Google's Blacklist Opens IT Vendors To Possibility Of Costly Lawsuits
TechInsurance warns Web hosting firms, site developers, and network security admins on specific protocol for avoiding fallout from Google's blacklist
November 13, 2013
PRESS RELEASE
CHICAGO, Nov. 12, 2013 /PRNewswire/ -- Small businesses remain prime targets for cybercrime. For small businesses, particularly entering the holiday season, the fallout from an attack is significant: hacked websites' traffic slows to a crawl, especially if they are quarantined ("blacklisted") by Google. That equates to thousands of dollars in lost revenue, as well as lost credibility with customers.
IT professionals would be the first to note that no website is 100% secure, but that fact does not insulate vendors from the fallout from such an attack. TechInsurance, the nation's leading online provider of insurance for small and micro IT businesses, today issued guidelines to help network admins, web hosting companies, and site developers effectively communicate and protect themselves if and when these hacks occur.
"A small business's website is at least as important as its storefront, often regardless of the product or service the business is selling," said Ted Devine, CEO of TechInsurance. "Because IT professionals tend to be far more tech-savvy than their clients, they are frequently the first, last, and only line of defense against attacks that can sideline a business for weeks."
Unfortunately, as Devine noted, that role can translate to liability if and when an attack occurs. "Though the hacker is directly liable, the network admin, webmaster, or developer can be held responsible for lost sales and costs because they failed to prevent an attack," Devine added. To reduce that liability and prevent Errors & Omissions lawsuits, TechInsurance recommends that IT professionals take the following precautions:
You May Also Like
How to Evaluate Hybrid-Cloud Network Policies and Enhance Security
September 18, 2024DORA and PCI DSS 4.0: Scale Your Mainframe Security Strategy Among Evolving Regulations
September 26, 2024Harnessing the Power of Automation to Boost Enterprise Cybersecurity
October 3, 202410 Emerging Vulnerabilities Every Enterprise Should Know
October 30, 2024
State of AI in Cybersecurity: Beyond the Hype
October 30, 2024[Virtual Event] The Essential Guide to Cloud Management
October 17, 2024Black Hat Europe - December 9-12 - Learn More
December 10, 2024SecTor - Canada's IT Security Conference Oct 22-24 - Learn More
October 22, 2024