Quantcast
Channel: Tech Insurance Small Business Center - Cyber SecurityTech Insurance Small Business Center0.0000000.000000
Browsing all 518 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

10 things you can do to protect your tech business against cyber attacks

 Your website goes down. Is it your web host? Has it been hacked? Is it being attacked? Is my customer data safe? These are just a few questions that you need to ask yourself when your business has...

View Article


Image may be NSFW.
Clik here to view.

Third-Party Vs. First-Party Cyber Risk Insurance: Protect Your IT Firm Right

As you put together a risk management plan for your IT or technology business, you’ll no doubt find that Cyber Risk Insurance (also known as Cyber Liability Insurance and Data Breach Insurance) is an...

View Article


Image may be NSFW.
Clik here to view.

8 Reasons Web Design / Graphic Design Professionals Should Have Insurance

 As a Web design or graphic designers, you publish high quality designs on a schedule and budget to keep your clients happy - Word of mouth goes a long way, especially in website design. Sometimes the...

View Article

Image may be NSFW.
Clik here to view.

Samurai Tech Firms Self-Destruct to Protect Client Information

Late last week, the New York Times reported that two small email providers that offered encrypted communications options to their clients chose to shut down and destroy their servers rather than...

View Article

Image may be NSFW.
Clik here to view.

A Security Flaw in Google Chrome Can Expose All Your Clients' Passwords:...

This week, there was a lot of buzz over the news that simply by typing in a certain address into your Google Chrome browser, a user could see all their stored passwords.  Here’s a review of the story,...

View Article


Image may be NSFW.
Clik here to view.

$1.2 Million HITECH Fine Highlights Risks for IT Contractors Working with...

HealthcareITNews.com reports that Affinity Health Plan, a New York-based managed care provider, faces a Health and Human Services (HHS) fine of more than $1.2 million connected to a breach of patient...

View Article

Image may be NSFW.
Clik here to view.

Data Security Remains Top Concern about Cloud Computing Options

“Cloud Computing: Key Trends and Future Effects,” a study recently published by IDG Enterprise, highlights that, though cloud hosting and computing programs (including IaaS and SaaS) are growing in...

View Article

Image may be NSFW.
Clik here to view.

Build a Better Acceptable Use Policy: 3 Key Elements

Any organization that offers members access to the Internet or an intranet (including universities, schools, government entities, and businesses) needs an acceptable use policy (AUP) to outline the...

View Article


Image may be NSFW.
Clik here to view.

Get Your Gadgets Ready for Summer

If you’re like most owners of IT and tech businesses, there’s a good chance that you or your employees rely on mobile gadgets for certain work-related activities, whether those include sending emails...

View Article


Image may be NSFW.
Clik here to view.

Use a Coworking Space? Make Sure You Know the Risks

In recent years, coworking – the practice of freelancers and small-business owners working in communal spaces designed for that purpose – has risen precipitously in popularity. A survey of independent...

View Article

Image may be NSFW.
Clik here to view.

10 things you can do to protect your tech business against cyber attacks

 Your website goes down. Is it your web host? Has it been hacked? Is it being attacked? Is my customer data safe? These are just a few questions that you need to ask yourself when your business has...

View Article

Image may be NSFW.
Clik here to view.

Third-Party Vs. First-Party Cyber Risk Insurance: Protect Your IT Firm Right

As you put together a risk management plan for your IT or technology business, you’ll no doubt find that Cyber Risk Insurance (also known as Cyber Liability Insurance and Data Breach Insurance) is an...

View Article

Image may be NSFW.
Clik here to view.

8 Reasons Web Design / Graphic Design Professionals Should Have Insurance

 As a Web design or graphic designers, you publish high quality designs on a schedule and budget to keep your clients happy - Word of mouth goes a long way, especially in website design. Sometimes the...

View Article


Image may be NSFW.
Clik here to view.

Samurai Tech Firms Self-Destruct to Protect Client Information

Late last week, the New York Times reported that two small email providers that offered encrypted communications options to their clients chose to shut down and destroy their servers rather than...

View Article

Image may be NSFW.
Clik here to view.

A Security Flaw in Google Chrome Can Expose All Your Clients' Passwords:...

This week, there was a lot of buzz over the news that simply by typing in a certain address into your Google Chrome browser, a user could see all their stored passwords.  Here’s a review of the story,...

View Article


Image may be NSFW.
Clik here to view.

$1.2 Million HITECH Fine Highlights Risks for IT Contractors Working with...

HealthcareITNews.com reports that Affinity Health Plan, a New York-based managed care provider, faces a Health and Human Services (HHS) fine of more than $1.2 million connected to a breach of patient...

View Article

Image may be NSFW.
Clik here to view.

Data Security Remains Top Concern about Cloud Computing Options

“Cloud Computing: Key Trends and Future Effects,” a study recently published by IDG Enterprise, highlights that, though cloud hosting and computing programs (including IaaS and SaaS) are growing in...

View Article


Image may be NSFW.
Clik here to view.

Build a Better Acceptable Use Policy: 3 Key Elements

Any organization that offers members access to the Internet or an intranet (including universities, schools, government entities, and businesses) needs an acceptable use policy (AUP) to outline the...

View Article

Image may be NSFW.
Clik here to view.

HITECH: The Strictest Data Protection Law

In the age of big data, data protection laws are among the most important pieces of regulation for IT companies and independent consultants who work in technology fields. This month marks a major...

View Article

Image may be NSFW.
Clik here to view.

What Is the Real Cost of a Data Breach?

The cost of a data breach will show up directly and indirectly in your business's bottom line. While hackers may steal money directly from your business, did you know that much of the actual cost of...

View Article
Browsing all 518 articles
Browse latest View live