Your Most Powerful Anti-Data Breach Tool (Spoiler: It’s Client Education)
An IT consultant's work includes more than just installing software and setting up hardware. You may not realize it, but you are also responsible for teaching clients about cyber security. Take the...
View ArticleIT Contractors & Business Owners: Why Hired & Non-Owned Auto Insurance Matters
Here at TechInsurance, we talk to a lot of independent computer programmers, designers, network administrators, and other IT professionals as we help them find the policies that protect their business...
View ArticleA Security Flaw in Google Chrome Can Expose All Your Clients' Passwords:...
This week, there was a lot of buzz over the news that simply by typing in a certain address into your Google Chrome browser, a user could see all their stored passwords. Here's a review of the story in...
View ArticleData Security Remains Top Concern about Cloud Computing Options
"Cloud Computing: Key Trends and Future Effects," a study recently published by IDG Enterprise, highlights that, though cloud hosting and computing programs (including IaaS and SaaS) are growing in...
View ArticleA $2,500 Investment That Can Save Computer Consultants Hundreds of Thousands
For many IT professionals, striking out on their own to launch an independent computer consulting or IT consulting practice is a thrilling step: it means freedom from a restrictive office atmosphere,...
View ArticleStale Coffee: Old Versions of Java Expose Programmers to Cyber Liability
This April, Oracle announced that it will no longer be supporting Java 6 and encouraged all users to update to Java 7. Yet, despite these urgings, more than half of all users still use Java 6.What's...
View ArticleCyber Law Essentials: 3 Laws Every IT Firm Needs to Know
In the United States, there are currently no federal laws standardizing how IT businesses should handle private information and data breaches. This lack of overarching regulations complicates things...
View ArticleYour Most Powerful Anti-Data Breach Tool (Spoiler: It’s Client Education)
An IT consultant's work includes more than just installing software and setting up hardware. You may not realize it, but you are also responsible for teaching clients about cyber security. Take the...
View ArticleWhat Insurance Do Your Independent Contractors Need?
IT project managers often hire subcontractors to work on a project, but who pays for the independent contractor's insurance and what insurance do they need to get? The...
View ArticleYour Client Wants One of These Fancy New Domain Extensions. Here's What to...
In a recent post on Intuit.com, bloggers highlighted some of the benefits of new domain name classes created by ICANN (Internet Corporation for Assigned Names and Numbers).A domain name class is what...
View ArticleRecommendations for IT Professionals Consulting on iOS Security
In the early 2000s, Apple was charming consumers with iPods and iMacs, but most of the business world still relied on Microsoft’s Windows operating system and favored non-Apple devices. When smart...
View ArticleHelp Your Clients Understand the Risks from Third-Party Contractors
Your clients might use third-party vendors to outsource their payroll, HR, IT infrastructure, and all sorts of essential small-business functions. Unfortunately, as Business News Daily reports, this...
View ArticleWhat the Target CIO’s Resignation Reveals about Business Psychology
The Huffington Post reports that Target Corporation's Chief Information Officer, Beth Jacob, has resigned from her position as the company looks to regroup after the largest data breach in U.S....
View ArticleStudy Shows Mobile Developers Are More Valuable Than Ever
Yesterday, our post Internet Marketing & Digital Advertising Professionals: The Value’s in Mobile outlined some new trends in mobile app use. (You can read more about these statistics in the 2014...
View ArticleOscar Pistorius Trial Highlights New Revenue Source for IT Professionals
Last year, Olympic track star Oscar Pistorius allegedly shot and killed his model girlfriend, Reeva Steenkamp. The trial, which has just entered its fourth week, will now extend into April. But what...
View ArticleClients Getting New Gadgets? Help Them Make Smart Choices
The SCORE Small Business Success blog recently predicted that we'd see more and more small businesses looking to upgrade their technology and improve their IT infrastructure. That's good news for IT...
View ArticleCyber Law Essentials: 3 Laws Every IT Firm Needs to Know
In the United States, there are currently no federal laws standardizing how IT businesses should handle private information and data breaches. This lack of overarching regulations complicates things...
View ArticleYour Most Powerful Anti-Data Breach Tool (Spoiler: It’s Client Education)
An IT consultant's work includes more than just installing software and setting up hardware. You may not realize it, but you are also responsible for teaching clients about cyber security. Take the...
View ArticleCommon Risks for IT Project Managers Part 3: Reputational Risks
Chances are, you’ve made a purchase, tried a new restaurant, or visited a new venue because of a recommendation from a friend or family member. You know who you can trust, and you rely on these people...
View Article84% of CIOs Probably Want to Hire You
Mobile Marketer reports that companies will be looking to hire mobile developers and marketing firms in the coming year. According to a new study done by IBM, 84 percent of chief innovation officers...
View Article