Data Security in the Cloud: Concerns for IT Firms with Legal Clients
If your IT firm counts any lawyers or law firms among its clients, you probably already know that the data security rules are stricter in legal fields. But exactly how strict are those rules? And what...
View ArticleTinder Security Breach Highlights E&O Exposure for IT Contractors
Have you heard of Tinder? It’s a date-finding app for young professionals (many have observed that it brings the capabilities of Grinder to a wider market). Tinder takes a new spin on the idea that...
View ArticleErrors & Omissions Insurance: Protect Your Hardest-to-Manage Reputational...
A study recently conducted by insurance company ACE European Group found that more than four-fifths of businesses interviewed (81 percent) cited reputational risks as their most difficult to manage....
View ArticleContracting Work? Check Independent Contractors’ Insurance Credentials
Do you have any idea whether your independent contractors are properly insured? You should. Uninsured contract workers expose your tech business to the same degree of risk as if you carried no...
View ArticleThe IT Professional’s Guide to Getting an E&O Claim Covered Every Time
For IT contractors and owners of small technology businesses, Errors & Omissions Insurance (aka Professional Liability) is one of the most important insurance coverages to carry. Why? For two...
View ArticleHow Clients Who Accept Mobile Payments Put You at Risk
As many as 40 percent of small and medium-sized businesses are now accepting mobile payments (i.e., those from devices attached to tablets or smartphones), according to a survey conducted by marketing...
View ArticleJava Function Exposes All Android Users to Bitcoin Theft, Highlights Errors &...
This summer, Bitcoins may have received more hype than Justin Bieber. But recently, the digital currency has been in the news due to a cyber security flaw, which sheds light on security and liability...
View ArticleData Security Remains Top Concern about Cloud Computing Options
“Cloud Computing: Key Trends and Future Effects,” a study recently published by IDG Enterprise, highlights that, though cloud hosting and computing programs (including IaaS and SaaS) are growing in...
View ArticleBuild a Better Acceptable Use Policy: 3 Key Elements
Any organization that offers members access to the Internet or an intranet (including universities, schools, government entities, and businesses) needs an acceptable use policy (AUP) to outline the...
View ArticleA $2,500 Investment That Can Save Computer Consultants Hundreds of Thousands
For many IT professionals, striking out on their own to launch an independent computer consulting or IT consulting practice is a thrilling step: it means freedom from a restrictive office atmosphere,...
View Article