http://www.techinsurance.com/blog/cloud-security/trouble-apps-for-security-he...
Matt Zanderigo penned an impressive article on LinkedIn highlighting the risks that an employee's apps could pose to their company's IT. The great thing about Zanderigo's article is that it shows how...
View ArticleTrouble Apps for Security: Help Clients Manage Risk
Matt Zanderigo penned an impressive article on LinkedIn highlighting the risks that an employee's apps could pose to their company's IT. The great thing about Zanderigo's article is that it shows how...
View Articlehttp://www.techinsurance.com/blog/consultant-liability/newest-java-update-hig...
When Oracle announced that it was issuing major patches for Java and several other products, the news wasn't surprising given Java's reputation as a vulnerable platform. How dangerous were the...
View ArticleNewest Java Update Highlights Professional Liability Exposure for IT Pros
When Oracle announced that it was issuing major patches for Java and several other products, the news wasn't surprising given Java's reputation as a vulnerable platform. How dangerous were the...
View Articlehttp://www.techinsurance.com/blog/cyber-security/big-opportunity-for-tech-bus...
Up to 60 percent of security software can go unused in an organization, according to Trustwave’s new report “Security on the Shelf.” Osterman Research conducted the survey of 172 IT professionals...
View ArticleBig Opportunity for IT Businesses: Talk about Underused Security Software
Up to 60 percent of security software can go unused in an organization, according to Trustwave’s new report “Security on the Shelf.” Osterman Research conducted the survey of 172 IT professionals...
View Articlehttp://www.techinsurance.com/blog/consulting/61-percent-of-companies-increase...
The Wall Street Journal reports that 61 percent of surveyed IT professionals say that their organization has increased its data security budget since the high profile data breach at Target in late...
View Article61% of Companies Increased Cyber Security Spending Last Year. What's Your Cut?
The Wall Street Journal reports that 61 percent of surveyed IT professionals say that their organization has increased its data security budget since the high profile data breach at Target in late...
View Articlehttp://www.techinsurance.com/blog/cloud-security/ponemon-endpoint-security-re...
The Ponemon Institute [PDF] surveyed 703 IT security professionals, asking them what factors have increased their data breach risks. Here are the three biggest risks factors they found:Cloud security...
View ArticlePonemon Endpoint Security Report Highlights Top 3 Ways Your Customers Put You...
The Ponemon Institute [PDF] surveyed 703 IT security professionals, asking them what factors have increased their data breach risks. Here are the three biggest risks factors they found:Cloud security...
View Articlehttp://www.techinsurance.com/blog/cyber-risk/boost-your-cyber-security-skills...
A survey of thousands of members of ISACA, an international InfoSec organization, found that there is a shortage of data security professionals despite a growing need for them. A report by Domain-b has...
View ArticleBoost Your Cyber Security Skills for Bigger Paydays
A survey of thousands of members of ISACA, an international InfoSec organization, found that there is a shortage of data security professionals despite a growing need for them. A report by Domain-b has...
View ArticleWhen Rapid Growth Is an Excuse for Poor Data Security, It's Time for a Change
In the pantheon of lame data security excuses, "we grew too fast" ranks near the top. Advisen reports that Uber is falling back on this excuse to explain some of its questionable practices in data...
View Articlehttp://www.techinsurance.com/blog/cyber-liability/facebook-and-phishing-welco...
Cyber criminals are always trying to improve their schemes to trick careless users into clicking on a link that will download malware, and one of their favorite techniques is a phishing...
View ArticleFacebook and Phishing ... Welcome to Phacebook?
Cyber criminals are always trying to improve their schemes to trick careless users into clicking on a link that will download malware, and one of their favorite techniques is a phishing...
View Articlehttp://www.techinsurance.com/blog/cyber-liability/survey-shows-88-percent-of-...
Did you know that, according to the Ponemon Institute, 88 percent of employees access sensitive data on their mobile devices, but only 20 percent have received any mobile security training? It's enough...
View ArticleSurvey: 88% of Us Laying Out the Welcome Mat for Hackers
Did you know that, according to the Ponemon Institute, 88 percent of employees access sensitive data on their mobile devices, but only 20 percent have received any mobile security training? It's enough...
View Articlehttp://www.techinsurance.com/blog/cyber-liability/3-takeaways-from-the-anthem...
With the data breach at Anthem exposing health records for 80 million people, IT departments around the country got a gut check. Despite high data security standards and increasing awareness of cyber...
View Article3 Takeaways from the Anthem Data Breach
With the data breach at Anthem exposing health records for 80 million people, IT departments around the country got a gut check. Despite high data security standards and increasing awareness of cyber...
View Articlehttp://www.techinsurance.com/blog/consulting/for-technology-safe-is-the-new-s...
PC World reports on the new app Confide that aims to offer a Snapchat-like messaging service for businesses. Unlike Snapchat, Confide was built with security in mind and offers end-to-end encryption...
View Article