SEC Cybersecurity Guidance: Mobile Device Management

Protecting Your Business’ Most Sensitive Mobile Data Gone are the days of the rotary phone.  Data is immensely portable.  As we — individuals, consumers, corporate employees, investment advisors and financial investors — continue to rely on our mobile devices for everything, the level and amount of sensitive data that is stored on our mobile devices [...]

SEC Cybersecurity Guidance: Business Continuity Planning (Pt. 2)

Welcome back to SEC Cybersecurity Guidance: Business Continuity Planning.  The first steps (found here in Part 1) are: List your Specific Needs, and Discuss and Document... and here, in Part 2, we talk, and plan, and test. Disclaimer: we are STILL not lawyers.  We are cybersecurity practitioners who work with a lot of registered [...]

Do You Need Cybersecurity Insurance?

It's a good idea... We have a lot of conversations with our clients about cybersecurity insurance.  Adelia Risk doesn't sell cybersecurity insurance. Instead, we provide a holistic cybersecurity service to small, high value, heavily regulated firms. As part of providing our service, cybersecurity insurance is a common topic. The single biggest misconception that we see? [...]

The Best Ways to Fight Banking Trojans

Banking Trojans are back, and they're nasty. Click on the wrong email, and hackers drain your firm's operating accounts. Incredibly, many of these attacks even defeat your bank's two-factor authentication. Here's a great article that explains how banking trojans bypass two-factor authentication. So what should every business do to protect yourself against banking trojans? The [...]

By |2019-01-04T04:14:12+00:00December 5th, 2018|Computer Cyber Security, Email Cyber Security|0 Comments

Is Office 365 HIPAA compliant?

Health care providers must follow the Health Insurance Portability and Accountability Act (HIPAA).  Is Office 365 HIPAA compliant, though? This act protects your patient healthcare data (PHI).  As more clinicians are electronically transmitting patient records and other personal information to specialists and medical facilities, it is imperative that we ensure that information is secure. Isn’t [...]

By |2019-02-14T21:09:40+00:00November 14th, 2018|Cloud Cyber Security, Email Cyber Security, HIPAA|1 Comment