Insurance or no insurance, the problem is very complex and I think it cannot be approached just by choosing a single "route".
First and most important, I think IB's customers should be much better educated about computer security.
In the past I opened a thread considering just this topic, however, that found not much response.
IB's customers being generally hard to attack makes hackers find different victims !
One of the most powerful & efficient tools in computer security is making use of virtualization.
Just by using VMWare or VirtualPC you can realize the "NSA principle": Remember the story (urban myth?): The NSA has 2 Phones and 2 computers on each desk. One for external and one for internal communication.
When both circuits are not connected, the internal circuit cannot be attacked - full stop.
First and most important, I think IB's customers should be much better educated about computer security.
In the past I opened a thread considering just this topic, however, that found not much response.
IB's customers being generally hard to attack makes hackers find different victims !
One of the most powerful & efficient tools in computer security is making use of virtualization.
Just by using VMWare or VirtualPC you can realize the "NSA principle": Remember the story (urban myth?): The NSA has 2 Phones and 2 computers on each desk. One for external and one for internal communication.
When both circuits are not connected, the internal circuit cannot be attacked - full stop.