Quantcast
Channel: Tech Insurance Small Business Center - Risk ManagementTech Insurance Small Business Center0.0000000.000000
Browsing latest articles
Browse All 226 View Live

Image may be NSFW.
Clik here to view.

Can Kill Switches Boost Security for Your Clients?

A kill-switch-enabled mobile device allows mobile users to "brick" their phone, encrypting all its data and essentially making it useless to thieves who steal it.So are kill switches good for your...

View Article


Image may be NSFW.
Clik here to view.

Report: 70% of Last Year's Data Breaches Should Have Been Prevented

ZDNet reports that the majority of data breaches involve vulnerabilities that companies should have fixed long ago. Here's a roundup of the exploits we saw in 2014:70 percent of the top exploits had...

View Article


Image may be NSFW.
Clik here to view.

3 Real Lawsuits against Small IT Businesses

With all its start-up businesses, quirky programmers, and omitted vowels (we're looking at you, Tumblr), the tech world can seem like an innovator's playground. But much like the real playgrounds of...

View Article

Image may be NSFW.
Clik here to view.

Get to Know your E&O: 5 Things to Check for in Your Errors & Omissions...

When you purchase an IT Errors and Omissions policy, you should make sure you know…How this coverage works.What your responsibilities are.What its limits are.What your insurer will cover.While that may...

View Article

Image may be NSFW.
Clik here to view.

IT Business Owners Missing Out on Biggest Source of Stress for Employees

A GFI Software survey on the top sources of IT stress found that 28 percent of IT admins claim that management is the biggest source of their stress. Other common sources included problems with users,...

View Article


Image may be NSFW.
Clik here to view.

5 Strategies to Help Your Clients Avoid "Embattled" Status

When a company goes through a public relations disaster like a data breach, it often gets the word "embattled" next to its name in newspaper headlines. Case in point: after its embarrassing breaches,...

View Article

Image may be NSFW.
Clik here to view.

Old Is the New New in Technology Startups

We've been hearing so much about the "new" economy where companies use freelancers and independent contractors to build a flexible workforce. But as the New York Times reports, some tech companies and...

View Article

Image may be NSFW.
Clik here to view.

Hackers Admit Targeting Lax Security, Shoddily Built Applications

A funny thing happened after hacker collective Rex Mundi stole 24,000 records from Belgian loan company AFC Kredieten. The hacking group explained what they look for in a data breach victim. As The...

View Article


Image may be NSFW.
Clik here to view.

Holy Cripes! 4 in 5 Web Apps Have "Medium Security" Vulnerability

A recent Acunetix study of over 15,000 websites and 5,500 companies unveiled startling numbers. Network scans performed on over 1.9 million files revealed that…Almost four in five web applications were...

View Article


Image may be NSFW.
Clik here to view.

http://www.techinsurance.com/blog/cyber-risk/the-lack-of-a-federal-data-breac...

The National Law Review reports that two states – Connecticut and Rhode Island – have updated their data breach laws to require a more stringent breach response. Both include changes to specify a set...

View Article
Browsing latest articles
Browse All 226 View Live