How to be proactive with cyber defense at your RIA

November 18th, 2020

It’s good to have an IT team and/or a third-party partner like a managed services provider (MSP) that helps keep your RIA protected against cyberthreats. It is even better to have all stakeholders involved in preventing data breaches. Here’s how everyone can be proactive when it comes to cybersecurity.

Advanced threat protection features ideal for email security at RIAs

September 21st, 2020

Email security is always important for RIAs. But we’re human and it’s easy to make mistakes as scammers get better and more sophisticated. Phishing emails increasingly look like they are coming from a credible source. It may look like an email from your boss asking you to send a wire to a new account.

Watch out for distributed spam distraction

September 9th, 2020

Most of us get a handful of spam in our email inboxes every day. While spam can be a nuisance, it only takes a few minutes to delete or block it. But if you receive tens of thousands of spam all at the same time, not only will it take you time to deal with it, but they might actually be hiding telltale signs that you’re being attacked by cybercriminals. This tactic is called distributed spam distraction (DSD), and here’s what you need to know about it.
What is DSD?

Researchers uncover new strain of Android malware

June 16th, 2020

The Android operating system (OS) relies on an open-source code that allows users and manufacturers to modify their phones’ or tablets’ OSs. The problem is Android’s open-sourced nature also makes it susceptible to cyberthreats. Recently, security experts found DEFENSOR ID — a new type of Android malware exploiting the system's Accessibility Services.

Secure your RIA’s printers to avoid getting hacked

June 15th, 2020

To achieve foolproof cybersecurity, you must make sure that every endpoint is protected from threats. That means securing every network, every server, every computer — and every printer. Because they’re easily overlooked, print devices can be exploited by hackers and used as an entry point to steal or modify data.

Cybersecurity tips for working remotely

April 15th, 2020

Remote work policies have become a necessity not just because of the current coronavirus crisis, but also for the ways they improve a company’s bottom line and efficiency. Yet despite remote work’s benefits, it leaves you and your company exposed to online scams and other cybersecurity threats. To defend your company and your remote workers, make sure to heed the following tips.

Single sign-on: The key to user management

March 12th, 2020

From complexity requirements to minimum lengths, creating a password for a new online account can be bothersome. If your RIA is struggling with your password policy, single sign-on (SSO) can help. This technology is secure, easy to manage, and eliminates the need to remember a long list of usernames and passwords.

Hackers come in all shapes and sizes

March 12th, 2020

Hackers are known by the general public as cybercriminals, especially with news about millions of customers information being stolen and government agencies paying ransoms hackers. However, did you know that not all hackers are bad guys? Read on to learn more about them.

Office 365 hacking: What you need to know

February 19th, 2020

With over 150 million active subscribers, Office 365 is, unsurprisingly, on top of hackers’ minds. And now, hackers are using a technique that doesn’t even require users to give up their credentials. Learn how they do it and get protected.

A phishing scam that harvests users’ credentials

The latest cyberattack on Microsoft Office 365 involves harvesting users’ credentials.