Clients Care about Cyber Security All of a Sudden? Hooray! Here’s How to...
Since the major data breach at Target, everyone and their mother has been talking about data breaches, which means your clients will probably have more questions about their own cyber security. They'll...
View ArticleThe Dumbest Ways to Lose Your Data
Data breaches are often preventable. That's the sad truth. Businesses get sloppy, turn off security settings, or don't practice basic data security. This truth was highlighted recently when data...
View ArticleClient Education Resources for Fighting Data Breaches
It's nice when someone does the work for you. This week, the Consumer Protection Bureau released a guide to preventing consumer data breaches, which is a helpful resource to use with clients.The...
View ArticleDevelopers: PayPal Wants You to Like Them (and Probably Also Wants You to...
PayPal recently ate a large slice of humble pie, acknowledging that it lost out on potential new business. The story goes that PayPal's service was never very developer-friendly. The online-payment...
View ArticleDon’t Let Your Employees Cause Your Next Data Breach
At the end of January, the Coca-Cola Company announced that nearly 80,000 of its private records had been compromised in a data breach. Among other things, the records contained some 20,000 Social...
View ArticleWhat Flappy Birds Can Teach You about Mobile Device Security
As part of our ongoing examination of new cyber threats, this blog has focused on mobile device vulnerability. We’ve highlighted growing mobile threats in "The Mobile Future & Why You'll Need...
View ArticleData Breach Ripple Effects: The Scary Truth
How much does a data breach cost? Simply put, a data leak is very, very expensive. To make matters worse, you can pay for a data breach for years. The cost of the recent Target data breach, for...
View ArticleOnline Data Protection
With online data theft becoming more and more common and research group Advisen predicting that 2013 will be a turning point in cyber security [PDF], IT professionals need to review their data security...
View ArticleLaptop Insurance: Secure and Protect Mobile Devices
Laptops, tablets, iPhones, and other portable devices present particular security and insurance concerns for IT small businesses. Their portability means they are susceptible to more risks,...
View ArticleCyber Law Essentials: 3 Laws Every IT Firm Needs to Know
In the United States, there are currently no federal laws standardizing how IT businesses should handle private information and data breaches. This lack of overarching regulations complicates things...
View ArticleData Leaks: 3 Questions Every IT Professional Needs to Know
They go by many names – data leaks, data breaches, identity thefts, cyber attacks – and just as many security measures IT professionals can put in place to protect their customer data and the financial...
View ArticleWhat Are IT Professionals Legally Responsibility For? (AKA, How to Avoid 3...
There are three key legal responsibilities IT companies need to understand in order to avoid lawsuits alleging errors and omissions, negligence in data protection, or theft of intellectual...
View ArticleBeyond E&O Insurance: Does Your IT Risk Management Plan Really Reduce Risks?
A comprehensive risk management strategy includes everything from rigorous software testing to how you choose between cloud-service vendors. It informs all your IT decisions and can play a major role...
View ArticleCommon Risks for IT Project Managers Part 2: Legal Risks
When you sign a contract to work with a client, contractor, or subcontractor, you enter into a tangled web of errors and omissions liabilities. If anything goes wrong on the project, it’s common for...
View Article3 Steps to Avoid Client Crises and E&O Lawsuits on Cyber Monday
On December 2, a week from today, millions of Americans will flock to online retail sites to take advantage of the Cyber Monday deals that have become an integral part of the holiday shopping season....
View ArticleWhat Google and Twitter Can Teach Us about Testing Software for Security
Any software or web app can have security vulnerabilities – just ask Google, which recently announced it had fixed a bug that allowed hackers to steal passwords from Google accounts.The bug was...
View ArticleYour Most Powerful Anti-Data Breach Tool (Spoiler: It’s Client Education)
An IT consultant's work includes more than just installing software and setting up hardware. You may not realize it, but you are also responsible for teaching clients about cyber security. Take the...
View Article3 Strategies to Help Small IT Businesses Beat 2014’s Biggest Cyber Threats
Every year, Deloitte publishes its Tech Trends report, which highlights trends from the last 12 months and issues recommendations for technology professionals in the year ahead. The 2013 Tech Trends...
View ArticleClients Care about Cyber Security All of a Sudden? Hooray! Here’s How to...
Since the major data breach at Target, everyone and their mother has been talking about data breaches, which means your clients will probably have more questions about their own cyber security. They'll...
View ArticleThe Dumbest Ways to Lose Your Data
Data breaches are often preventable. That's the sad truth. Businesses get sloppy, turn off security settings, or don't practice basic data security. This truth was highlighted recently when data...
View Article