Hero Image

TechInsurance Small Business Center

Get the latest news about data security, managing business liability, and winning new clients. Browse categories for topics of interest or scroll through the most recent posts to find out what's happening in the world of IT business risk management right now.

Get instant small business insurance quotes

Can't find your industry?

800.668.7020 | M-F 8:00 AM to 5:30PM Central

4.9 out of 5 Customer Rating

Read reviews...

The Latest Oxymoron: Android Security

by Max Schleicher 22. September 2014 08:24
Security flaws with OkCupid, Instagram, and Vine could expose Android users’ data. Learn what you can do to protect client data and cover your cyber risks.
Security flaws with OkCupid, Instagram, and Vine could expose Android users’ data. Learn what you can do to protect client data and cover your cyber risks. [More]

Home Depot Data Breach Lawsuit Raises Question: What Are "Reasonable" Security Standards?

by Max Schleicher 19. September 2014 08:04
A customer filed a lawsuit only one day after Home Depot confirmed a data breach. As data breach lawsuits become the norm, you'll need IT insurance.
A customer filed a lawsuit only one day after Home Depot confirmed a data breach. As data breach lawsuits become the norm, you'll need IT insurance. [More]

Net Neutrality Protest Sees Significant Engagement

by Max Schleicher 18. September 2014 07:59
Net neutrality is becoming a defining issue in 2014, but did you know it affects IT liability? Learn how to cover IT contractor risk as Internet laws change.
Net neutrality is becoming a defining issue in 2014, but did you know it affects IT liability? Learn how to cover IT contractor risk as Internet laws change. [More]

Will There Be Unforeseen Security Issues with Apple Pay?

by Max Schleicher 17. September 2014 08:19
The iPhone 6's Apple Pay raises security questions about mobile payments. Learn what risks developers and IT consultants have when working with mobile wallets.
The iPhone 6's Apple Pay raises security questions about mobile payments. Learn what risks developers and IT consultants have when working with mobile wallets. [More]

Malvertising: A New Headache for IT Consultants

by Max Schleicher 16. September 2014 08:07
YouTube, Amazon, and The New York Times have all been infected with fake ads that download malware on your clients' network. Learn how to protect your clients.
YouTube, Amazon, and The New York Times have all been infected with fake ads that download malware on your clients' network. Learn how to protect your clients. [More]

New Cold War Being Played Out in World of Data Breaches

by Max Schleicher 15. September 2014 07:45
Under constant threat of cyber attack, IT contractors have developed a Cold War mentality. Learn what you can do to manage IT risk and stay vigilant.
Under constant threat of cyber attack, IT contractors have developed a Cold War mentality. Learn what you can do to manage IT risk and stay vigilant. [More]

Nude Photo Leak Raises Question of What a Data Breach Is

by Max Schleicher 12. September 2014 08:22
Jennifer Lawrence and other celebrities were hacked, but IT consultants can learn from Apple's mistakes. Learn how to prevent a cloud storage data breach.
Jennifer Lawrence and other celebrities were hacked, but IT consultants can learn from Apple's mistakes. Learn how to prevent a cloud storage data breach. [More]

No Lack of Flack for "Hack Backs" after Attacks

by Max Schleicher 11. September 2014 07:57
Security firms are getting even with hackers by hacking back and gathering intelligence on these intruders. Learn why IT consultants should avoid this gray legal area.
Security firms are getting even with hackers by hacking back and gathering intelligence on these intruders. Learn why IT consultants should avoid this gray legal area. [More]

Netflix: Use Our Hack-Scanning Software

by Max Schleicher 10. September 2014 08:00
Netflix released 3 open source tools small businesses and IT consultants can use to scan the Web for signs of pending attacks. Find out how you can use them.
Netflix released 3 open source tools small businesses and IT consultants can use to scan the Web for signs of pending attacks. Find out how you can use them. [More]

Dairy Queen's Data Leaked Like Ice Cream from a Cone on a Hot Day

by Max Schleicher 9. September 2014 07:45
Dairy Queen's data breach shows you what NOT to do when it comes to data security. Here's what IT professionals can take away from the latest data breach.
Dairy Queen's data breach shows you what NOT to do when it comes to data security. Here's what IT professionals can take away from the latest data breach. [More]

60% of small businesses were hacked at least twice in 2012

Get Free Quotes!