SEC Cybersecurity Guidance: Mobile Device Management

Protecting Your Business’ Most Sensitive Mobile Data Gone are the days of the rotary phone.  Data is immensely portable.  As we — individuals, consumers, corporate employees, investment advisors and financial investors — continue to rely on our mobile devices for everything, the level and amount of sensitive data that is stored on our mobile devices [...]

SEC Cybersecurity Guidance: Business Continuity Planning (Pt. 2)

Welcome back to SEC Cybersecurity Guidance: Business Continuity Planning.  The first steps (found here in Part 1) are: List your Specific Needs, and Discuss and Document... and here, in Part 2, we talk, and plan, and test. Disclaimer: we are STILL not lawyers.  We are cybersecurity practitioners who work with a lot of registered [...]

SEC Cybersecurity Guidance: Business Continuity Planning (Pt.1)

If you’ve come to this site, you’re probably doing some research about SEC Cybersecurity Guidance. As part of the OCIE Cybersecurity Initiative, #6 in the SEC cybersecurity guidance clearly states that business continuity planning is a priority. Here’s what the SEC Cybersecurity Guidance says: “Please provide a copy of the Firm’s written business continuity [...]

Do You Need Cybersecurity Insurance?

It's a good idea... We have a lot of conversations with our clients about cybersecurity insurance.  Adelia Risk doesn't sell cybersecurity insurance. Instead, we provide a holistic cybersecurity service to small, high value, heavily regulated firms. As part of providing our service, cybersecurity insurance is a common topic. The single biggest misconception that we see? [...]

The Best Ways to Fight Banking Trojans

Banking Trojans are back, and they're nasty. Click on the wrong email, and hackers drain your firm's operating accounts. Incredibly, many of these attacks even defeat your bank's two-factor authentication. Here's a great article that explains how banking trojans bypass two-factor authentication. So what should every business do to protect yourself against banking trojans? The [...]

By |2019-01-04T04:14:12+00:00December 5th, 2018|Computer Cyber Security, Email Cyber Security|0 Comments

Hiring a Penetration Testing Service? 14 Questions to Ask a Reference

If you're thinking of hiring a Penetration Testing service, you definitely need to do your due diligence. There's a wide range of services that penetration testing firms offer, ranging from cheap automated scans to manual expert exploit detection. As part of your due diligence process, here are 14 questions that you should consider asking the [...]

By |2019-01-04T04:12:00+00:00December 2nd, 2018|Computer Cyber Security|0 Comments

13 Fantastic Resources for Writing an Information Security Policy

So, you need to write an information security policy. And you’re totally overwhelmed. Where do you start? What do you need? What should it entail? You’re not alone. These are questions that we get a lot. It’s totally understandable. Planning, writing, and implementing a security policy can be seriously intimidating. If it’s poorly written or [...]

By |2019-01-04T20:09:25+00:00November 10th, 2018|Computer Cyber Security, HIPAA|0 Comments

5 Free Cyber Security Tips for Mac Users

If you’re a Mac user, here are five free things you should do right now. These will help you with your HIPAA compliance and reduce the risk that you’ll be hacked. 1) Encrypt your hard drive Use FileVault, Apple’s built-in hard drive encryption utility. You can get instructions here: https://support.apple.com/en-us/HT204837 2) Take a screenshot to prove [...]

By |2019-01-08T20:23:51+00:00October 18th, 2018|Computer Cyber Security|1 Comment

5 Free Cyber Security Tips for Windows Users

If you’re a Windows user, here are five free things you should do right now. These will help you with your HIPAA compliance and reduce the risk that you’ll be hacked. 1) Encrypt your hard drive Use BitLocker, Microsoft’s built-in hard drive encryption utility. You can get instructions here: https://support.microsoft.com/en-us/help/4028713/windows-10-turn-on-device-encryption 2) Take a screenshot to prove your laptop [...]

By |2019-02-14T21:14:19+00:00October 15th, 2018|Computer Cyber Security|2 Comments