Can Kill Switches Boost Security for Your Clients?
A kill-switch-enabled mobile device allows mobile users to "brick" their phone, encrypting all its data and essentially making it useless to thieves who steal it.So are kill switches good for your...
View ArticleReport: 70% of Last Year's Data Breaches Should Have Been Prevented
ZDNet reports that the majority of data breaches involve vulnerabilities that companies should have fixed long ago. Here's a roundup of the exploits we saw in 2014:70 percent of the top exploits had...
View Article3 Real Lawsuits against Small IT Businesses
With all its start-up businesses, quirky programmers, and omitted vowels (we're looking at you, Tumblr), the tech world can seem like an innovator's playground. But much like the real playgrounds of...
View ArticleGet to Know your E&O: 5 Things to Check for in Your Errors & Omissions...
When you purchase an IT Errors and Omissions policy, you should make sure you know…How this coverage works.What your responsibilities are.What its limits are.What your insurer will cover.While that may...
View ArticleIT Business Owners Missing Out on Biggest Source of Stress for Employees
A GFI Software survey on the top sources of IT stress found that 28 percent of IT admins claim that management is the biggest source of their stress. Other common sources included problems with users,...
View Article5 Strategies to Help Your Clients Avoid "Embattled" Status
When a company goes through a public relations disaster like a data breach, it often gets the word "embattled" next to its name in newspaper headlines. Case in point: after its embarrassing breaches,...
View ArticleOld Is the New New in Technology Startups
We've been hearing so much about the "new" economy where companies use freelancers and independent contractors to build a flexible workforce. But as the New York Times reports, some tech companies and...
View ArticleHackers Admit Targeting Lax Security, Shoddily Built Applications
A funny thing happened after hacker collective Rex Mundi stole 24,000 records from Belgian loan company AFC Kredieten. The hacking group explained what they look for in a data breach victim. As The...
View ArticleHoly Cripes! 4 in 5 Web Apps Have "Medium Security" Vulnerability
A recent Acunetix study of over 15,000 websites and 5,500 companies unveiled startling numbers. Network scans performed on over 1.9 million files revealed that…Almost four in five web applications were...
View Articlehttp://www.techinsurance.com/blog/cyber-risk/the-lack-of-a-federal-data-breac...
The National Law Review reports that two states – Connecticut and Rhode Island – have updated their data breach laws to require a more stringent breach response. Both include changes to specify a set...
View Article