Confessions from a Password Manager Convert

Posted by Kate Flood

December 26, 2018 at 1:30 PM

Whether you’re looking to make a New Year’s resolution or you’re simply trying to implement some information security best practices, you would be well served to start using a password manager. Why? I'm here to tell you!

Read More

Topics: Information Security

Lessons Learned from 2018’s Biggest Information Security Stories

Posted by Sean Mackey

December 18, 2018 at 10:00 AM

As the media knows, fear sells. These days, it can become a challenge to separate fact from fiction when reading the headlines. For example, a USA TODAY article from earlier this year reports on children succeeding in a “hack-the-election” event, while Slate Magazine tells a different side of the story about the same event.

With 2018 coming to a close, let’s get our facts straight on five of the most important information security stories from this year. Along the way, we’ll pick up some tips to better protect against cyberthreats.

Read More

Topics: Information Security

How to Choose a Cyber Liability Insurance Policy

Posted by Rachel Sonia

August 8, 2018 at 1:30 PM

As more and more data breaches and ransomware attacks make headlines around the world, the need for digital asset protection has become top of mind for many financial advisors and business owners. In yesterday’s post, I outlined some cyber liability insurance basics, including what may and may not be covered if your RIA–broker/dealer has its own policy. Today, I’ll dig a bit deeper into the topic, including how you can assess your risks to determine what coverage you may need so you can choose the right cyber liability policy.

Read More

Topics: Information Security

Breaking It Down: Cyber Liability Insurance and Common Misconceptions

Posted by Rachel Sonia

August 7, 2018 at 10:00 AM

You protect your physical assets from an unforeseen event by purchasing health, life, car, property, traveler’s, and even pet insurance. But what about protecting your digital assets? In today’s world, a cybersecurity breach can devastate your business and harm your reputation, so safeguarding your office from this type of attack is essential.

Read More

Topics: Information Security

Assembling Your Shield: A Risk-Based Approach to Information Security

Posted by Sean Mackey

August 1, 2018 at 1:30 PM

There are a lot of unknowns when it comes to information security. As a financial advisor, you aren’t expected to know everything about security, yet clients rely on you to protect them against the latest threats. How can you confidently reassure them that you’re keeping their information safe?

Read More

Topics: Information Security

New Call-to-action
The Independent Market Observer, Brad McMillan

Follow Us