Cybersecurity Blog Articles
Articles in the category ‘Cybersecurity’ have information applicable to individuals and organizations. Learn more about phishing, writing an information security policy, cheap data loss prevention tools, cybersecurity insurance and more by browsing the articles.
Don’t know where to start? Here are some of our favorites:
Have a question for a future blog post or want to learn more about our services? Contact Adelia Risk today!
Aug 12, 2021 by Kyle Joyce

The clock is ticking for organizations that need to become CMMC compliant. The DoD has laid out their implementation timeline and made it clear that all DoD contracts will include a CMMC level requirement by the end of 2026. Taking your first look at the DoD's documentation can be intimidating. The technical jargon and references […]
Read moreMay 27, 2021 by Holly Sagstetter

CMMC certification is top of mind for any US government contractor. If that’s you, welcome! This article is going to dive into some helpful tips for new and seasoned contractors on their journey towards CMMC certification. The United States Department of Defense (DoD) is launching the Cybersecurity Maturity Model Certification (CMMC) program to standardize cybersecurity […]
Read moreMay 14, 2021 by Kyle Joyce

When is the last time you checked your Wi-Fi security settings? If your answer is "not since the day I bought my router", you should probably keep reading. The COVID-19 pandemic changed the way we work. Employees and managers around the world have realized that we don’t necessarily need to be tied to a physical […]
Read moreApr 21, 2021 by Kyle Joyce

WordPress is the most popular content management system out there today. Of the 1.3 billion websites in existence across the internet, over 455 million of them are using WordPress. A user base that large attracts cybercriminals. Hackers who are aiming to use your website to distribute malware, gain user data, send spam emails, and redirect […]
Read moreApr 14, 2021 by Holly Sagstetter

Do you need help with CMMC compliance? Guess what - so do tons of other US Government contractors. In fact, over the next few years, 300,000 businesses will be required to dramatically improve their IT and cybersecurity due to CMMC. We’re receiving requests every day from companies who need help with CMMC compliance. And we […]
Read moreJan 18, 2021 by Kyle Joyce

The number of reported ransomware attacks exploded in 2020. This guide will give you the knowledge to identify the signs of ransomware, respond to an attack, and implement methods to protect yourself in the future. What is Ransomware and Why Should You Care? Ransomware is a form of malware that encrypts and holds hostage user […]
Read moreJan 11, 2021 by Holly Sagstetter

CMMC and NIST 800-171. Every day we receive emails and phone calls from companies that need help with compliance. Preparing for CMMC certification is a huge undertaking, and you should start preparing NOW if you haven't already. The NIST 800-171 deadline was December 31, 2017, and CMMC is rolling out now. If you’re a government […]
Read moreDec 30, 2020 by Josh Ablett

Are you getting ready to start down the path of getting your CMMC certification? Based on our recent NIST 800-171 / CMMC projects, here are the 21 most common technology projects that we see companies needing to implement in order to comply. Windows 10 on all PCs where possible. In-support versions of all server OS […]
Read moreDec 30, 2020 by Josh Ablett

Here are five free Windows cybersecurity tips. Take a moment and do these right now! These will help you with your HIPAA compliance and reduce the risk that you’ll be hacked. 1) Encrypt your hard drive Use BitLocker, Microsoft’s built-in hard drive encryption utility. You can get instructions here: https://support.microsoft.com/en-us/help/4028713/windows-10-turn-on-device-encryption Take a screenshot to prove your […]
Read moreDec 30, 2020 by Josh Ablett

Are you a Mac user? Check out these five free Mac cybersecurity tips. They're quick and easy, and something you should do right now. These will help you with your cybersecurity compliance and reduce the risk that you’ll be hacked. 1) Encrypt your hard drive Use FileVault, Apple’s built-in hard drive encryption utility. You can […]
Read more