Cybersecurity Blog Articles
Articles in the category ‘Cybersecurity’ have information applicable to individuals and organizations. Learn more about phishing, writing an information security policy, cheap data loss prevention tools, cybersecurity insurance and more by browsing the articles.
Don’t know where to start? Here are some of our favorites:
Have a question for a future blog post or want to learn more about our services? Contact Adelia Risk today!
Dec 22, 2020 by Holly Sagstetter

Third-party vendor risk management, or the process of reviewing your third-party vendors, is getting more and more important. Believe it or not, you can blame Target! I’m sure you remember the Target breach which ended with the CEO being fired, the CIO resigning and 40 million customer accounts being exposed. Not to mention the millions […]
Read moreDec 20, 2020 by Josh Ablett

Are you worried about ransomware? You should be. Ransomware is hitting companies of all sizes, sometimes with disastrous results. Many companies need to put together a specific plan for ransomware, known as a “ransomware playbook.” We think even small firms should spend some time planning what they will do if they're hit. When ransomware hits, […]
Read moreDec 20, 2020 by Holly Sagstetter

Need help with your information security policy? You’ve come to the right place! Building an information security policy takes time. As you’ll see in this article, there are a lot of items to cover. But you can do it! This article will help you whether you’re writing a brand new information security policy or revising […]
Read moreDec 20, 2020 by Holly Sagstetter

An important part of any Information Security Policy is an Incident Response Policy. What are you going to do when the bleep hits the fan? Unfortunately, there are so many types of incidents (see below for an example list). But the most important part of the policy is having a process to follow when an […]
Read moreDec 15, 2020 by Holly Sagstetter

Typosquatting is a method hackers use to trick you. Attackers can use typosquatting to trick you into visiting a website (so they earn ad revenue at best or steal your data at worst), install malware onto your computer, or combine it with a phishing email. Typosquatting is part of a bigger cybercrime category called cybersquatting. […]
Read moreDec 10, 2020 by Holly Sagstetter

Setting up a Security Operations Center (SOC) is a huge task. It often involves hiring and training staff, licensing and configuring a Security Information and Event Management (SIEM) system and creating numerous processes and procedures. You have options: create your own, outsource the whole thing, or do a combination of the two. The end result […]
Read moreDec 09, 2020 by Holly Sagstetter

What do you do with data breach notifications? You’ve most likely received a few notices from big and small companies over the years. They apologize, ask you to change your password and explain how they’re going to prevent data breaches in the future. Unfortunately, it’s quite common for companies to learn about data breaches weeks, […]
Read moreDec 05, 2020 by Holly Sagstetter

We are now living in a world where most people work from home. Due to COVID-19, experts are saying that if you can stay home, you should stay home. Employers are scrambling to make sure employees have the tools they need AND that they are keeping data safe. By offering remote access, you're doing the […]
Read moreDec 02, 2020 by Holly Sagstetter

What is Spear Phishing? Here's an example: Imagine you get an email from a friend or family member asking for you to send the password for one of your accounts. The email looks too close to their actual email address for you to see a difference. The person sending the email uses a lot of […]
Read moreDec 01, 2020 by Josh Ablett

The best phishing tip? It's simple and it works! Last week, we were sitting in a conference room with 20 people. These were smart people. All highly educated. They all use computers every single day. We were talking to them about ways to keep safe online. The conversation ranged from phishing to ransomware to staying […]
Read more