Should Tech Firms Pay for Digital Security Software?
Cyber security is a hot topic right now. Lawmakers, industry leaders, and media outlets are buzzing about how the latest data breach will affect the economy, privacy, and even national security. But...
View ArticleWill CISPA Make Cyber Risk Insurance Obsolete?
In 2012, the U.S. House of Representatives passed a bill called the Cyber Intelligence Sharing and Protection Act (CISPA). Designed to improve digital security, the bill has proven controversial...
View ArticleCyber Risk Reminder: Your Data Is NOT Property
Owners of small technology companies often lack adequate insurance coverage for the data they handle during the course of their work. Why? Because many IT professionals mistakenly think that their...
View ArticleBYOD Moves Beyond Office to Classroom
Bring-Your-Own-Device policies (commonly called BYOD) in small technology companies are becoming more and more common, as TechInsurance mentioned earlier this year. Now, according to the New York...
View ArticleAre BYOD Benefits Worth the Costs?
A new survey by CompTIA (the Computer Technology Industry Association) finds that more than 60 percent of companies have approved bring-your-own-device (BYOD) policies at the office. Arguments in...
View ArticleWhen Data Is Compromised, Who Is Responsible?
A new installation corrupts your client's database. A hacker pulls off an unauthorized entry into the credit files you're storing for a retail customer. Both of these are examples of data breaches, and...
View Article10 things you can do to protect your tech business against cyber attacks
Your website goes down. Is it your web host? Has it been hacked? Is it being attacked? Is my customer data safe? These are just a few questions that you need to ask yourself when your business has...
View Article8 Reasons Web Design / Graphic Design Professionals Should Have Insurance
As a Web design or graphic designers, you publish high quality designs on a schedule and budget to keep your clients happy - Word of mouth goes a long way, especially in website design. Sometimes the...
View ArticleFree Mobile Charging Stations: Data Breach Central?
This week, AT&T announced plans to set up free, solar-powered charging stations around the five boroughs of New York City. The project, apparently inspired by services AT&T offered following...
View ArticleHow Cyber Risk Insurance Can Save Your Business – Or Sink It
Major data security breaches can be disastrous for companies of all sizes. For smaller tech companies in particular, a significant breach can become a catastrophe that permanently dooms the business....
View ArticleTinder Security Breach Highlights E&O Exposure for IT Contractors
Have you heard of Tinder? It’s a date-finding app for young professionals (many have observed that it brings the capabilities of Grinder to a wider market). Tinder takes a new spin on the idea that...
View ArticleSamurai Tech Firms Self-Destruct to Protect Client Information
Late last week, the New York Times reported that two small email providers that offered encrypted communications options to their clients chose to shut down and destroy their servers rather than...
View ArticleA Security Flaw in Google Chrome Can Expose All Your Clients' Passwords:...
This week, there was a lot of buzz over the news that simply by typing in a certain address into your Google Chrome browser, a user could see all their stored passwords. Here’s a review of the story,...
View Article$1.2 Million HITECH Fine Highlights Risks for IT Contractors Working with...
HealthcareITNews.com reports that Affinity Health Plan, a New York-based managed care provider, faces a Health and Human Services (HHS) fine of more than $1.2 million connected to a breach of patient...
View ArticleBuild a Better Acceptable Use Policy: 3 Key Elements
Any organization that offers members access to the Internet or an intranet (including universities, schools, government entities, and businesses) needs an acceptable use policy (AUP) to outline the...
View ArticleSurvey: Most IT Privacy Policy Templates Woefully Insufficient
A survey published this month by DataGuidance, a global provider of data compliance resources, shows a dismal state of IT privacy policies for online companies. In fact, the survey found that 23...
View ArticleHITECH: The Strictest Data Protection Law
In the age of big data, data protection laws are among the most important pieces of regulation for IT companies and independent consultants who work in technology fields. This month marks a major...
View ArticleWill CISPA Make Cyber Risk Insurance Obsolete?
In 2012, the U.S. House of Representatives passed a bill called the Cyber Intelligence Sharing and Protection Act (CISPA). Designed to improve digital security, the bill has proven controversial...
View ArticleCyber Risk Reminder: Your Data Is NOT Property
Owners of small technology companies often lack adequate insurance coverage for the data they handle during the course of their work. Why? Because many IT professionals mistakenly think that their...
View ArticleBYOD Moves Beyond Office to Classroom
Bring-Your-Own-Device policies (commonly called BYOD) in small technology companies are becoming more and more common, as TechInsurance mentioned earlier this year. Now, according to the New York...
View Article