What Is Cyber Liability?
With the news full of stories about the NSA’s Prism project, Edward Snowden’s status a fugitive, and Chelsea Manning’s recent conviction for leaking classified documents, more and more Americans are...
View ArticleWhat's Your Data Breach Notification Plan? (Part 1 of 2)
Data breach security is becoming more and more important with the growth of cloud operating systems, mobile device use, and other cloud-friendly platforms. Never before have we had more access to our...
View ArticleSecurity Analysis: Cloud Computing Solutions
Infonetics Research estimates that the cloud security industry is expected to grow by almost 11 percent annually for the next two to three years as more and more users store data online and have higher...
View ArticleThe Data Breach Statistics Nobody's Talking About
If you follow IT security news, you know that during the last six months, we've seen a rash of data breaches, which has led many people to wonder: Are these isolated incidents or part of a growing...
View ArticleBig IT Risk Management Mistakes to Avoid
For IT business owners and independent contractors in technology fields, performing IT risk assessment and risk management are often a crucial element of day-to-day operations. Even if you’re not...
View ArticleInsurance and Technology: Protect Your Business from Security Lawsuits
Whether it's for cloud computing, mobile apps, or other new technology, business insurance can cover all kinds of cyber liabilities, including those associated with data security breaches and credit...
View ArticleShould I Join the Cloud Security Alliance?
Staying on top of the latest threats to cloud networking is difficult. Many IT professionals turn to professional organizations like the Cloud Security Alliance, bloggers, and other sources for...
View ArticleCyber Liability Disaster: Tens of Millions of Adobe Users Hacked
A few weeks ago, the software giant Adobe disclosed that it had been hacked, but only recently has it revealed the full extent of the data breach: 38 million users accounts were hacked and the source...
View ArticleCloud Computing 101: Verifying Security in the Cloud
Salesforce, Google Apps, and Microsoft Office 365 are all examples of "Software as a Service" (commonly called SaaS), which are cloud-based programs that businesses use for any number of functions,...
View ArticleOnline Data Protection
With online data theft becoming more and more common and research group Advisen predicting that 2013 will be a turning point in cyber security [PDF], IT professionals need to review their data security...
View ArticleLaptop Insurance: Secure and Protect Mobile Devices
Laptops, tablets, iPhones, and other portable devices present particular security and insurance concerns for IT small businesses. Their portability means they are susceptible to more risks,...
View ArticleData Leaks: 3 Questions Every IT Professional Needs to Know
They go by many names – data leaks, data breaches, identity thefts, cyber attacks – and just as many security measures IT professionals can put in place to protect their customer data and the financial...
View ArticleWhat Are IT Professionals Legally Responsibility For? (AKA, How to Avoid 3...
There are three key legal responsibilities IT companies need to understand in order to avoid lawsuits alleging errors and omissions, negligence in data protection, or theft of intellectual...
View ArticleBeyond E&O Insurance: Does Your IT Risk Management Plan Really Reduce Risks?
A comprehensive risk management strategy includes everything from rigorous software testing to how you choose between cloud-service vendors. It informs all your IT decisions and can play a major role...
View ArticleCommon Risks for IT Project Managers Part 2: Legal Risks
When you sign a contract to work with a client, contractor, or subcontractor, you enter into a tangled web of errors and omissions liabilities. If anything goes wrong on the project, it’s common for...
View Article3 Steps to Avoid Client Crises and E&O Lawsuits on Cyber Monday
On December 2, a week from today, millions of Americans will flock to online retail sites to take advantage of the Cyber Monday deals that have become an integral part of the holiday shopping season....
View ArticleWhat Google and Twitter Can Teach Us about Testing Software for Security
Any software or web app can have security vulnerabilities – just ask Google, which recently announced it had fixed a bug that allowed hackers to steal passwords from Google accounts.The bug was...
View ArticleYour Most Powerful Anti-Data Breach Tool (Spoiler: It’s Client Education)
An IT consultant's work includes more than just installing software and setting up hardware. You may not realize it, but you are also responsible for teaching clients about cyber security. Take the...
View Article3 Ways to Upgrade Your Data Security for Free
As a small-business owner, every decision you make is affected by your budget. You carefully weigh the tradeoffs before making any major purchase. With that in mind, it's nice when you can get...
View ArticleA New Holiday Tradition: 12 Days of Risk-mas
Everyone knows the holiday song "12 days of Christmas," but reports about the prevalence of data breaches over Christmas inspired us to rewrite the classic carol and give it a contemporary twist. Read...
View Article