Quantcast
Channel: Tech Insurance Small Business Center - Cyber SecurityTech Insurance Small Business Center0.0000000.000000
Browsing all 518 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

What Is Cyber Liability?

With the news full of stories about the NSA’s Prism project, Edward Snowden’s status a fugitive, and Chelsea Manning’s recent conviction for leaking classified documents, more and more Americans are...

View Article


Image may be NSFW.
Clik here to view.

What's Your Data Breach Notification Plan? (Part 1 of 2)

Data breach security is becoming more and more important with the growth of cloud operating systems, mobile device use, and other cloud-friendly platforms. Never before have we had more access to our...

View Article


Image may be NSFW.
Clik here to view.

Security Analysis: Cloud Computing Solutions

Infonetics Research estimates that the cloud security industry is expected to grow by almost 11 percent annually for the next two to three years as more and more users store data online and have higher...

View Article

Image may be NSFW.
Clik here to view.

The Data Breach Statistics Nobody's Talking About

If you follow IT security news, you know that during the last six months, we've seen a rash of data breaches, which has led many people to wonder: Are these isolated incidents or part of a growing...

View Article

Image may be NSFW.
Clik here to view.

Big IT Risk Management Mistakes to Avoid

For IT business owners and independent contractors in technology fields, performing IT risk assessment and risk management are often a crucial element of day-to-day operations. Even if you’re not...

View Article


Image may be NSFW.
Clik here to view.

Insurance and Technology: Protect Your Business from Security Lawsuits

Whether it's for cloud computing, mobile apps, or other new technology, business insurance can cover all kinds of cyber liabilities, including those associated with data security breaches and credit...

View Article

Image may be NSFW.
Clik here to view.

Should I Join the Cloud Security Alliance?

Staying on top of the latest threats to cloud networking is difficult. Many IT professionals turn to professional organizations like the Cloud Security Alliance, bloggers, and other sources for...

View Article

Image may be NSFW.
Clik here to view.

Cyber Liability Disaster: Tens of Millions of Adobe Users Hacked

A few weeks ago, the software giant Adobe disclosed that it had been hacked, but only recently has it revealed the full extent of the data breach: 38 million users accounts were hacked and the source...

View Article


Image may be NSFW.
Clik here to view.

Cloud Computing 101: Verifying Security in the Cloud

Salesforce, Google Apps, and Microsoft Office 365 are all examples of "Software as a Service" (commonly called SaaS), which are cloud-based programs that businesses use for any number of functions,...

View Article


Image may be NSFW.
Clik here to view.

Online Data Protection

With online data theft becoming more and more common and research group Advisen predicting that 2013 will be a turning point in cyber security [PDF], IT professionals need to review their data security...

View Article

Image may be NSFW.
Clik here to view.

Laptop Insurance: Secure and Protect Mobile Devices

Laptops, tablets, iPhones, and other portable devices present particular security and insurance concerns for IT small businesses. Their portability means they are susceptible to more risks,...

View Article

Image may be NSFW.
Clik here to view.

Data Leaks: 3 Questions Every IT Professional Needs to Know

They go by many names – data leaks, data breaches, identity thefts, cyber attacks – and just as many security measures IT professionals can put in place to protect their customer data and the financial...

View Article

Image may be NSFW.
Clik here to view.

What Are IT Professionals Legally Responsibility For? (AKA, How to Avoid 3...

There are three key legal responsibilities IT companies need to understand in order to avoid lawsuits alleging errors and omissions, negligence in data protection, or theft of intellectual...

View Article


Image may be NSFW.
Clik here to view.

Beyond E&O Insurance: Does Your IT Risk Management Plan Really Reduce Risks?

A comprehensive risk management strategy includes everything from rigorous software testing to how you choose between cloud-service vendors. It informs all your IT decisions and can play a major role...

View Article

Image may be NSFW.
Clik here to view.

Common Risks for IT Project Managers Part 2: Legal Risks

When you sign a contract to work with a client, contractor, or subcontractor, you enter into a tangled web of errors and omissions liabilities. If anything goes wrong on the project, it’s common for...

View Article


Image may be NSFW.
Clik here to view.

3 Steps to Avoid Client Crises and E&O Lawsuits on Cyber Monday

On December 2, a week from today, millions of Americans will flock to online retail sites to take advantage of the Cyber Monday deals that have become an integral part of the holiday shopping season....

View Article

Image may be NSFW.
Clik here to view.

What Google and Twitter Can Teach Us about Testing Software for Security

Any software or web app can have security vulnerabilities – just ask Google, which recently announced it had fixed a bug that allowed hackers to steal passwords from Google accounts.The bug was...

View Article


Image may be NSFW.
Clik here to view.

Your Most Powerful Anti-Data Breach Tool (Spoiler: It’s Client Education)

An IT consultant's work includes more than just installing software and setting up hardware. You may not realize it, but you are also responsible for teaching clients about cyber security. Take the...

View Article

Image may be NSFW.
Clik here to view.

3 Ways to Upgrade Your Data Security for Free

As a small-business owner, every decision you make is affected by your budget. You carefully weigh the tradeoffs before making any major purchase. With that in mind, it's nice when you can get...

View Article

Image may be NSFW.
Clik here to view.

A New Holiday Tradition: 12 Days of Risk-mas

Everyone knows the holiday song "12 days of Christmas," but reports about the prevalence of data breaches over Christmas inspired us to rewrite the classic carol and give it a contemporary twist. Read...

View Article
Browsing all 518 articles
Browse latest View live