FCI

Ransomware Protection

Ransomware incidents are up 300% in the past year and remain a top cyber threat as attacks continue to surge against the financial sector. Implementing cybersecurity technical controls is the best defense against ransomware attack.…

Brian Edelman, Cybersecurity Expert & FCI CEO, cited in Ebix article

Link to: What the SEC Cybersecurity Crackdown Means for Financial Advisers  Recent SEC Enforcement Actions against eight financial firms for violations of cybersecurity safeguards is a clear signal that implementation of cybersecurity controls is paramount for protection and to avoid penalty.  In discussion with Ebix, Brian Edelman, Cybersecurity Expert and FCI CEO, shared that “Broker-dealers and financial institutions have…

Cybersecurity Risk Assessment

As firms face an increased rate of sophisticated cyberattacks, there is no better time to execute a Cybersecurity Risk Assessment. Proactive vulnerability scans and network penetration testing of your environment allows for risk identification and…

3iCO article cites Brian Edelman, Cybersecurity Expert & FCI CEO

Link to the article: The Increasing Importance of Cybersecurity for Registered Investment Advisors 3iCO is a NY based provider of Independent Compliance Officers for Independent Investment Advisers and Private Funds. As compliance and legal professionals,…

Beware of Phishing

Phishing remains a leading cybersecurity threat as cybercriminals use increasingly sophisticated tactics to obtain private data by exploiting human behavior. Posing as a known contact or trusted organization, phishing aims to trick users into providing…

Your Own Gateway VPN

When working remotely or traveling, best practice for securing data across the internet is use of a business-grade firewall with a gateway VPN (Virtual Private Network) that enables encrypted internet connection from anywhere in the…

Ensure Encryption

Encryption is a vital cybersecurity safeguard that protects data while at rest on your device and in transit across a network. Made possible by cryptography, the technique of applying an algorithm to scramble data in…

Keep Your OS Current

Cybersecurity regulations require that you use a currently supported Operating System (OS) version. OS software has a lifecycle defined by the manufacturer during which critical security updates are issued. When an OS approaches “end of…

Audit Preparedness

When it comes to audit preparedness are you a Cyber Ant or Grasshopper? If you don’t have a strong cybersecurity program and safeguards in place by the time Regulators come knocking, it’s already too late.…

Hybrid Workforce Cybersecurity

Especially given the last year, we must stop segregating home, traveler, and office users and instead treat all users the same way. The high-level of security you had in the past for office users should…

NIST-based Asset Inventory Report

In the event of an Audit or Breach, you may be required to demonstrate a list of your assets and their cyber posture. Your NIST-based Asset Inventory Report documents endpoints and their cyber settings, cyber…

POAMs

When reviewing cybersecurity regulation requirements, you may think the expectation is to achieve perfection but what Regulators and Authorities want to see is continual improvement of safeguards rather than an end unto itself. Your cyber…

DLP Confusion

The confusion related to “DLP” is fueled by the fact there are two definitions of the same acronym, Data Leakage Prevention and Data Loss Protection, which are often interchanged as Data Leakage Protection and Data…

Reboot Your Computer

One critical but simple action to significantly improve cybersecurity & system performance is routine System Reboot. As a best practice and as required by some regulations your operating system and antivirus should be maintained as…

Vendor Risk Management

The best way to minimize risk when working with a vendor that handles your private data in providing service to you is to perform Vendor Risk Assessment, which requests demonstration of the same safeguards and…

Cost vs Benefits

Data Breaches are costly. Did you know that 60% of firms go out of business within 6 months of experiencing a breach? Damage ranging from significant financial loss to lasting destruction of your firm’s reputation…

Smartphone Security

Think you’re saving money on your Smartphone data plan by utilizing free WiFi? Think again. Smartphone data is most secure when kept within your provider’s network. The moment you change your network to free WiFi…

Dark Web Data

Your private data or user credentials could be for sale on the dark web right now put there by cybercriminals who work around the clock to exploit weaknesses in cybersecurity. Cybercrime has significant negative impact…

How To Select A Cybersecurity Provider

Selecting a cybersecurity vendor is an important decision that may affect your users’ productivity, your clients’ trust, your bottom line and the way regulators and authorities will treat you in the event of a cybersecurity breach. 

Multifactor Authentication

Requiring Multi-Factor Authentication (MFA) for all user accounts helps protect devices and the data that’s accessible to users. MFA is the process of verifying identity on sign in to confirm that an access request is…