When Do I Need to Call My Technology Insurance Company?
If you own a small technology company and you’ve invested in business insurance to protect you from the various threats you face, you’re well on your way to keeping your assets safe and your practice...
View ArticleWhen Do I Need a Certificate of Liability Insurance?
So you’ve decided to purchase liability insurance for your tech business. Congrats! Having business insurance coverage will benefit you in three major ways:It will protect your assets in case anything...
View ArticleDeath and Taxes… And Data Breaches?
Once upon a time, the only things that were sure were death and taxes. But as more and more top-tier companies (including Apple, the New York Times, LinkedIn, and Zappos) announce that they’ve been...
View ArticleDoes Your Errors and Omissions Insurance Cover THAT?
Errors and Omissions Insurance is a key business protection for most owners of technology companies. But no two Errors and Omissions policies are exactly alike, and choosing one with insufficient...
View ArticleAre BYOD Benefits Worth the Costs?
A new survey by CompTIA (the Computer Technology Industry Association) finds that more than 60 percent of companies have approved bring-your-own-device (BYOD) policies at the office. Arguments in...
View ArticleFree Legal Contract Samples for IT Firms: NDA, Privacy Policy, Website Terms...
As any owner of an IT business can attest, the legalities of running a tech firm can get complicated. Between contracts, licenses, terms of use documents, privacy policies, contractor agreements, and...
View Article5 Most Common Errors & Omissions Claims for Technology Firms
As a small-business owner in the technology sector, you've got more tasks than available time, so it’s easy to put off non-essential tasks like staying abreast of the latest trends in Errors &...
View Article7 Things You Can Do To Protect Your Business Against Employee Theft or...
Employee theft & Employee Dishonesty is something that every small business should be aware of. Things that your employees do may negatively affect your revenue, or cause losses due to theft of...
View ArticleThird-Party Vs. First-Party Cyber Risk Insurance: Protect Your IT Firm Right
As you put together a risk management plan for your IT or technology business, you’ll no doubt find that Cyber Risk Insurance (also known as Cyber Liability Insurance and Data Breach Insurance) is an...
View ArticleHow Cyber Risk Insurance Can Save Your Business – Or Sink It
Major data security breaches can be disastrous for companies of all sizes. For smaller tech companies in particular, a significant breach can become a catastrophe that permanently dooms the business....
View ArticleHow a Calendar and an Email Can Save You Thousands of Dollars
Did you ever notice that if you add an “s” to the end of “deadlines,” it becomes “deadliness”? Similarly, if you take even a day or two longer to complete a client project, you could face a devastating...
View ArticleErrors & Omissions Insurance: Protect Your Hardest-to-Manage Reputational...
A study recently conducted by insurance company ACE European Group found that more than four-fifths of businesses interviewed (81 percent) cited reputational risks as their most difficult to manage....
View ArticleWhy Even the Savviest Geeks Aren’t Immune to Hacking
As an IT contractor or business owner, you’re probably used to knowing a lot more about technology than most people in your life. After all, that’s why you’re able to make a living: most of your...
View Article$1.2 Million HITECH Fine Highlights Risks for IT Contractors Working with...
HealthcareITNews.com reports that Affinity Health Plan, a New York-based managed care provider, faces a Health and Human Services (HHS) fine of more than $1.2 million connected to a breach of patient...
View ArticleSurvey: Most IT Privacy Policy Templates Woefully Insufficient
A survey published this month by DataGuidance, a global provider of data compliance resources, shows a dismal state of IT privacy policies for online companies. In fact, the survey found that 23...
View ArticleHow a Calendar and an Email Can Save You Thousands of Dollars
Did you ever notice that if you add an “s” to the end of “deadlines,” it becomes “deadliness”? Similarly, if you take even a day or two longer to complete a client project, you could face a devastating...
View ArticleWhat Is the Real Cost of a Data Breach?
The cost of a data breach will show up directly and indirectly in your business's bottom line. While hackers may steal money directly from your business, did you know that much of the actual cost of...
View ArticleWhat's Your Data Breach Notification Plan? (Part 1 of 2)
Data breach security is becoming more and more important with the growth of cloud operating systems, mobile device use, and other cloud-friendly platforms. Never before have we had more access to our...
View ArticleData Security Laws Computer Consultants Need to Know
Over the last few years, laws have evolved to cover changing concerns about digital privacy, but there is still a lot of confusion among computer consultants regarding their responsibilities for data...
View ArticleBig IT Risk Management Mistakes to Avoid
For IT business owners and independent contractors in technology fields, performing IT risk assessment and risk management are often a crucial element of day-to-day operations. Even if you’re not...
View Article