Tech Blog Series

  1. Tech Blog Series: PII Protection (Part 1)

    September 26, 2014

    What is PII? According to the United States Department of Labor, personally identifiable information, or PII, is information that either: identifies a specific individual (direct identification) or identifies individuals by their connection with data elements, such as gender, race, and other demographic information (indirect identification). There are different types of PII but the one businesses […]

  2. Tech Blog Series: Email Security

    July 11, 2014

    In today’s market, email is commonly designated as the most convenient and preferred method of communication between businesses and people alike. Therefore, it is important to keep your email accounts and information secure. Increasingly, hackers have been breaching email security to access an individual?s personal information. In this post, we will show you how to […]

  3. Tech Blog Series: Choosing the Right Anti-Virus Software

    June 27, 2014

    As part of our Tech Blog Series, our team has compiled some of the most useful tech-related information in our arsenal to help your firm run at its most efficient level. In this post, you will find a guide for purchasing an antivirus software system. Along with firewall software and good password practices, anti-virus software […]

  4. Tech Blog Series: Password Protection Practices

    June 20, 2014

    Think about how many passwords you use on a daily basis. Sometimes we lose sight of how much security they actually provide, but checking your email, getting on Facebook, and paying your bills all require a password for good reason. With increased technology, hackers are now able to crack passwords faster than ever, making it […]

  5. Tech Blog Series: Firewall Protection for Small Firms

    May 14, 2014

    Today, firewall protection is a basic need for both business and home networks. Since most computers come with some type of firewall protection right out of the box, many people do not see the need to invest in additional protection. Although some networks can be adequately protected under basic firewall protection, most cannot. This includes […]

  6. Introducing: Protexure Accountants’ Tech Blog Series

    May 2, 2014

    In 2013, companies across the United States adopted a variety of new technology. Whether it was moving to a Cloud storage system, or embracing social media, chances are your firm did too. While these new technologies can improve your firm in a variety of ways, their adoption comes with a fair share of risk. With […]

Amerinst  Insurance  Group,  LTD. /// Providing  Protection  for   Generations  of  Professional  Firms