http://www.techinsurance.com/blog/cyber-risk/in-2015-tell-your-clients-they-n...
The Boy Scouts' famous motto – be prepared– could just as easily apply to IT consultants and their clients. Studies consistently show that having a cyber security policy is the one of the most...
View ArticleIn 2015, Tell Your Clients They Need a Cyber Security Policy
The Boy Scouts' famous motto – be prepared– could just as easily apply to IT consultants and their clients. Studies consistently show that having a cyber security policy is the one of the most...
View Articlehttp://www.techinsurance.com/blog/general-liability-insurance/3-hidden-gems-i...
A General Liability Insurance policy is the Swiss army knife of insurance. It's full of different coverages that can be useful in many situations.Remember the first time you looked at a pocketknife?...
View Article3 Hidden Gems in Your General Liability Insurance Policy
A General Liability Insurance policy is the Swiss army knife of insurance. It's full of different coverages that can be useful in many situations.Remember the first time you looked at a pocketknife?...
View Articlehttp://www.techinsurance.com/blog/data-breach/california-data-breach-laws-sha...
California has a reputation as one of the most progressive states in the country, and that certainly applies to California data breach laws. It was no surprise when the state recently enacted a series...
View ArticleCA Data Breach Laws Shake Up IT Contractor Liabilities
California has a reputation as one of the most progressive states in the country, and that certainly applies to California data breach laws. It was no surprise when the state recently enacted a series...
View Articlehttp://www.techinsurance.com/blog/consultant-liability/newest-java-update-hig...
When Oracle announced that it was issuing major patches for Java and several other products, the news wasn't surprising given Java's reputation as a vulnerable platform. How dangerous were the...
View ArticleNewest Java Update Highlights Professional Liability Exposure for IT Pros
When Oracle announced that it was issuing major patches for Java and several other products, the news wasn't surprising given Java's reputation as a vulnerable platform. How dangerous were the...
View Articlehttp://www.techinsurance.com/blog/cyber-security/big-opportunity-for-tech-bus...
Up to 60 percent of security software can go unused in an organization, according to Trustwave’s new report “Security on the Shelf.” Osterman Research conducted the survey of 172 IT professionals...
View ArticleBig Opportunity for IT Businesses: Talk about Underused Security Software
Up to 60 percent of security software can go unused in an organization, according to Trustwave’s new report “Security on the Shelf.” Osterman Research conducted the survey of 172 IT professionals...
View Articlehttp://www.techinsurance.com/blog/cloud-security/ponemon-endpoint-security-re...
The Ponemon Institute [PDF] surveyed 703 IT security professionals, asking them what factors have increased their data breach risks. Here are the three biggest risks factors they found:Cloud security...
View ArticlePonemon Endpoint Security Report Highlights Top 3 Ways Your Customers Put You...
The Ponemon Institute [PDF] surveyed 703 IT security professionals, asking them what factors have increased their data breach risks. Here are the three biggest risks factors they found:Cloud security...
View ArticleWhen Rapid Growth Is an Excuse for Poor Data Security, It's Time for a Change
In the pantheon of lame data security excuses, "we grew too fast" ranks near the top. Advisen reports that Uber is falling back on this excuse to explain some of its questionable practices in data...
View Articlehttp://www.techinsurance.com/blog/cyber-liability/facebook-and-phishing-welco...
Cyber criminals are always trying to improve their schemes to trick careless users into clicking on a link that will download malware, and one of their favorite techniques is a phishing...
View ArticleFacebook and Phishing ... Welcome to Phacebook?
Cyber criminals are always trying to improve their schemes to trick careless users into clicking on a link that will download malware, and one of their favorite techniques is a phishing...
View Articlehttp://www.techinsurance.com/blog/cyber-liability/survey-shows-88-percent-of-...
Did you know that, according to the Ponemon Institute, 88 percent of employees access sensitive data on their mobile devices, but only 20 percent have received any mobile security training? It's enough...
View ArticleSurvey: 88% of Us Laying Out the Welcome Mat for Hackers
Did you know that, according to the Ponemon Institute, 88 percent of employees access sensitive data on their mobile devices, but only 20 percent have received any mobile security training? It's enough...
View Articlehttp://www.techinsurance.com/blog/consulting/for-technology-safe-is-the-new-s...
PC World reports on the new app Confide that aims to offer a Snapchat-like messaging service for businesses. Unlike Snapchat, Confide was built with security in mind and offers end-to-end encryption...
View ArticleFor Technology, Safe Is the New Sexy
PC World reports on the new app Confide that aims to offer a Snapchat-like messaging service for businesses. Unlike Snapchat, Confide was built with security in mind and offers end-to-end encryption...
View ArticleNew Business Opportunity for IT Pros: Law Firm Security
The Recorder details how law firms are the latest industry to come under scrutiny for their lax cyber security standards. Some clients are even requiring their lawyers to demonstrate that they have...
View Article