Call now for cybersecurity help: 888-646-1616

Category: Cybersecurity

Cybersecurity Blog Articles 

Articles in the category ‘Cybersecurity’ have information applicable to individuals and organizations. Learn more about phishing, writing an information security policy, cheap data loss prevention tools, cybersecurity insurance and more by browsing the articles.

Don’t know where to start? Here are some of our favorites:

Have a question for a future blog post or want to learn more about our services? Contact Adelia Risk today!

Phone Number Hacks: 5 Ways to Protect Yourself

September 7, 2020 by Amelia A
As harmless as you may think it is, giving out your phone number is one of the easiest ways to compromise your online security. It’s common knowledge that giving out information online is dangerous. As technology advances, so do the tactics of the hackers, and they adapt to the new cracks in our security. One […]
Read more

6 Simple Steps to Stop a Wifi Hack

August 31, 2020 by Amelia A
Risks of a wifi hack Imagine if someone broke into your wifi?  What harm could they do? Hackers could steal your information, destroy it, or sell it to others  They can plant malware on your device Hackers can also plant illegal things or viruses on your networks if they have the access War drivers, or […]
Read more

Safe Online School: 8 Tips to Stay Secure

August 24, 2020 by Amelia A
As students transition this year to online learning, students are putting their information at risk. Many schools have already begun their fall semester. They are quickly beginning to encounter security issues. Online schooling is forcing students to share all their information online, and this can leave them vulnerable to attacks. A safe online school experience […]
Read more

Ransomware Playbook: 31 Critical Questions to Build Your Own

August 15, 2020 by Josh Ablett
Are you worried about ransomware? You should be.  Ransomware is hitting companies of all sizes, sometimes with disastrous results.   Many companies need to put together a specific plan for ransomware, known as a “ransomware playbook.”  We think even small firms should spend some time planning what they will do if they're hit.    When ransomware hits, […]
Read more

Building an Incident Response Policy

June 8, 2020 by Holly Sagstetter
An important part of any Information Security Policy is an Incident Response Policy. What are you going to do when the bleep hits the fan? Unfortunately, there are so many types of incidents (see below for an example list). But the most important part of the policy is having a process to follow when an […]
Read more

Third-Party Vendor Risk Management: A How-To Guide

June 1, 2020 by Holly Sagstetter
Third-party vendor risk management, or the process of reviewing your third-party vendors, is getting more and more important. Believe it or not, you can blame Target!  I’m sure you remember the Target breach which ended with the CEO being fired, the CIO resigning and 40 million customer accounts being exposed. Not to mention the millions […]
Read more

Information Security Policy: 13 Fantastic Resources

May 19, 2020 by Josh Ablett
Want to save time? Get our free Information Security Policy Template here. So, you need to write an information security policy. And you’re totally overwhelmed. Where do you start? What do you need? What should it entail? You’re not alone. These are questions that we get a lot. It’s totally understandable. Planning, writing, and implementing […]
Read more

What is Typosquatting?

May 18, 2020 by Holly Sagstetter
Typosquatting is a method hackers use to trick you. Attackers can use typosquatting to trick you into visiting a website (so they earn ad revenue at best or steal your data at worst), install malware onto your computer, or combine it with a phishing email. Typosquatting is part of a bigger cybercrime category called cybersquatting. […]
Read more

CMMC vs. NIST 800-171: What US Government Contractors Need to Know

May 11, 2020 by Holly Sagstetter
The NIST 800-171 deadline was December 31, 2017, and the CMMC deadline is coming up in 2020. If you’re a government contractor, you’re probably familiar with NIST 800-171. But what about CMMC? It’s in the process of being created but will be the new standard for future Department of Defense (DoD) contracts. Both NIST 800-171 […]
Read more
Copyright 2020 Adelia Associates, LLC | All Rights Reserved | Sitemap