Cybersecurity Blog Articles
Articles in the category ‘Cybersecurity’ have information applicable to individuals and organizations. Learn more about phishing, writing an information security policy, cheap data loss prevention tools, cybersecurity insurance and more by browsing the articles.
Don’t know where to start? Here are some of our favorites:
Have a question for a future blog post or want to learn more about our services? Contact Adelia Risk today!
Dec 01, 2022 by Holly Sagstetter

It's true -- hackers can get around some types of multi-factor authentication (MFA). And this is scary! MFA has long been touted as the best way to protect your accounts. And this is still true. But. MFA is not bulletproof, and certain types of multi-factor authentication are more vulnerable than others. The type of MFA […]
Read moreNov 17, 2022 by Holly Sagstetter

Should a fractional CISO admit to dealing with data breaches? We think so. If you know a fractional CISO (also called virtual CISO or vCISO) that claims they’ve never dealt with a data breach, you know one of two things is true: Data breaches and cyberattacks happen all the time. Even the most robust cybersecurity […]
Read moreNov 11, 2022 by Holly Sagstetter

If you’re not sure which iPhone security settings to change, you’ve come to the right place. Below are our favorite tips for small and midsize businesses to better protect company data on iPhones. There is one very important step for companies to take first: make sure you are using a Mobile Device Management (MDM) system. […]
Read moreNov 03, 2022 by Holly Sagstetter

If you’re not sure which Android security settings to change, you’ve come to the right place. Below are our favorite tips for small and midsize businesses to better protect company data on Android devices. There is one very important step for companies to take first: make sure you are using a Mobile Device Management (MDM) […]
Read moreOct 19, 2022 by Holly Sagstetter

Has your company completed a cybersecurity risk assessment? If you haven’t, you should definitely consider doing it soon. A cybersecurity risk assessment is a great way to learn how to safeguard your company and data from cyberthreats and data breaches. This article will explore what’s involved with a cybersecurity risk assessment, as well as our […]
Read moreOct 06, 2022 by Holly Sagstetter

What is SPF, DKIM, DMARC? Three important email authentication records that you should definitely know about. It’s unfortunately incredibly easy to send an email and make it look like it came from someone else. Hackers do it all the time. They can even make it look like someone from within your own company is emailing […]
Read moreSep 29, 2022 by Holly Sagstetter

When’s the last time you completed a WordPress security audit for your website? For many, the answer is never. WordPress is the most popular website builder out there – so many assume its security features are top notch and unhackable. This isn’t really the case! More and more, we are seeing exploitable vulnerabilities in WordPress […]
Read moreSep 22, 2022 by Holly Sagstetter

Choosing an MDM for small business doesn’t need to be complicated or a hassle. There are many solutions to choose from, including some solutions built right into Microsoft 365 or Google Workspace. Based on our work with clients, we recognize there is a lot of confusion about mobile security and mobile device management (MDM). Here’s […]
Read moreSep 15, 2022 by Holly Sagstetter

When working with clients on cybersecurity tasks, or addressing security vulnerabilities, they sometimes ask, "how do I find all programs on my computer?" The good news is you don’t need to be an IT professional to see all of the programs on your computer. The bad news is you probably have no idea how many […]
Read moreAug 25, 2022 by Holly Sagstetter

In this article, we will share some of our vendor risk management best practices for information security. It’s important to have a methodical approach to determine the risk level of your vendors. Why? If your vendors don’t have strong security, YOU don’t have strong security. Why should you follow our Vendor Risk Management Best Practices? […]
Read more