Filter
Prevent Unsubscribing: How to Keep Your Subscribers
Prevent newsletter unsubscribing: We show you the five most common reasons subscribers unsubscribe from newsletters and how you can still change their mind.
App Data Leak: How a Delivery Service Slopped Up on Security
Gorillas is a Germany delivery service where customers can use an app to do their grocery shopping. A German IT research collective discovered the startup had a massive data security problem...
Content Collaborations: Opportunities and Risks for Site Operators and Bloggers
There are only winners in a successful content collaboration. We tell you how to find the right guest author, what to consider when writing for others and what liability risks you should keep in mind.
145,000 Euros in Damage: Headhunter Places Chief Financial Officer with Criminal Record
A headhunter is required to pay 145,000 euros in damages because he placed a convicted Chief Financial Officer in a company. Find out more about the real damage event here and recruiter liability risks.
How exali's Professional Indemnity Adapts to Your Business
Once insured, always up to date: Why the insurance coverage with Professional Indemnity via exali automatically adapts to changes in your business.
Webinar Security Risks: What Lecturers Need To Keep In Mind
Did you know that the term “webinar” is protected by trademark law and that distance selling law applies to paid e-learning offers? Find out more about the risks associated with webinars here:
Expert Interview: Cyber Security for Companies
In an interview, Stefan Köster tells us how freelancers and small companies can also take effective cyber-security measures and how you can permanently anchor awareness of this issue among your employees.
Programmer Causes Unexpected Winnings: 11.000 Euros in Damages!
A programmer caused significantly more winners in an app sweepstakes than planned. The result: 11,000 euros in damages. We tell you the outcome of this real exali damage event here.
These Tips Will Help you Generate Regular Customers as your Project Comes to an End
Are you putting too much money into acquiring new customers? Why it is worth investing in existing customers and how you can make the most of the end of a project.
Risks for Bloggers: Here’s How to Protect Yourself
In addition to lots of opportunities, the blogging business also offers a lot of risks that can quickly put an end to your confidence in your own business from Poland. In our latest article, we tell you how you can avoid these stumbling blocks and protect yourself appropriately.
Personal Injury Due to Programming Error: Singer Falls Five Meters
Due to an error made by an IT service provider, an opera singer fell five meters: Find out more about this real damage event and why personal injuries can happen in any industry...
Viruses, Worms and Trojans: What Are the Differences and How You Can Protect Yourself
Virus, worm or trojan? We explain the difference between the different types of malware and how you can protect your business from expensive cyber damage.
Data Loss After Security Update – a Real exali Damage Event
A routine activity turned into a nightmare for an IT service provider: When installing a security update for their client, important data disappeared – and the backup was no help. Read about this damage event to find out whether the service provider and client were able to get out of this tricky situation.
Unintentional Emergency in Server Rooms – a Real exali Damage Event
This event kicked up a lot of dust: A company wanted to clean rented server rooms itself and triggered the extinguishing system. Cost of the damage: 80.000 euros.
Customer Property Damaged During Video Shoot - a Real exali Damage Event
Expensive mistake: A media agency damaged their client’s premises while shooting a promotional video. Read here what exactly happened and who paid for the property damage in the end:
Ransomware Risk: How to Protect Your Business Against Becoming a Digital Hostage
Ransomware attacks are among the top threats in cybercrime. The following article tells you how you can protect your business and what you should do in the event of a successful attack.
Have You Received a Written Warning? This Is How You Should Respond
Written warnings have increasingly become a lucrative business model in recent years, but: Not every written warning is actually lawful. Read about who is allowed to issue a written warning and when and how to respond correctly if you receive a warning:
Website Update Error – 90.000 Euros in Revenue Lost
Small mistake, expensive consequences: An IT service provider was supposed to make a small update on his customer’s website and accidentally took all the contact forms offline. Read about how this real damage event from the exali archives ended:
Negative SEO and Black Hat SEO: The Dirty Fight for Keywords
SEO ranking dropped for no reason? How to recognise and protect yourself from a negative SEO attack.
Professional Indemnity Insurance or Legal Expenses Insurance?
“If I have legal expenses insurance, I no longer need Professional Indemnity Insurance” - that’s a common misconception that can get expensive. We explain why legal expenses insurance cannot replace Professional Indemnity Insurance, but only supplement it.
Professional Indemnity Insurance: When is the Best Time to Think About Coverage?
Do you want to start your own business? We tell you why you always need Professional Indemnity Insurance and what benefits founders enjoy.
Top 5 Infringements and How to Avoid them
In addition to being annoying to the self-employed and freelancers, written warnings get very expensive. However, some of them could be avoided right from the start! In the video you will learn which infringements of rights occur most frequently and how to avoid them in the first place.
The 5 Most Common Infringements and how to Avoid them
No infringement of rights, no written warning: We tell you which five violations of rights occured most frequently in practice and how you can avoid them...
Ransomware: A Damage Event Involving a Virus and Inadequate Protection
Everything really went wrong here: After a cyber attack, an IT service provider set about restoring the IT systems of a consulting firm. Human error and outdated technology made this project a real gauntlet – resulting in a claim for compensation.