Quantcast
Channel: Tech Insurance Small Business Center - Data PrivacyTech Insurance Small Business Center0.0000000.000000
Browsing all 351 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Are BYOD Benefits Worth the Costs?

A new survey by CompTIA (the Computer Technology Industry Association) finds that more than 60 percent of companies have approved bring-your-own-device (BYOD) policies at the office. Arguments in...

View Article


Image may be NSFW.
Clik here to view.

When Data Is Compromised, Who Is Responsible?

A new installation corrupts your client's database. A hacker pulls off an unauthorized entry into the credit files you're storing for a retail customer. Both of these are examples of data breaches, and...

View Article


Image may be NSFW.
Clik here to view.

10 things you can do to protect your tech business against cyber attacks

 Your website goes down. Is it your web host? Has it been hacked? Is it being attacked? Is my customer data safe? These are just a few questions that you need to ask yourself when your business has...

View Article

Image may be NSFW.
Clik here to view.

Samurai Tech Firms Self-Destruct to Protect Client Information

Late last week, the New York Times reported that two small email providers that offered encrypted communications options to their clients chose to shut down and destroy their servers rather than...

View Article

Image may be NSFW.
Clik here to view.

A Security Flaw in Google Chrome Can Expose All Your Clients' Passwords:...

This week, there was a lot of buzz over the news that simply by typing in a certain address into your Google Chrome browser, a user could see all their stored passwords. Here's a review of the story in...

View Article


Image may be NSFW.
Clik here to view.

$1.2 Million HITECH Fine Highlights Risks for IT Contractors Working with...

HealthcareITNews.com reports that Affinity Health Plan, a New York-based managed care provider, faces a Health and Human Services (HHS) fine of more than $1.2 million connected to a breach of patient...

View Article

Image may be NSFW.
Clik here to view.

Build a Better Acceptable Use Policy: 3 Key Elements

Any organization that offers members access to the Internet or an intranet (including universities, schools, government entities, and businesses) needs an acceptable use policy (AUP) to outline the...

View Article

Image may be NSFW.
Clik here to view.

Survey: Most IT Privacy Policy Templates Woefully Insufficient

A survey published this month by DataGuidance, a global provider of data compliance resources, shows a dismal state of IT privacy policies for online companies. In fact, the survey found that 23...

View Article


Image may be NSFW.
Clik here to view.

HITECH: The Strictest Data Protection Law

In the age of big data, data protection laws are among the most important pieces of regulation for IT companies and independent consultants who work in technology fields. This month marks a major...

View Article


Image may be NSFW.
Clik here to view.

What Is the Real Cost of a Data Breach?

The cost of a data breach will show up directly and indirectly in your business's bottom line. While hackers may steal money directly from your business, did you know that much of the actual cost of...

View Article

Image may be NSFW.
Clik here to view.

What Is Cyber Liability?

With the news full of stories about the NSA’s Prism project, Edward Snowden’s status a fugitive, and Chelsea Manning’s recent conviction for leaking classified documents, more and more Americans are...

View Article

Image may be NSFW.
Clik here to view.

Data Security Laws Computer Consultants Need to Know

Over the last few years, laws have evolved to cover changing concerns about digital privacy, but there is still a lot of confusion among computer consultants regarding their responsibilities for data...

View Article

Image may be NSFW.
Clik here to view.

How to Protect Data: Data Breach Solutions

There are many reasons to protect data: it's good for your clients, your reputation, and your bottom line. Many IT professionals underestimate the value of that last factor, but that can be a costly...

View Article


Image may be NSFW.
Clik here to view.

Technology Errors & Omissions: Google’s on the Ball

If you use Google, you’ve probably noticed the blue dialog bar that’s been appearing on the search engine’s home page announcing updates to its Terms of Service. One of the most significant changes...

View Article

Image may be NSFW.
Clik here to view.

Security Analysis: Cloud Computing Solutions

Infonetics Research estimates that the cloud security industry is expected to grow by almost 11 percent annually for the next two to three years as more and more users store data online and have higher...

View Article


Image may be NSFW.
Clik here to view.

The Data Breach Statistics Nobody's Talking About

If you follow IT security news, you know that during the last six months, we've seen a rash of data breaches, which has led many people to wonder: Are these isolated incidents or part of a growing...

View Article

Image may be NSFW.
Clik here to view.

Insurance and Technology: Protect Your Business from Security Lawsuits

Whether it's for cloud computing, mobile apps, or other new technology, business insurance can cover all kinds of cyber liabilities, including those associated with data security breaches and credit...

View Article


Image may be NSFW.
Clik here to view.

Cyber Liability Disaster: Tens of Millions of Adobe Users Hacked

A few weeks ago, the software giant Adobe disclosed that it had been hacked, but only recently has it revealed the full extent of the data breach: 38 million users accounts were hacked and the source...

View Article

Image may be NSFW.
Clik here to view.

Online Data Protection

With online data theft becoming more and more common and research group Advisen predicting that 2013 will be a turning point in cyber security [PDF], IT professionals need to review their data security...

View Article

Image may be NSFW.
Clik here to view.

Laptop Insurance: Secure and Protect Mobile Devices

Laptops, tablets, iPhones, and other portable devices present particular security and insurance concerns for IT small businesses. Their portability means they are susceptible to more risks,...

View Article
Browsing all 351 articles
Browse latest View live