Cybersecurity Blog Articles
Articles in the category ‘Cybersecurity’ have information applicable to individuals and organizations. Learn more about phishing, writing an information security policy, cheap data loss prevention tools, cybersecurity insurance and more by browsing the articles.
Don’t know where to start? Here are some of our favorites:
Have a question for a future blog post or want to learn more about our services? Contact Adelia Risk today!
Nov 03, 2022 by Holly Sagstetter
If you’re not sure which Android security settings to change, you’ve come to the right place. Below are our favorite tips for small and midsize businesses to better protect company data on Android devices. There is one very important step for companies to take first: make sure you are using a Mobile Device Management (MDM) […]
Read moreOct 19, 2022 by Holly Sagstetter
Has your company completed a cybersecurity risk assessment? If you haven’t, you should definitely consider doing it soon. A cybersecurity risk assessment is a great way to learn how to safeguard your company and data from cyberthreats and data breaches. This article will explore what’s involved with a cybersecurity risk assessment, as well as our […]
Read moreOct 06, 2022 by Holly Sagstetter
What is SPF, DKIM, DMARC? Three important email authentication records that you should definitely know about. It’s unfortunately incredibly easy to send an email and make it look like it came from someone else. Hackers do it all the time. They can even make it look like someone from within your own company is emailing […]
Read moreSep 29, 2022 by Holly Sagstetter
When’s the last time you completed a WordPress security audit for your website? For many, the answer is never. WordPress is the most popular website builder out there – so many assume its security features are top notch and unhackable. This isn’t really the case! More and more, we are seeing exploitable vulnerabilities in WordPress […]
Read moreSep 22, 2022 by Holly Sagstetter
Choosing an MDM for small business doesn’t need to be complicated or a hassle. There are many solutions to choose from, including some solutions built right into Microsoft 365 or Google Workspace. Based on our work with clients, we recognize there is a lot of confusion about mobile security and mobile device management (MDM). Here’s […]
Read moreSep 15, 2022 by Holly Sagstetter
When working with clients on cybersecurity tasks, or addressing security vulnerabilities, they sometimes ask, "how do I find all programs on my computer?" The good news is you don’t need to be an IT professional to see all of the programs on your computer. The bad news is you probably have no idea how many […]
Read moreAug 25, 2022 by Holly Sagstetter
In this article, we will share some of our vendor risk management best practices for information security. It’s important to have a methodical approach to determine the risk level of your vendors. Why? If your vendors don’t have strong security, YOU don’t have strong security. Why should you follow our Vendor Risk Management Best Practices? […]
Read moreAug 11, 2022 by Holly Sagstetter
Phishing scams can cripple an organization – so it’s important to know how to recognize, prevent, respond, and report phishing. You may think phishing scams are obvious, but this is simply not the case. Phishing scams can be incredibly convincing. This article will dive into some typical phishing red flags, our best phishing prevention tips, […]
Read moreJul 28, 2022 by Holly Sagstetter
Why are firewalls important and do you need one for your small or midsized business? That’s probably the question that led you to this article. Here’s the thing - firewalls are critical security tools, but they are not the only thing you need to stop all cyberattacks. We’ll explain more in the article below. What […]
Read moreJul 21, 2022 by Holly Sagstetter
If you’re wondering how to improve your Mac security, you’ve come to the right place. Macs have excellent security settings, but unfortunately they aren’t always turned on by default. Below are our top 10 best practices for Mac security for small businesses, and lucky for you, you don’t need to be an IT professional to […]
Read more