Some Small IT Biz Inspiration to Remind You Why You Do This
ZDNet's blog analyzes the tech media's response to the alleged hack of Dropbox and finds that many security recommendations offered by bloggers fall short. As it turns out, Dropbox was never hacked....
View ArticlePhishing by the Dock of eBay
CIO Today reports eBay was hacked…again. Over the summer, nearly 145 million passwords were exposed, but this time hackers used a different approach to harvest data.Because eBay allows JavaScript and...
View ArticleBeyond Passwords and PINs
From an IT perspective, a password or PIN is not a hallmark of security – it's a necessary evil. Ideally, there'd be a more secure way of encrypting and transferring data, but as it is, we're stuck...
View ArticleThe Least Fun Way to Spend that Extra $9,000
As an IT professional, you've undoubtedly worked with clients who won't commit an adequate amount of resources to data security. Many small-business owners simply don't think it's worth the extra money...
View ArticleSecure Message Scorecard: How Do Your Favorite Apps Measure Up?
The Electronic Frontier Foundation is reviewing messaging apps and scoring them for security. You can see the results on a new Secure Messaging Scorecard posted on the group's website.The first...
View ArticleWhy the 31% of Businesses without Cyber Insurance Should Scare You
Insurance Journal reports on a study that shows 60 percent of businesses think cyber risks are very high for them, but 31 percent still have no Cyber Liability Insurance whatsoever.You might be...
View ArticleiOS Malware Accesses Devices through Third-Party App Stores
Apple earned its sterling reputation for device security in part because iOS hadn't been hacked by malware. However, the company's reputation recently took a hit when a new strain of malware called...
View ArticleSome Small IT Biz Inspiration to Remind You Why You Do This
ZDNet's blog analyzes the tech media's response to the alleged hack of Dropbox and finds that many security recommendations offered by bloggers fall short. As it turns out, Dropbox was never hacked....
View ArticlePhishing by the Dock of eBay
CIO Today reports eBay was hacked…again. Over the summer, nearly 145 million passwords were exposed, but this time hackers used a different approach to harvest data.Because eBay allows JavaScript and...
View ArticleBeyond Passwords and PINs
From an IT perspective, a password or PIN is not a hallmark of security – it's a necessary evil. Ideally, there'd be a more secure way of encrypting and transferring data, but as it is, we're stuck...
View ArticleThe Least Fun Way to Spend that Extra $9,000
As an IT professional, you've undoubtedly worked with clients who won't commit an adequate amount of resources to data security. Many small-business owners simply don't think it's worth the extra money...
View ArticleSecure Message Scorecard: How Do Your Favorite Apps Measure Up?
The Electronic Frontier Foundation is reviewing messaging apps and scoring them for security. You can see the results on a new Secure Messaging Scorecard posted on the group's website.The first...
View ArticleWhy the 31% of Businesses without Cyber Insurance Should Scare You
Insurance Journal reports on a study that shows 60 percent of businesses think cyber risks are very high for them, but 31 percent still have no Cyber Liability Insurance whatsoever.You might be...
View ArticleiOS Malware Accesses Devices through Third-Party App Stores
Apple earned its sterling reputation for device security in part because iOS hadn't been hacked by malware. However, the company's reputation recently took a hit when a new strain of malware called...
View ArticleSnapchat's Snapcash Promises Secure Payments
Mobile payments have quickly become one of the hottest markets in tech. In the last month, we've seen Apple and a consortium of retailers vie for this growing market, and there are rumors that Facebook...
View ArticleCyber Risks on the Road Bad News for IT Consultants
As more devices are Internet-enabled, cyber liability can follow an IT consultant everywhere. Even on the road. But many businesses don't think to have a policy that addresses the IT risks traveling...
View Articlehttp://www.techinsurance.com/blog/cyber-risk/give-the-gift-of-spam-awareness-...
Krebs on Security reports that since November hackers have been using a new spam technique – phishing emails disguised as order confirmations from Target, Costco, Wal-Mart, and other big retailers – to...
View ArticleGive the Gift of Spam Awareness This Holiday Season
Krebs on Security reports that since November hackers have been using a new spam technique – phishing emails disguised as order confirmations from Target, Costco, Wal-Mart, and other big retailers – to...
View Articlehttp://www.techinsurance.com/blog/cyber-risk/more-mobile-more-holes-more-it-s...
As part of our look ahead at 2015, let's examine how cyber security is expected to shift in the coming year. To begin, we'll look at mobile devices and new research that shows trends in device security...
View Article2015: More Mobile, More Holes – But Will There Be More IT Sales?
As part of our look ahead at 2015, let's examine how cyber security is expected to shift in the coming year. To begin, we'll look at mobile devices and new research that shows trends in device security...
View Article