Hero Image

TechInsurance Small Business Center

Get the latest news about data security, managing business liability, and winning new clients. Browse categories for topics of interest or scroll through the most recent posts to find out what's happening in the world of IT business risk management right now.

Get instant small business insurance quotes

Can't find your industry?

800.668.7020 | M-F 8:00 AM to 5:30PM Central

4.9 out of 5 Customer Rating

Read reviews...

POODLE Vulnerability Could Spell Trouble for Small Businesses that Use BYOD

by Max Schleicher 30. October 2014 08:03
POODLE is a vulnerability that exposes web accounts accessed on open Wi-Fi. Learn what clients might be affected and how you can protect them.
POODLE is a vulnerability that exposes web accounts accessed on open Wi-Fi. Learn what clients might be affected and how you can protect them. [More]

Loss, Theft of Devices Still Among the Most Common Data Breaches

by Max Schleicher 29. October 2014 08:05
Stolen laptops can lead to data breaches. Find out how to limit risk exposure and what you need know about IT liability for malware, theft, and other breaches.
Stolen laptops can lead to data breaches. Find out how to limit risk exposure and what you need know about IT liability for malware, theft, and other breaches. [More]

Setting Prices for a Profitable IT Business

by brenna 28. October 2014 08:37
When setting a price point for your IT services, you must consider market positioning, consumer psychology, and what your rate has to cover. Learn more.
When setting a price point for your IT services, you must consider market positioning, consumer psychology, and what your rate has to cover. Learn more. [More]

When Software Design is a Matter of Life and Death

by Max Schleicher 27. October 2014 08:06
A software flaw may be the reason the first U.S. Ebola patient wasn't properly quarantined. Learn more about how small software problems can lead to big IT liabilities.
A software flaw may be the reason the first U.S. Ebola patient wasn't properly quarantined. Learn more about how small software problems can lead to big IT liabilities. [More]

Snapchat Leak Offers Liability Lessons for App Developers

by Max Schleicher 24. October 2014 08:10
13GB of snaps were leaked online. Though the breach happened through a third-party app, Snapchat could be liable. Learn more about mobile developer liabilities.
13GB of snaps were leaked online. Though the breach happened through a third-party app, Snapchat could be liable. Learn more about mobile developer liabilities. [More]

A Simple Way to Keep Your Clients' Data Safer? (Bonus: It Might Help Programmers, Too)

by Max Schleicher 23. October 2014 08:17
Developers and IT consultants may need to answer client questions about two-factor authentication. Here's what you need to know about 2FA and its impact on data security.
Developers and IT consultants may need to answer client questions about two-factor authentication. Here's what you need to know about 2FA and its impact on data security. [More]

Four States Update Data Breach Notification Laws

by Max Schleicher 22. October 2014 08:32
Four states recently changed their data breach laws, adding new requirements for IT consultants. Read our analysis to learn where your liabilities have increased.
Four states recently changed their data breach laws, adding new requirements for IT consultants. Read our analysis to learn where your liabilities have increased. [More]

HR for Small IT Businesses: Look for Values, Not Just Skills

by Marc Prine 21. October 2014 08:55
To find the best employee for an open position, IT business owners should look for shared values rather than just excellent skills.
To find the best employee for an open position, IT business owners should look for shared values rather than just excellent skills. [More]

"BadUSB" Code Reminds Us All to Stay Paranoid

by Max Schleicher 20. October 2014 08:17
USB malware "BadUSB" reinforces what IT consultants have said for years: non-secure USB devices can lead to data breaches. Learn how to protect your clients.
USB malware "BadUSB" reinforces what IT consultants have said for years: non-secure USB devices can lead to data breaches. Learn how to protect your clients. [More]

5 Bookkeeping Mistakes to Avoid in Your Small IT Businesses

by Andrew G Poulos EA 17. October 2014 09:17
For independent IT contractors and tech business owners, managing finances and taxes can be an extraordinary headache. Discover 5 tips that simplify bookkeeping.
For independent IT contractors and tech business owners, managing finances and taxes can be an extraordinary headache. Discover 5 tips that simplify bookkeeping. [More]

60% of small businesses were hacked at least twice in 2012

Get Free Quotes!