Cybersecurity Blog Articles
Articles in the category ‘Cybersecurity’ have information applicable to individuals and organizations. Learn more about phishing, writing an information security policy, cheap data loss prevention tools, cybersecurity insurance and more by browsing the articles.
Don’t know where to start? Here are some of our favorites:
Have a question for a future blog post or want to learn more about our services? Contact Adelia Risk today!
Aug 11, 2022 by Holly Sagstetter

Phishing scams can cripple an organization – so it’s important to know how to recognize, prevent, respond, and report phishing. You may think phishing scams are obvious, but this is simply not the case. Phishing scams can be incredibly convincing. This article will dive into some typical phishing red flags, our best phishing prevention tips, […]
Read moreJul 28, 2022 by Holly Sagstetter

Why are firewalls important and do you need one for your small or midsized business? That’s probably the question that led you to this article. Here’s the thing - firewalls are critical security tools, but they are not the only thing you need to stop all cyberattacks. We’ll explain more in the article below. What […]
Read moreJul 21, 2022 by Holly Sagstetter

If you’re wondering how to improve your Mac security, you’ve come to the right place. Macs have excellent security settings, but unfortunately they aren’t always turned on by default. Below are our top 10 best practices for Mac security for small businesses, and lucky for you, you don’t need to be an IT professional to […]
Read moreJul 14, 2022 by Holly Sagstetter

Windows computers have a number of security features to protect your data. Unfortunately, they aren’t always turned on by default. This article details best practices – and in some cases, critical steps (!) that you should take to protect your data and business. And don’t worry, you don’t need to be an IT professional to […]
Read moreJul 07, 2022 by Holly Sagstetter

What are the differences between EDR vs. antivirus? Does your company need one of these solutions or both? These are common questions we receive quite frequently. You will see in this article there is no one-size-fits-all solution. It will depend on your industry, company size, device usage and more. Recently, we’ve been having this conversation […]
Read moreJun 30, 2022 by Douglas Polanco

Worries about public WiFi risks and how to work safely while traveling? You're not alone. We get lots of questions about working safely while traveling. Typically these sorts of articles will reveal the benefits of using a VPN while traveling, and although that advice is usually sound, our main recommendation may surprise you. Public […]
Read moreJun 21, 2022 by Holly Sagstetter

Cyberattacks involving lookalike domains can be incredibly convincing and hard to detect. Let’s explore what a lookalike domain is, how they work, and what you should do about them. What is a Lookalike Domain? A lookalike domain is a website domain with a name very similar to real, legitimate domain names. Lookalike domains are also […]
Read moreJun 16, 2022 by Holly Sagstetter

We've received a lot of questions about CMMC for MSPs. If you’re an MSP, you’ve probably been hearing about CMMC and NIST certification from current and prospective clients. It’s been a confusing couple of years as the DoD tries to solidify and communicate their CMMC program. Government contractors will need to comply, but what about […]
Read moreJun 02, 2022 by Holly Sagstetter

Cybersecurity insurance policies are not all the same, and it’s important to understand the requirements and coverage details. Let’s start with what cybersecurity insurance (sometimes referred to as cyber insurance or cyber liability insurance) actually is. Cybersecurity insurance policies are meant to cover all of the expenses that a firm incurs when it's the victim […]
Read moreApr 04, 2022 by Josh Ablett

If you're like most businesses, you're thinking about moving to the cloud but you're worried about secure cloud computing. Lower costs, more control, and greater resiliency are all powerful motivators. But the loss of control of your environment is awfully scary. A move to the cloud presents new security challenges. There are new tools to learn and […]
Read more