Quantcast
Channel: Tech Insurance Small Business Center - Technology InsuranceTech Insurance Small Business Center0.0000000.000000
Browsing all 506 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Why Your Clients Need Cyber Liability Insurance (And How to Explain that to...

Entrepreneur Magazine recently offered some answers to small-business owners who had questions about their Cyber Liability Insurance, explaining that, yes, all businesses – even small businesses –...

View Article


Image may be NSFW.
Clik here to view.

Hackers Admit Targeting Lax Security, Shoddily Built Applications

A funny thing happened after hacker collective Rex Mundi stole 24,000 records from Belgian loan company AFC Kredieten. The hacking group explained what they look for in a data breach victim. As The...

View Article


Image may be NSFW.
Clik here to view.

http://www.techinsurance.com/blog/cloud-security/talking-with-clients-about-s...

A recent IT Portal article debunks common cloud security myths, pointing out that users (and your clients) often have an outdated understanding of the risks they face. Top misconceptions included…There...

View Article

Image may be NSFW.
Clik here to view.

Talking with Clients about Security Risks They Should Actually Be Worried About

A recent IT Portal article debunks common cloud security myths, pointing out that users (and your clients) often have an outdated understanding of the risks they face. Top misconceptions included…There...

View Article

Image may be NSFW.
Clik here to view.

Holy Cripes! 4 in 5 Web Apps Have "Medium Security" Vulnerability

A recent Acunetix study of over 15,000 websites and 5,500 companies unveiled startling numbers. Network scans performed on over 1.9 million files revealed that…Almost four in five web applications were...

View Article


Image may be NSFW.
Clik here to view.

http://www.techinsurance.com/blog/cyber-risk/the-lack-of-a-federal-data-breac...

The National Law Review reports that two states – Connecticut and Rhode Island – have updated their data breach laws to require a more stringent breach response. Both include changes to specify a set...

View Article
Browsing all 506 articles
Browse latest View live