Call now for cybersecurity help: 888-646-1616

Tag: Info Sec Policy

Sidebar Display

Secure Cloud Computing: 7 Ways I'd Hack You On AWS

Apr 04, 2022 by Josh Ablett
If you're like most businesses, you're thinking about moving to the cloud but you're worried about secure cloud computing.  Lower costs, more control, and greater resiliency are all powerful motivators.  But the loss of control of your environment is awfully scary. A move to the cloud presents new security challenges.  There are new tools to learn and […]
Read more

Information Security Policy: 13 Fantastic Resources

Mar 27, 2022 by Josh Ablett
So, you need to write an information security policy. And you’re totally overwhelmed. Where do you start? What do you need? What should it entail? You’re not alone. These are questions that we get a lot. It’s totally understandable. Planning, writing, and implementing a security policy can be seriously intimidating. If it’s poorly written or […]
Read more

Clean Desk Policy in 2024: Benefits, How-To, Examples

Mar 02, 2022 by Josh Ablett
A Clean Desk Policy doesn’t mean you need to wipe down your desk every day. Although, please do this anyway! A Clean Desk Policy means so much more than that. It means protecting important data like sensitive data and passwords. Yes - passwords - a Clean Desk Policy absolutely means you need to stop writing […]
Read more

CMMC vs. NIST 800-171: What US Government Contractors Need to Know

Jan 11, 2021 by Holly Sagstetter
CMMC and NIST 800-171. Every day we receive emails and phone calls from companies that need help with compliance. Preparing for CMMC certification is a huge undertaking, and you should start preparing NOW if you haven't already.  The NIST 800-171 deadline was December 31, 2017, and CMMC is rolling out now. If you’re a government […]
Read more

5 Free Windows Cybersecurity Tips

Dec 30, 2020 by Josh Ablett
Here are five free Windows cybersecurity tips.  Take a moment and do these right now! These will help you with your HIPAA compliance and reduce the risk that you’ll be hacked. 1) Encrypt your hard drive Use BitLocker, Microsoft’s built-in hard drive encryption utility. You can get instructions here: https://support.microsoft.com/en-us/help/4028713/windows-10-turn-on-device-encryption Take a screenshot to prove your […]
Read more

5 Free Mac Cybersecurity Tips

Dec 30, 2020 by Josh Ablett
Are you a Mac user?  Check out these five free Mac cybersecurity tips.  They're quick and easy, and something you should do right now. These will help you with your cybersecurity compliance and reduce the risk that you’ll be hacked. 1) Encrypt your hard drive Use FileVault, Apple’s built-in hard drive encryption utility. You can […]
Read more

Third-Party Vendor Risk Management: A How-To Guide

Dec 22, 2020 by Holly Sagstetter
Third-party vendor risk management, or the process of reviewing your third-party vendors, is getting more and more important. Believe it or not, you can blame Target!  I’m sure you remember the Target breach which ended with the CEO being fired, the CIO resigning and 40 million customer accounts being exposed. Not to mention the millions […]
Read more

The Definitive Guide to Building an Information Security Policy

Dec 20, 2020 by Holly Sagstetter
Need help with your information security policy? You’ve come to the right place! Building an information security policy takes time. As you’ll see in this article, there are a lot of items to cover. But you can do it!  This article will help you whether you’re writing a brand new information security policy or revising […]
Read more

Building an Incident Response Policy

Dec 20, 2020 by Holly Sagstetter
An important part of any Information Security Policy is an Incident Response Policy. What are you going to do when the bleep hits the fan? Unfortunately, there are so many types of incidents (see below for an example list). But the most important part of the policy is having a process to follow when an […]
Read more

What is Typosquatting?

Dec 15, 2020 by Holly Sagstetter
Typosquatting is a method hackers use to trick you. Attackers can use typosquatting to trick you into visiting a website (so they earn ad revenue at best or steal your data at worst), install malware onto your computer, or combine it with a phishing email. Typosquatting is part of a bigger cybercrime category called cybersquatting. […]
Read more
1 2 3

Do you think we might be a
good match?

We help over 100 of the best financial services, healthcare, and manufacturing companies across the U.S. with their cybersecurity.
About
Blog
Copyright 2024 Adelia Associates, LLC | All Rights Reserved