Cybersecurity Blog Articles
Articles in the category ‘Cybersecurity’ have information applicable to individuals and organizations. Learn more about phishing, writing an information security policy, cheap data loss prevention tools, cybersecurity insurance and more by browsing the articles.
Don’t know where to start? Here are some of our favorites:
Have a question for a future blog post or want to learn more about our services? Contact Adelia Risk today!
Jul 25, 2023 by Josh Ablett

How to handle a suspected cybersecurity attack at work? Recently, we helped a client through a simulated cybersecurity issue. It was a big reminder of how important it is to be ready and act quickly. In the simulated event, an email from one of our clients was compromised by a hacker. The hacker used it […]
Read moreJun 23, 2023 by Holly Sagstetter

Looking for a ready-to-use incident response policy template? You’ve come to the right place! Businesses face a multitude of cyber threats that can disrupt operations, compromise sensitive data, and damage their reputation. To effectively combat these threats, having a well-defined response policy is crucial. We understand the challenges businesses face in crafting such policies from […]
Read moreMay 25, 2023 by Josh Ablett

In today's rapidly evolving business landscape, artificial intelligence has emerged as a transformative force, enhancing operational efficiency and productivity. However, as AI continues to advance, it also brings forth security risks that businesses must proactively address. As a trusted vCISO service provider, we have received numerous inquiries from our clients expressing concerns about potential threats […]
Read moreApr 25, 2023 by Josh Ablett

In today's digital age, cybersecurity is more critical than ever before. The ever-evolving cybersecurity threats pose a significant risk to businesses, making it increasingly challenging for them to safeguard their sensitive data and digital assets. That's why it's crucial for organizations to prioritize their cybersecurity strategy and seek expert guidance to stay ahead of the […]
Read moreApr 18, 2023 by Holly Sagstetter

In today's digital landscape, ensuring the security of sensitive data is of paramount importance for businesses. One crucial step in demonstrating your commitment to information security is achieving and maintaining SOC 2 compliance. This blog post will guide you through the key aspects of the auditing standard, helping you to better understand the necessary preparations […]
Read moreDec 08, 2022 by Holly Sagstetter

Smishing, also called SMS phishing or text message phishing, is a growing problem for many individuals and businesses. Smishing is a phishing message that uses your cell phone as the attack platform. Cyberattackers use smishing to do the following: Like phishing emails, smishing messages are not always obvious, and can sometimes be harder to detect. […]
Read moreDec 01, 2022 by Holly Sagstetter

It's true -- hackers can get around some types of multi-factor authentication (MFA). And this is scary! MFA has long been touted as the best way to protect your accounts. And this is still true. But. MFA is not bulletproof, and certain types of multi-factor authentication are more vulnerable than others. The type of MFA […]
Read moreNov 17, 2022 by Holly Sagstetter

Should a fractional CISO admit to dealing with data breaches? We think so. If you know a fractional CISO (also called virtual CISO or vCISO) that claims they’ve never dealt with a data breach, you know one of two things is true: Data breaches and cyberattacks happen all the time. Even the most robust cybersecurity […]
Read moreNov 11, 2022 by Holly Sagstetter

If you’re not sure which iPhone security settings to change, you’ve come to the right place. Below are our favorite tips for small and midsize businesses to better protect company data on iPhones. There is one very important step for companies to take first: make sure you are using a Mobile Device Management (MDM) system. […]
Read moreNov 03, 2022 by Holly Sagstetter

If you’re not sure which Android security settings to change, you’ve come to the right place. Below are our favorite tips for small and midsize businesses to better protect company data on Android devices. There is one very important step for companies to take first: make sure you are using a Mobile Device Management (MDM) […]
Read more