on a new survey that says more than a quarter of companies lag behind the times and don't have a mobile marketing strategy. This news means...
View ArticleThe Next Generation of Business Data Breach: IP Theft
What is IP theft? It's the stealing of intellectual property, designs, patents, code, and other intangible assets. IT theft is becoming more and more common and costly – and even small IT firms can end...
View ArticleSurvey Shows Muggles Still Don’t Get Data Breaches
People outside of the tech industry get more than a little confused when you talk about data breaches, identity theft, and pretty much any of the technical aspects of data security. Unfortunately, this...
View ArticleThe Most Heartwarming Data Breach Story You'll Read All Year
USA Today reports the story of a data breach so easy a kid could do it…literally. A five-year-old named Kristoffer Von Hassel figured out a way to hack into his dad's Xbox account in order to play...
View ArticleHelp Your Clients Understand the Risks from Third-Party Contractors
Your clients might use third-party vendors to outsource their payroll, HR, IT infrastructure, and all sorts of essential small-business functions. Unfortunately, as Business News Daily reports, this...
View ArticleWhat the Target CIO’s Resignation Reveals about Business Psychology
The Huffington Post reports that Target Corporation's Chief Information Officer, Beth Jacob, has resigned from her position as the company looks to regroup after the largest data breach in U.S....
View Article