4 Common Misconceptions about Cyber Risk Insurance
Cyber Risk Insurance is the misunderstood adolescent of small-business insurance. Recent studies from both private organizations and government bureaus have found widespread confusion regarding cyber...
View ArticleFree Legal Contract Samples for IT Firms: NDA, Privacy Policy, Website Terms...
As any owner of an IT business can attest, the legalities of running a tech firm can get complicated. Between contracts, licenses, terms of use documents, privacy policies, contractor agreements, and...
View ArticleWhen Data Is Compromised, Who Is Responsible?
A new installation corrupts your client's database. A hacker pulls off an unauthorized entry into the credit files you're storing for a retail customer. Both of these are examples of data breaches, and...
View Article5 Most Common Errors & Omissions Claims for Technology Firms
As a small-business owner in the technology sector, you've got more tasks than available time, so it’s easy to put off non-essential tasks like staying abreast of the latest trends in Errors &...
View ArticleUse a Coworking Space? Make Sure You Know the Risks
In recent years, coworking – the practice of freelancers and small-business owners working in communal spaces designed for that purpose – has risen precipitously in popularity. A survey of independent...
View Article10 things you can do to protect your tech business against cyber attacks
Your website goes down. Is it your web host? Has it been hacked? Is it being attacked? Is my customer data safe? These are just a few questions that you need to ask yourself when your business has...
View ArticleThird-Party Vs. First-Party Cyber Risk Insurance: Protect Your IT Firm Right
As you put together a risk management plan for your IT or technology business, you’ll no doubt find that Cyber Risk Insurance (also known as Cyber Liability Insurance and Data Breach Insurance) is an...
View Article8 Reasons Web Design / Graphic Design Professionals Should Have Insurance
As a Web design or graphic designers, you publish high quality designs on a schedule and budget to keep your clients happy - Word of mouth goes a long way, especially in website design. Sometimes the...
View ArticleFree Mobile Charging Stations: Data Breach Central?
This week, AT&T announced plans to set up free, solar-powered charging stations around the five boroughs of New York City. The project, apparently inspired by services AT&T offered following...
View ArticleHow Cyber Risk Insurance Can Save Your Business – Or Sink It
Major data security breaches can be disastrous for companies of all sizes. For smaller tech companies in particular, a significant breach can become a catastrophe that permanently dooms the business....
View ArticleWhy Even the Savviest Geeks Aren’t Immune to Hacking
As an IT contractor or business owner, you’re probably used to knowing a lot more about technology than most people in your life. After all, that’s why you’re able to make a living: most of your...
View ArticleSamurai Tech Firms Self-Destruct to Protect Client Information
Late last week, the New York Times reported that two small email providers that offered encrypted communications options to their clients chose to shut down and destroy their servers rather than...
View ArticleJava Function Exposes All Android Users to Bitcoin Theft, Highlights Errors &...
This summer, Bitcoins may have received more hype than Justin Bieber. But recently, the digital currency has been in the news due to a cyber security flaw, which sheds light on security and liability...
View ArticleA Security Flaw in Google Chrome Can Expose All Your Clients' Passwords:...
This week, there was a lot of buzz over the news that simply by typing in a certain address into your Google Chrome browser, a user could see all their stored passwords. Here’s a review of the story,...
View ArticleData Security Remains Top Concern about Cloud Computing Options
“Cloud Computing: Key Trends and Future Effects,” a study recently published by IDG Enterprise, highlights that, though cloud hosting and computing programs (including IaaS and SaaS) are growing in...
View ArticleHITECH: The Strictest Data Protection Law
In the age of big data, data protection laws are among the most important pieces of regulation for IT companies and independent consultants who work in technology fields. This month marks a major...
View ArticleWhat Is the Real Cost of a Data Breach?
The cost of a data breach will show up directly and indirectly in your business's bottom line. While hackers may steal money directly from your business, did you know that much of the actual cost of...
View ArticleWhat Is Cyber Liability?
With the news full of stories about the NSA’s Prism project, Edward Snowden’s status a fugitive, and Chelsea Manning’s recent conviction for leaking classified documents, more and more Americans are...
View ArticleWeb Design Insurance Defends Freelancers from Lawsuits
As a web designer, you know a lot of work goes into making an attractive, secure, and functional web site for clients. Unfortunately, the intricate, multi-layered nature of your work also means you’re...
View ArticleTechnology Errors & Omissions: Google’s on the Ball
If you use Google, you’ve probably noticed the blue dialog bar that’s been appearing on the search engine’s home page announcing updates to its Terms of Service. One of the most significant changes...
View Article