Quantcast
Channel: Tech Insurance Small Business Center - E&O Insurance
Browsing latest articles
Browse All 34 View Live

Image may be NSFW.
Clik here to view.

Data Security in the Cloud: Concerns for IT Firms with Legal Clients

If your IT firm counts any lawyers or law firms among its clients, you probably already know that the data security rules are stricter in legal fields. But exactly how strict are those rules? And what...

View Article


Image may be NSFW.
Clik here to view.

Tinder Security Breach Highlights E&O Exposure for IT Contractors

Have you heard of Tinder? It’s a date-finding app for young professionals (many have observed that it brings the capabilities of Grinder to a wider market).  Tinder takes a new spin on the idea that...

View Article


Image may be NSFW.
Clik here to view.

Errors & Omissions Insurance: Protect Your Hardest-to-Manage Reputational...

A study recently conducted by insurance company ACE European Group found that more than four-fifths of businesses interviewed (81 percent) cited reputational risks as their most difficult to manage....

View Article

Image may be NSFW.
Clik here to view.

Contracting Work? Check Independent Contractors’ Insurance Credentials

Do you have any idea whether your independent contractors are properly insured? You should. Uninsured contract workers expose your tech business to the same degree of risk as if you carried no...

View Article

Image may be NSFW.
Clik here to view.

The IT Professional’s Guide to Getting an E&O Claim Covered Every Time

For IT contractors and owners of small technology businesses, Errors & Omissions Insurance (aka Professional Liability) is one of the most important insurance coverages to carry. Why? For two...

View Article


Image may be NSFW.
Clik here to view.

How Clients Who Accept Mobile Payments Put You at Risk

As many as 40 percent of small and medium-sized businesses are now accepting mobile payments (i.e., those from devices attached to tablets or smartphones), according to a survey conducted by marketing...

View Article

Image may be NSFW.
Clik here to view.

Java Function Exposes All Android Users to Bitcoin Theft, Highlights Errors &...

This summer, Bitcoins may have received more hype than Justin Bieber. But recently, the digital currency has been in the news due to a cyber security flaw, which sheds light on security and liability...

View Article

Image may be NSFW.
Clik here to view.

Data Security Remains Top Concern about Cloud Computing Options

“Cloud Computing: Key Trends and Future Effects,” a study recently published by IDG Enterprise, highlights that, though cloud hosting and computing programs (including IaaS and SaaS) are growing in...

View Article


Image may be NSFW.
Clik here to view.

Build a Better Acceptable Use Policy: 3 Key Elements

Any organization that offers members access to the Internet or an intranet (including universities, schools, government entities, and businesses) needs an acceptable use policy (AUP) to outline the...

View Article


Image may be NSFW.
Clik here to view.

A $2,500 Investment That Can Save Computer Consultants Hundreds of Thousands

For many IT professionals, striking out on their own to launch an independent computer consulting or IT consulting practice is a thrilling step: it means freedom from a restrictive office atmosphere,...

View Article
Browsing latest articles
Browse All 34 View Live