2015: More Mobile, More Holes – But Will There Be More IT Sales?
As part of our look ahead at 2015, let's examine how cyber security is expected to shift in the coming year. To begin, we'll look at mobile devices and new research that shows trends in device security...
View Articlehttp://www.techinsurance.com/blog/data-breach/why-the-target-data-breach-ruli...
The New York Times reports that almost a year after the Target data breach was discovered, a federal judge has ruled that banks, lenders, and credit card companies can move forward with their lawsuits...
View ArticleWhy the Target Data Breach Ruling Matters for IT Contractors
The New York Times reports that almost a year after the Target data breach was discovered, a federal judge has ruled that banks, lenders, and credit card companies can move forward with their lawsuits...
View Articlehttp://www.techinsurance.com/blog/cyber-security/united-airlines-introduces-2...
Apple Insider reports that United Airlines will be equipping 23,000 flight attendants with new iPhone 6+ models, which will allow them to…Process customer transactions.Access safety manuals.Handle...
View ArticleUnited Airlines Introduces 23,000 Potential Security Holes
Apple Insider reports that United Airlines will be equipping 23,000 flight attendants with new iPhone 6+ models, which will allow them to…Process customer transactions.Access safety manuals.Handle...
View Articlehttp://www.techinsurance.com/blog/cyber-risk/a-lesson-from-the-sony-hack-focu...
By now, you've undoubtedly heard about the massive cyber attack on Sony Pictures Entertainment, which aired the business's dirty laundry in public (in the form of vulgar and racist emails) and exposed...
View ArticleA Lesson from the Sony Hack: Focus Security on the Private Stuff
By now, you've undoubtedly heard about the massive cyber attack on Sony Pictures Entertainment, which aired the business's dirty laundry in public (in the form of vulgar and racist emails) and exposed...
View Articlehttp://www.techinsurance.com/blog/consultant-liability/why-your-clients-marke...
TechRadar suggests an interesting data security thought experiment: imagine that you actually had to pay more money to store protected personal information. In other words, if you wanted to store...
View ArticleWhy Your Clients' Marketing Department Could Be Your Biggest Professional...
TechRadar suggests an interesting data security thought experiment: imagine that you actually had to pay more money to store protected personal information. In other words, if you wanted to store...
View Articlehttp://www.techinsurance.com/blog/errors-and-omissions-insurance/small-health...
Maintaining an IT business always requires sales work. That's why you should be open-minded about new markets and learning how to customize IT for different industries. One difficult but potentially...
View ArticleSmall Healthcare Practices: Your New Best Clients
Maintaining an IT business always requires sales work. That's why you should be open-minded about new markets and learning how to customize IT for different industries. One difficult but potentially...
View ArticleBlackberry Banking on Cyber Security Concerns with its "Classic"
Blackberry's new phone, dubbed the "Classic," includes the company's signature push-button keyboard and trackpad along with some sleek, new security under the hood. According to ZDNet, Blackberry is...
View Articlehttp://www.techinsurance.com/blog/cyber-risk/5-things-in-your-email-right-now...
After the recent Sony Pictures Entertainment hack made headlines, many businesses have started to rethink their corporate email policies. Exposed company emails between execs at Sony led to public...
View Article5 Things in Your Email Right Now that Could Ruin Your Life if You're Hacked
After the recent Sony Pictures Entertainment hack made headlines, many businesses have started to rethink their corporate email policies. Exposed company emails between execs at Sony led to public...
View Articlehttp://www.techinsurance.com/blog/consulting/3-client-risk-factors-that-incre...
An IT consultant can install the same software for two different clients but have completely different professional liabilities for each. That's because your risk isn't determined solely by your work;...
View ArticleUber Hiring Cyber Expert to Examine its Data Privacy
After a scandalous report that an Uber manager at the company's NYC office accessed a reporter's travel data without permission, the hail-a-ride start-up has hired a cyber liability expert to review...
View Articlehttp://www.techinsurance.com/blog/cyber-risk/5-things-in-your-email-right-now...
After the recent Sony Pictures Entertainment hack made headlines, many businesses have started to rethink their corporate email policies. Exposed company emails between execs at Sony led to public...
View Article5 Things in Your Email Right Now that Could Ruin Your Life if You're Hacked
After the recent Sony Pictures Entertainment hack made headlines, many businesses have started to rethink their corporate email policies. Exposed company emails between execs at Sony led to public...
View Article3 Client Risk Factors that Increase Your Professional Liability Exposure
An IT consultant can install the same software for two different clients but have completely different professional liabilities for each. That's because your risk isn't determined solely by your work;...
View Articlehttp://www.techinsurance.com/blog/errors-and-omissions-insurance/how-technolo...
IT contractors usually have years of experience working for a larger tech company before deciding to strike out on their own. After you started your own business, you probably found that there was a...
View Article