When firms think about cybersecurity, they’re tempted to focus on the tech. Hopefully, you're already having internal conversations about which tools you need to fight phishing or to keep your mobile devices safe. One area where we've seen a lot of firms struggle, though, is in figuring out what to do when something BAD happens. [...]
As businesses are digitally transformed, our exposure to risk is changing. In the financial industry, the stakes are much higher. The SEC Cybersecurity Guidance helps registered investment advisors respond to these threats. It also makes sure that they have a plan in place to respond to them. For example, one such threat is the loss [...]
Protecting Your Business’ Most Sensitive Mobile Data Gone are the days of the rotary phone. Data is immensely portable. As we — individuals, consumers, corporate employees, investment advisors and financial investors — continue to rely on our mobile devices for everything, the level and amount of sensitive data that is stored on our mobile devices [...]
Welcome back to SEC Cybersecurity Guidance: Business Continuity Planning. The first steps (found here in Part 1) are: List your Specific Needs, and Discuss and Document... and here, in Part 2, we talk, and plan, and test. Disclaimer: we are STILL not lawyers. We are cybersecurity practitioners who work with a lot of registered [...]
It's a good idea... We have a lot of conversations with our clients about cybersecurity insurance. Adelia Risk doesn't sell cybersecurity insurance. Instead, we provide a holistic cybersecurity service to small, high value, heavily regulated firms. As part of providing our service, cybersecurity insurance is a common topic. The single biggest misconception that we see? [...]
Website hacked? Are you worried that it might be? More importantly, would you even know if it is? Are you a website hacking target? You might think that your business is too small to be hacked. Think again. You’ll be blown away by these stats, courtesy of a terrific article by Joey Song: [...]
Do you know all of the ways someone can steal PHI from your practice? We've put together a list of 24 ways that people can steal medical data.
Firing an employee, or having an employee leave voluntarily? Use this list of 28 measures to keep your business safe.
Why is it important to have a secure laptop? Losing a laptop or having one stolen can be disastrous for any business. Not only will it leave you unable to work until you find a replacement, but if the laptop has Personal Health Information (PHI) on it, you might have to report a breach under [...]
Figuring out how to avoid a security breach can be overwhelming. There are hundreds of ways that hackers, patients, and employees can steal data if they want, and most organizations don't have the time or money to try to address all of them. Luckily, we can learn from the mistakes of others! "You must [...]