Aegis Blog

Six ways to keep hackers out

Six ways to keep hackers out

You can't guarantee the integrity of your website. Like a physical storefront, people will sometimes find ways to elude your security and get access to your information. That's why getting IT contractor insurance is an important part of staying safe. However, just like you wouldn't leave the doors to your store unlocked or your most valuable merchandise within easy purloining distance, there are ways to make sure that your digital data is as locked ...
Small businesses face both high-tech and low-tech threats

Small businesses face both high-tech and low-tech threats

Hacking technology is getting more complicated every day, with criminals devising new and devious ways to bilk business owners of their money and personal information. It's important to note, however, that not all attacks are of the high-tech variety. Even modern scammers are not opposed to using crude methods to rip people off.One simplistic scam involves wrapping aluminum foil around the antenna of a credit card reader. With the signal blocked, it's much easier ...
New technology solutions require increased technology insurance

New technology solutions require increased technology insurance

Tech industry analysts are using the new year as an opportunity to project the exciting changes and new innovations of 2014. As has been the case for the past several years, the focus around technology is the advancement of mobility, particularly in the business space.Many suspect that 2014 will be the year mobility finally becomes commonplace in corporate culture. An article in the online publication SitePoint says this will be the year of the ...
How to use technology to improve your business

How to use technology to improve your business

There's no doubt that technology makes businesses run more smoothly. Communication is faster, information is more readily available and processes that once took days can now be done in a mere matter of minutes. Despite this, it remains a source of confusion for some companies, who are forced to deal with a level of complexity that they hadn't previously considered. This tension—between facilitation and frustration—highlights the need to deploy advancements intelligently.The world is becoming ...
News Corp acquisition proves even traditional companies need IT contractor liability insurance

News Corp acquisition proves even traditional companies need IT contractor liability insurance

There's a lingering perception that traditional media companies aren't open to technological progress. However, a quick glance at their history of acquisitions suggests that this idea is misguided. On Friday, New Corps further dispelled that myth when the media giant shelled out $25 million for Storyful. The Ireland-based startup curates new-based social media content, including justice-related stories like protests and violent conflict. Newsy, a similar company, was acquired for $35 million by print corporation Scripps. These acquisitions, ...
Expected rise of cloud computing highlights need for technology insurance

Expected rise of cloud computing highlights need for technology insurance

In technology, like in business, if you don't keep up you'll get left behind. Failure to adapt to changing climates has been the death knell of a slew of companies. On the flip side, positioning your business to take advantage of innovations can be an invaluable asset to success. One such opportunity is cloud computing.  Just as with smartphones, we're quickly approaching a time where using offsite servers to store massive amounts of data is ...
With corporate-owned smartphones on the rise, technology insurance remains important

With corporate-owned smartphones on the rise, technology insurance remains important

After months of the market swinging towards a bring-your-own-device model (BYOD), the corporate-owned smartphone seems to be coming back into vogue. According to Strategy Analytics, corporate smartphone purchases have experienced an uptick over the first nine months of 2013. This suggests an underlying shift in the way that companies are evaluating their mobile technology decisions. Total purchases are up 34 percent over a year ago, with 73 million businesses purchasing directly for their employees in ...
Text attacks could force smartphone reboot

Text attacks could force smartphone reboot

Google Nexus owners might be vulnerable to an insidious sort of SMS attack.  According to reports, attackers are able to force this particular sort of smartphone offline by sending a high number of a particular sort of message. It seemingly affects all Android 4.x firmware versions on the Google Galaxy Nexus, Nexus 4 and Nexus 5 devices. The issue arises if the perpetrator sends several dozen Flash SMS or instantly appearing messages. If they aren't dismissed, ...
Four ways hackers sneak into your systems — and how to defend yourself

Four ways hackers sneak into your systems — and how to defend yourself

Before the proliferation of technology, protecting your business was as simple as pulling a grate down before you left for the day. In this new digital age, things get a little bit more complicated, since criminals have more tools at their disposal to commit their misdeeds. Here are a few common weaknesses exploited by crooks — and how you can protect yourself.  Non-secure passwords: With a medium-end graphics card, a would-be intruder can run hundreds of ...
Government may be lacking in IT security training

Government may be lacking in IT security training

Information is the lifeblood of a wide range of businesses, and the government is no exception. Especially in these sectors, security is critical: employees need to be fully able to make sure that sensitive data is only seen by those with proper clearance. However, we might not be providing adequate IT training entrusted to that task.  A recent article in Information Week described the nature of the problem. In it, author W. Hord Tipton describes how ...

 

Loading...