Quantcast
Channel: Tech Insurance Small Business Center - Cyber SecurityTech Insurance Small Business Center0.0000000.000000
Browsing all 518 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Black to the Future: Better Security from the Next Class of Smart Phones?

In recent days, we've seen a slew of new mobile devices and apps designed to prevent data breaches. Last week's RSA conference in San Francisco provided developers, engineers, and tech companies a...

View Article


Image may be NSFW.
Clik here to view.

Is It Time to Go Looking for Data Breaches?

Stop me if you've heard this one: a major U.S. retailer was hit with a massive data breach. It sounds familiar because it is. But this time, we're not talking about Target. We're actually talking about...

View Article


Image may be NSFW.
Clik here to view.

Make Your Clients Safer: A Lesson in Email

According to a PressTV report, a recent study by HALOCK Security Labs revealed that email security problems are surprisingly common in the financial industry. More than 70 percent of mortgage lenders...

View Article

Image may be NSFW.
Clik here to view.

Tech Firms Announce They’re Doing Risky Business

The Wall Street Journal's MarketWatch reported this month on an incredible discrepancy between tech firms and other industries. Tech vendors and IT companies see their work as risky and susceptible to...

View Article

Image may be NSFW.
Clik here to view.

Recommendations for IT Professionals Consulting on iOS Security

In the early 2000s, Apple was charming consumers with iPods and iMacs, but most of the business world still relied on Microsoft’s Windows operating system and favored non-Apple devices. When smart...

View Article


Image may be NSFW.
Clik here to view.

Help Your Clients Understand the Risks from Third-Party Contractors

Your clients might use third-party vendors to outsource their payroll, HR, IT infrastructure, and all sorts of essential small-business functions. Unfortunately, as Business News Daily reports, this...

View Article

Image may be NSFW.
Clik here to view.

What the Target CIO’s Resignation Reveals about Business Psychology

The Huffington Post reports that Target Corporation's Chief Information Officer, Beth Jacob, has resigned from her position as the company looks to regroup after the largest data breach in U.S....

View Article

Image may be NSFW.
Clik here to view.

The Million-Dollar Client Conversation

Wouldn't it be great if there were a simple way to reduce the likelihood and cost of a data breach? Well, there is. Simply having a conversation can fix many of the misconceptions employees and clients...

View Article


Image may be NSFW.
Clik here to view.

Does the Bitcoin Model Offer the Future of Technology Insurance?

Since Mt. Gox, Poloniex, and other Bitcoin exchanges (and mobile software) were hacked, developers have increasing concerns about digital security and data breach lawsuits. Bitcoins can be a polarizing...

View Article


Image may be NSFW.
Clik here to view.

Proposed Bill Would Mandate Smartphone Kill Switches to Fight Data Breaches

Four senators have proposed a bill that would require smartphone makers to include a "kill switch" to allow consumers to shut off phones and lock them after they're stolen. According to CNET, The...

View Article

Image may be NSFW.
Clik here to view.

What IT Businesses Need to Know about the Future of Identity Theft, Data...

While you might assume that the Target data breach was caused by a coordinated and sophisticated malware attack, the truth is much more frightening.SecurityWeek.com profiles MacAfee's investigation of...

View Article

Image may be NSFW.
Clik here to view.

Does the Bitcoin Model Offer the Future of Technology Insurance?

Since Mt. Gox, Poloniex, and other Bitcoin exchanges (and mobile software) were hacked, developers have increasing concerns about digital security and data breach lawsuits. Bitcoins can be a polarizing...

View Article

Image may be NSFW.
Clik here to view.

When a Client’s Data Breach Is Good News

In a bizarre twist of fate, the company that makes Target's security software saw its stock price jump after the data breach. How did this happen?In order to understand why the Target data breach is...

View Article


Image may be NSFW.
Clik here to view.

What IT Businesses Need to Know about the Future of Identity Theft, Data...

While you might assume that the Target data breach was caused by a coordinated and sophisticated malware attack, the truth is much more frightening.SecurityWeek.com profiles MacAfee's investigation of...

View Article

Image may be NSFW.
Clik here to view.

Oscar Pistorius Trial Highlights New Revenue Source for IT Professionals

Last year, Olympic track star Oscar Pistorius allegedly shot and killed his model girlfriend, Reeva Steenkamp. The trial, which has just entered its fourth week, will now extend into April. But what...

View Article


Image may be NSFW.
Clik here to view.

Data Breach Laws? Looks like Europe Took Care of It for Us

Industry news site Net-Security.org reports that a recent bill voted on in the European Union parliament might increase the data security burden U.S. companies have, even if they don't directly do...

View Article

Image may be NSFW.
Clik here to view.

Black to the Future: Better Security from the Next Class of Smart Phones?

In recent days, we've seen a slew of new mobile devices and apps designed to prevent data breaches. Last week's RSA conference in San Francisco provided developers, engineers, and tech companies a...

View Article


Image may be NSFW.
Clik here to view.

Does the Bitcoin Model Offer the Future of Technology Insurance?

Since Mt. Gox, Poloniex, and other Bitcoin exchanges (and mobile software) were hacked, developers have increasing concerns about digital security and data breach lawsuits. Bitcoins can be a polarizing...

View Article

Image may be NSFW.
Clik here to view.

When a Client’s Data Breach Is Good News

In a bizarre twist of fate, the company that makes Target's security software saw its stock price jump after the data breach. How did this happen?In order to understand why the Target data breach is...

View Article

Image may be NSFW.
Clik here to view.

What IT Businesses Need to Know about the Future of Identity Theft, Data...

While you might assume that the Target data breach was caused by a coordinated and sophisticated malware attack, the truth is much more frightening.SecurityWeek.com profiles MacAfee's investigation of...

View Article
Browsing all 518 articles
Browse latest View live