Quantcast
Channel: Tech Insurance Small Business Center - Risk ManagementTech Insurance Small Business Center0.0000000.000000
Browsing all 226 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

What Flappy Birds Can Teach You about Mobile Device Security

As part of our ongoing examination of new cyber threats, this blog has focused on mobile device vulnerability. We’ve highlighted growing mobile threats in "The Mobile Future & Why You'll Need...

View Article


Image may be NSFW.
Clik here to view.

End of XP Support from Microsoft Could Affect Retailers

According to a report by NetworkWorld, most point-of-sale systems rely on a scaled-down version of Windows XP, which means retailers could be in trouble when Microsoft stops supporting the OS this...

View Article


Image may be NSFW.
Clik here to view.

Proposed Bill Would Mandate Smartphone Kill Switches to Fight Data Breaches

Four senators have proposed a bill that would require smartphone makers to include a "kill switch" to allow consumers to shut off phones and lock them after they're stolen. According to CNET, The...

View Article

Image may be NSFW.
Clik here to view.

How to Talk Apps to Clients

Business News Daily raises an important point for mobile app developers: your clients may want a "mobile presence,” but have no idea what that means.Indeed, all IT professionals face this fundamental...

View Article

Image may be NSFW.
Clik here to view.

Is It Time to Go Looking for Data Breaches?

Stop me if you've heard this one: a major U.S. retailer was hit with a massive data breach. It sounds familiar because it is. But this time, we're not talking about Target. We're actually talking about...

View Article


Image may be NSFW.
Clik here to view.

Make Your Clients Safer: A Lesson in Email

According to a PressTV report, a recent study by HALOCK Security Labs revealed that email security problems are surprisingly common in the financial industry. More than 70 percent of mortgage lenders...

View Article

Image may be NSFW.
Clik here to view.

Tech Firms Announce They’re Doing Risky Business

The Wall Street Journal's MarketWatch reported this month on an incredible discrepancy between tech firms and other industries. Tech vendors and IT companies see their work as risky and susceptible to...

View Article

Image may be NSFW.
Clik here to view.

Clients Care about Cyber Security All of a Sudden? Hooray! Here’s How to...

Since the major data breach at Target, everyone and their mother has been talking about data breaches, which means your clients will probably have more questions about their own cyber security. They'll...

View Article


Image may be NSFW.
Clik here to view.

Recommendations for IT Professionals Consulting on iOS Security

In the early 2000s, Apple was charming consumers with iPods and iMacs, but most of the business world still relied on Microsoft’s Windows operating system and favored non-Apple devices. When smart...

View Article


Image may be NSFW.
Clik here to view.

What the Target CIO’s Resignation Reveals about Business Psychology

The Huffington Post reports that Target Corporation's Chief Information Officer, Beth Jacob, has resigned from her position as the company looks to regroup after the largest data breach in U.S....

View Article

Image may be NSFW.
Clik here to view.

The Million-Dollar Client Conversation

Wouldn't it be great if there were a simple way to reduce the likelihood and cost of a data breach? Well, there is. Simply having a conversation can fix many of the misconceptions employees and clients...

View Article

Image may be NSFW.
Clik here to view.

The Next Generation of Business Data Breach: IP Theft

What is IP theft? It's the stealing of intellectual property, designs, patents, code, and other intangible assets. IT theft is becoming more and more common and costly – and even small IT firms can end...

View Article

Image may be NSFW.
Clik here to view.

Study: Only 9% of Companies Feel Safe from Insider Data Threats

When talking about data security, it's easy to think only of outside threats (such as hackers and malware) and forget that many of the biggest dangers to data come from within an organization. Insider...

View Article


Image may be NSFW.
Clik here to view.

What Flappy Birds Can Teach You about Mobile Device Security

As part of our ongoing examination of new cyber threats, this blog has focused on mobile device vulnerability. We’ve highlighted growing mobile threats in "The Mobile Future & Why You'll Need...

View Article

Image may be NSFW.
Clik here to view.

End of XP Support from Microsoft Could Affect Retailers

According to a report by NetworkWorld, most point-of-sale systems rely on a scaled-down version of Windows XP, which means retailers could be in trouble when Microsoft stops supporting the OS this...

View Article


Image may be NSFW.
Clik here to view.

The Next Generation of Business Data Breach: IP Theft

What is IP theft? It's the stealing of intellectual property, designs, patents, code, and other intangible assets. IT theft is becoming more and more common and costly – and even small IT firms can end...

View Article

Image may be NSFW.
Clik here to view.

Study: Only 9% of Companies Feel Safe from Insider Data Threats

When talking about data security, it's easy to think only of outside threats (such as hackers and malware) and forget that many of the biggest dangers to data come from within an organization. Insider...

View Article


Image may be NSFW.
Clik here to view.

What Flappy Birds Can Teach You about Mobile Device Security

As part of our ongoing examination of new cyber threats, this blog has focused on mobile device vulnerability. We’ve highlighted growing mobile threats in "The Mobile Future & Why You'll Need...

View Article

Image may be NSFW.
Clik here to view.

End of XP Support from Microsoft Could Affect Retailers

According to a report by NetworkWorld, most point-of-sale systems rely on a scaled-down version of Windows XP, which means retailers could be in trouble when Microsoft stops supporting the OS this...

View Article

Image may be NSFW.
Clik here to view.

The Next Generation of Business Data Breach: IP Theft

What is IP theft? It's the stealing of intellectual property, designs, patents, code, and other intangible assets. IT theft is becoming more and more common and costly – and even small IT firms can end...

View Article
Browsing all 226 articles
Browse latest View live