Data Leaks: 3 Questions Every IT Professional Needs to Know
They go by many names – data leaks, data breaches, identity thefts, cyber attacks – and just as many security measures IT professionals can put in place to protect their customer data and the financial...
View ArticleBeyond E&O Insurance: Does Your IT Risk Management Plan Really Reduce Risks?
A comprehensive risk management strategy includes everything from rigorous software testing to how you choose between cloud-service vendors. It informs all your IT decisions and can play a major role...
View ArticleWhat Google and Twitter Can Teach Us about Testing Software for Security
Any software or web app can have security vulnerabilities – just ask Google, which recently announced it had fixed a bug that allowed hackers to steal passwords from Google accounts.The bug was...
View ArticleYour Most Powerful Anti-Data Breach Tool (Spoiler: It’s Client Education)
An IT consultant's work includes more than just installing software and setting up hardware. You may not realize it, but you are also responsible for teaching clients about cyber security. Take the...
View ArticleData Breach Response Guide
This year, according to the Identity Theft Resource Center, there have been more than 500 data breaches reported at U.S. companies, resulting in more than 15 million stolen records.If you look through...
View Article3 Ways to Upgrade Your Data Security for Free
As a small-business owner, every decision you make is affected by your budget. You carefully weigh the tradeoffs before making any major purchase. With that in mind, it's nice when you can get...
View ArticleA New Holiday Tradition: 12 Days of Risk-mas
Everyone knows the holiday song "12 days of Christmas," but reports about the prevalence of data breaches over Christmas inspired us to rewrite the classic carol and give it a contemporary twist. Read...
View ArticleData Leaks: 3 Questions Every IT Professional Needs to Know
They go by many names – data leaks, data breaches, identity thefts, cyber attacks – and just as many security measures IT professionals can put in place to protect their customer data and the financial...
View ArticleBeyond E&O Insurance: Does Your IT Risk Management Plan Really Reduce Risks?
A comprehensive risk management strategy includes everything from rigorous software testing to how you choose between cloud-service vendors. It informs all your IT decisions and can play a major role...
View ArticleWhat Google and Twitter Can Teach Us about Testing Software for Security
Any software or web app can have security vulnerabilities – just ask Google, which recently announced it had fixed a bug that allowed hackers to steal passwords from Google accounts.The bug was...
View ArticleYour Most Powerful Anti-Data Breach Tool (Spoiler: It’s Client Education)
An IT consultant's work includes more than just installing software and setting up hardware. You may not realize it, but you are also responsible for teaching clients about cyber security. Take the...
View Article3 Ways to Upgrade Your Data Security for Free
As a small-business owner, every decision you make is affected by your budget. You carefully weigh the tradeoffs before making any major purchase. With that in mind, it's nice when you can get...
View ArticleA New Holiday Tradition: 12 Days of Risk-mas
Everyone knows the holiday song "12 days of Christmas," but reports about the prevalence of data breaches over Christmas inspired us to rewrite the classic carol and give it a contemporary twist. Read...
View Article2013 Year-end Highlights: 5 Major Trends in Data Breaches and IT Liability
Between the Edward Snowden saga and the botched Obamacare rollout, 2013 was a year filled with concerns about data security and tech liabilities. Think about it: two of the biggest stories of the year...
View ArticleCountdown to 2014: Top 6 Causes of Data Breaches on New Year’s Eve
As you prepare to ring out 2013, make sure your festivities don’t expose your business or your clients to unnecessary risk. Think you’re safe during the holidays? Think again. In fact, experts have...
View ArticleHow Many Data Breaches Will You Prevent in 2014?
The year 2013 was already deemed a "cyber tipping-point" by Advisen, a market research firm that argues the prevalence of data breaches and growing number of attacks on small businesses will be a game...
View ArticleAnatomy of a Data Breach: Key Lessons from Target's Security Breach
Between November 27 and December 15, Target was the victim of a massive data leak. Hackers broke into Target's sales records and stole credit and debit card information for almost 40 million...
View ArticleSoftware Patches: The Good, the Bad, and the Liability
Over the summer, cyber criminals hacked into a web application hosted by the Department of Energy and gained access to more than 100,000 personal records. Hackers were able to break in because the DOE...
View ArticleWhat Google and Twitter Can Teach Us about Testing Software for Security
Any software or web app can have security vulnerabilities – just ask Google, which recently announced it had fixed a bug that allowed hackers to steal passwords from Google accounts.The bug was...
View ArticleYour Most Powerful Anti-Data Breach Tool (Spoiler: It’s Client Education)
An IT consultant's work includes more than just installing software and setting up hardware. You may not realize it, but you are also responsible for teaching clients about cyber security. Take the...
View Article