Call now for cybersecurity help: 888-646-1616

Category: Cybersecurity

Cybersecurity Blog Articles 

Articles in the category ‘Cybersecurity’ have information applicable to individuals and organizations. Learn more about phishing, writing an information security policy, cheap data loss prevention tools, cybersecurity insurance and more by browsing the articles.

Don’t know where to start? Here are some of our favorites:

Have a question for a future blog post or want to learn more about our services? Contact Adelia Risk today!

[Infographic] Some types of multi-factor authentication can be phished!

Dec 01, 2022 by Holly Sagstetter
It's true -- hackers can get around some types of multi-factor authentication (MFA). And this is scary! MFA has long been touted as the best way to protect your accounts. And this is still true. But. MFA is not bulletproof, and certain types of multi-factor authentication are more vulnerable than others. The type of MFA […]
Read more

Behind the Scenes: A Fractional CISO’s True Stories of Cyberattacks

Nov 17, 2022 by Holly Sagstetter
Should a fractional CISO admit to dealing with data breaches? We think so. If you know a fractional CISO (also called virtual CISO or vCISO) that claims they’ve never dealt with a data breach, you know one of two things is true: Data breaches and cyberattacks happen all the time. Even the most robust cybersecurity […]
Read more

Don’t Wait! 11 iPhone Security Settings for Small and Midsize Businesses

Nov 11, 2022 by Holly Sagstetter
If you’re not sure which iPhone security settings to change, you’ve come to the right place. Below are our favorite tips for small and midsize businesses to better protect company data on iPhones. There is one very important step for companies to take first: make sure you are using a Mobile Device Management (MDM) system. […]
Read more

10 Android Security Settings for Small and Midsize Businesses you should address today!

Nov 03, 2022 by Holly Sagstetter
If you’re not sure which Android security settings to change, you’ve come to the right place. Below are our favorite tips for small and midsize businesses to better protect company data on Android devices. There is one very important step for companies to take first: make sure you are using a Mobile Device Management (MDM) […]
Read more

Top 6 Cybersecurity Risk Assessment Templates and Tips for Small/Midsize Businesses

Oct 19, 2022 by Holly Sagstetter
Has your company completed a cybersecurity risk assessment? If you haven’t, you should definitely consider doing it soon. A cybersecurity risk assessment is a great way to learn how to safeguard your company and data from cyberthreats and data breaches. This article will explore what’s involved with a cybersecurity risk assessment, as well as our […]
Read more

SPF, DKIM, DMARC: Prevent Domain Spoofing with Email Authentication Records

Oct 06, 2022 by Holly Sagstetter
What is SPF, DKIM, DMARC? Three important email authentication records that you should definitely know about. It’s unfortunately incredibly easy to send an email and make it look like it came from someone else.  Hackers do it all the time.  They can even make it look like someone from within your own company is emailing […]
Read more

Top 5 Mistakes in a WordPress Security Audit

Sep 29, 2022 by Holly Sagstetter
When’s the last time you completed a WordPress security audit for your website? For many, the answer is never. WordPress is the most popular website builder out there – so many assume its security features are top notch and unhackable. This isn’t really the case! More and more, we are seeing exploitable vulnerabilities in WordPress […]
Read more

MDM for Small Business: 4 Best Practices

Sep 22, 2022 by Holly Sagstetter
Choosing an MDM for small business doesn’t need to be complicated or a hassle. There are many solutions to choose from, including some solutions built right into Microsoft 365 or Google Workspace.  Based on our work with clients, we recognize there is a lot of confusion about mobile security and mobile device management (MDM). Here’s […]
Read more

How do I find all programs on my computer? 3 important reasons to do this today!

Sep 15, 2022 by Holly Sagstetter
When working with clients on cybersecurity tasks, or addressing security vulnerabilities, they sometimes ask, "how do I find all programs on my computer?" The good news is you don’t need to be an IT professional to see all of the programs on your computer. The bad news is you probably have no idea how many […]
Read more

4 Vendor Risk Management Best Practices

Aug 25, 2022 by Holly Sagstetter
In this article, we will share some of our vendor risk management best practices for information security. It’s important to have a methodical approach to determine the risk level of your vendors. Why? If your vendors don’t have strong security, YOU don’t have strong security.  Why should you follow our Vendor Risk Management Best Practices? […]
Read more

Do you think we might be a good match?

Copyright 2025 Adelia Associates, LLC | All Rights Reserved