Call now for cybersecurity help: 888-646-1616

Category: Cybersecurity

Cybersecurity Blog Articles 

Articles in the category ‘Cybersecurity’ have information applicable to individuals and organizations. Learn more about phishing, writing an information security policy, cheap data loss prevention tools, cybersecurity insurance and more by browsing the articles.

Don’t know where to start? Here are some of our favorites:

Have a question for a future blog post or want to learn more about our services? Contact Adelia Risk today!

Can You Spot The Signs of Ransomware? Follow This Simple Guide To Protect Yourself In 2021

January 18, 2021 by Kyle Joyce
The number of reported ransomware attacks exploded in 2020. This guide will give you the knowledge to identify the signs of ransomware, respond to an attack, and implement methods to protect yourself in the future. What is Ransomware and Why Should You Care? Ransomware is a form of malware that encrypts and holds hostage user […]
Read more

The 21 Most Common CMMC Technology Projects

December 30, 2020 by Josh Ablett
Are you getting ready to start down the path of getting your CMMC certification? Based on our recent NIST 800-171 / CMMC projects, here are the 21 most common technology projects that we see companies needing to implement in order to comply. Windows 10 on all PCs where possible.  In-support versions of all server OS […]
Read more

5 Free Windows Cybersecurity Tips

December 30, 2020 by Josh Ablett
Here are five free Windows cybersecurity tips.  Take a moment and do these right now! These will help you with your HIPAA compliance and reduce the risk that you’ll be hacked. 1) Encrypt your hard drive Use BitLocker, Microsoft’s built-in hard drive encryption utility. You can get instructions here: https://support.microsoft.com/en-us/help/4028713/windows-10-turn-on-device-encryption Take a screenshot to prove your […]
Read more

5 Free Mac Cybersecurity Tips

December 30, 2020 by Josh Ablett
Are you a Mac user?  Check out these five free Mac cybersecurity tips.  They're quick and easy, and something you should do right now. These will help you with your cybersecurity compliance and reduce the risk that you’ll be hacked. 1) Encrypt your hard drive Use FileVault, Apple’s built-in hard drive encryption utility. You can […]
Read more

Third-Party Vendor Risk Management: A How-To Guide

December 22, 2020 by Holly Sagstetter
Third-party vendor risk management, or the process of reviewing your third-party vendors, is getting more and more important. Believe it or not, you can blame Target!  I’m sure you remember the Target breach which ended with the CEO being fired, the CIO resigning and 40 million customer accounts being exposed. Not to mention the millions […]
Read more

Ransomware Playbook: 31 Critical Questions to Build Your Own

December 20, 2020 by Josh Ablett
Are you worried about ransomware? You should be.  Ransomware is hitting companies of all sizes, sometimes with disastrous results.   Many companies need to put together a specific plan for ransomware, known as a “ransomware playbook.”  We think even small firms should spend some time planning what they will do if they're hit.    When ransomware hits, […]
Read more

Information Security Policy: 13 Fantastic Resources

December 20, 2020 by Josh Ablett
Want to save time? Get our free Information Security Policy Template here. So, you need to write an information security policy. And you’re totally overwhelmed. Where do you start? What do you need? What should it entail? You’re not alone. These are questions that we get a lot. It’s totally understandable. Planning, writing, and implementing […]
Read more

Building an Incident Response Policy

December 20, 2020 by Holly Sagstetter
An important part of any Information Security Policy is an Incident Response Policy. What are you going to do when the bleep hits the fan? Unfortunately, there are so many types of incidents (see below for an example list). But the most important part of the policy is having a process to follow when an […]
Read more

Secure Cloud Computing: 7 Ways I'd Hack You On AWS

December 15, 2020 by Josh Ablett
If you're like most businesses, you're thinking about moving to the cloud but you're worried about secure cloud computing.  Lower costs, more control, and greater resiliency are all powerful motivators.  But the loss of control of your environment is awfully scary. A move to the cloud presents new security challenges.  There are new tools to learn and […]
Read more
1 2 3 4
Copyright 2021 Adelia Associates, LLC | All Rights Reserved | Sitemap
comments