Help Your Clients Understand the Risks from Third-Party Contractors
Your clients might use third-party vendors to outsource their payroll, HR, IT infrastructure, and all sorts of essential small-business functions. Unfortunately, as Business News Daily reports, this...
View ArticleWhen a Client’s Data Breach Is Good News
In a bizarre twist of fate, the company that makes Target's security software saw its stock price jump after the data breach. How did this happen?In order to understand why the Target data breach is...
View Article$3 Million Settlement Paves the Way for Non-Identity-Theft Data Breach Awards
Computer World reports that a federal court in Florida just issued a game-changing verdict about data breaches. The court decided that companies are liable to pay damages to all customers whose data is...
View Article84% of CIOs Probably Want to Hire You
Mobile Marketer reports that companies will be looking to hire mobile developers and marketing firms in the coming year. According to a new study done by IBM, 84 percent of chief innovation officers...
View ArticleGmail Just Got Safer (But You Could Still Be Sued)
According to the corporate law magazine InsideCouncil, Google has increased its Gmail security standards in order to ease customer concern and provide a more secure email platform to companies that...
View ArticleYour Clients Want Mobile Payments? Here’s What to Tell Them
What do fast food companies Wendy's and Burger King and the fashion store Express all have in common? They've recently announced they will be accepting mobile payments.This is part of growing trend to...
View ArticleWhat Happens if I Don’t Update Windows XP?
As an IT professional, you've probably heard the news that Microsoft will no longer be supporting Windows XP, but what do you do about clients who are still using this old Windows operating...
View ArticleGadgets over Gals & Guys? Survey Says Gear Beats Humans
According to an Inc. magazine article, research shows that small-business owners think it's smarter to spend money on new technology than on new employees. Why is that? Small-business owners think...
View ArticleWhat IT Businesses Need to Know about the Future of Identity Theft, Data...
While you might assume that the Target data breach was caused by a coordinated and sophisticated malware attack, the truth is much more frightening.SecurityWeek.com profiles MacAfee's investigation of...
View ArticleOscar Pistorius Trial Highlights New Revenue Source for IT Professionals
Last year, Olympic track star Oscar Pistorius allegedly shot and killed his model girlfriend, Reeva Steenkamp. The trial, which has just entered its fourth week, will now extend into April. But what...
View ArticleData Breach Laws? Looks like Europe Took Care of It for Us
Industry news site Net-Security.org reports that a recent bill voted on in the European Union parliament might increase the data security burden U.S. companies have, even if they don't directly do...
View ArticleClients Getting New Gadgets? Help Them Make Smart Choices
The SCORE Small Business Success blog recently predicted that we'd see more and more small businesses looking to upgrade their technology and improve their IT infrastructure. That's good news for IT...
View Article$3 Million Settlement Paves the Way for Non-Identity-Theft Data Breach Awards
Computer World reports that a federal court in Florida just issued a game-changing verdict about data breaches. The court decided that companies are liable to pay damages to all customers whose data is...
View ArticleData Breach vs. Identity Theft: Help Your Clients Understand the Difference
What is the difference between a data breach and identity theft? In the media, many people toss around these terms willy-nilly. They are connected, of course, but understanding the difference is...
View ArticleCourts Slowly Build Tech Case Law: App Thieves Punished
Political news site The Hill reports good news for mobile app developers: the Justice Department has officially convicted its first mobile app pirates. These criminals set up app piracy sites called...
View ArticleSurvey: 28% of U.S. Companies Have No Mobile Strategy. Make Them Your Clients
Broadband and telecom news site Telecompetitor reports on a new survey that says more than a quarter of companies lag behind the times and don't have a mobile marketing strategy. This news means...
View ArticleThe Next Generation of Business Data Breach: IP Theft
What is IP theft? It's the stealing of intellectual property, designs, patents, code, and other intangible assets. IT theft is becoming more and more common and costly – and even small IT firms can end...
View ArticleSurvey Shows Muggles Still Don’t Get Data Breaches
People outside of the tech industry get more than a little confused when you talk about data breaches, identity theft, and pretty much any of the technical aspects of data security. Unfortunately, this...
View ArticleThe Most Heartwarming Data Breach Story You'll Read All Year
USA Today reports the story of a data breach so easy a kid could do it…literally. A five-year-old named Kristoffer Von Hassel figured out a way to hack into his dad's Xbox account in order to play...
View ArticleThe Million-Dollar Client Conversation
Wouldn't it be great if there were a simple way to reduce the likelihood and cost of a data breach? Well, there is. Simply having a conversation can fix many of the misconceptions employees and clients...
View Article