FCI

Network Security

A business-grade firewall is your first line of defense to secure your network. It provides advanced security features such as VPN Gateway to extend your secure network to remote users, and capability to link with…

Video Conferencing Best Practices

Video Conferencing software is an excellent tool for virtual meetings while working remotely from home or traveling. To ensure that video conferences are as secure as possible, we’ve prepared best practice guidelines to protect private…

Cost of a Cyber Breach

The cost of a cyber breach could devastate your firm. Investment into cybersecurity protects you by mitigating risk of a breach and increasing the likelihood that your cyber insurance will cover damages. If your firm…

Travel Securely

Usage of a VPN when traveling is the best practice for protecting your data across the internet. There are two major issues however that threaten compliance using a VPN: You must know where your data…

Cybersecurity Insurance

Having Cybersecurity Insurance does not guarantee payout in the event of a claim. In fact, a cybersecurity claim could be denied from the outset if your firm is out of compliance. Inadequate cybersecurity leaves you…

Cybersecurity Risk Assessment

Are you a seller ready to exit or gain momentum by joining a bigger firm? Are you a buyer ready to acquire a successful firm for a growing portfolio? In either case, a cybersecurity risk…

Brian Edelman, Cybersecurity Expert and FCI CEO speaks at Finseca’s Beacon2020: A Virtual Experience

Brian Edelman, Cybersecurity Expert and FCI CEO is presenting at Beacon2020 with Jeff Reed, CISO, Advantage Insurance Network, September 16, 2020 @ 11:30 AM  Beacon by Finseca is a virtual experience connecting attendees to exclusive new content, best-in-class professional development and a community of financial security professionals. Beacon will…

Surprise audit from regulators

Are you ready for a surprise audit from regulators? Do you have all your cyber program policies in place and can you evidence it? Would you like to go through a 1-hour mock audit to…

The Dark Web

The Dark Web is a hidden part of the internet used for illicit purposes. Hackers put stolen credentials up there for sale. A password prefix can help to protect you! Create your password using the…

Printers and scanners

Printers and scanners are often forgotten devices that are important for your firm’s cybersecurity. Did you know there’s a feature on some printers or scanners that can be set to retain a copy of everything…

Properly decommission a computer

There are two options to properly decommission a computer used to access or store private data: destroy or repurpose. You can destroy the hard disk yourself and evidence the process with pictures or hire a…

NYDFS First Cybersecurity Enforcement Action

The New York State Department of Financial Services (NYDFS) filed its first cybersecurity enforcement action against a firm alleging deficient cybersecurity controls and other flaws in cybersecurity practices. Failure to follow cybersecurity policies, neglect to…

FCI Completes MSP Verify Certification

MSP Verify Program Provides Quality Assurance, and Stamp of Reliability for Current, Potential Customers Bloomfield, NJ, November 25, 2019 — FCI today announced that it has successfully completed the MSPAlliance’s MSP Verify Program (MSPV) certification…

Ebix Webinar with Brian Edelman: Worried about Cybersecurity?

Webinar with Brian Edelman, Cybersecurity Expert and FCI CEO. Ebix Smart Office, Thursday, September 19th, 2019, 1:00 PM Eastern Time. A cybersecurity attack occurs once every 39 seconds on average. And every minute, more than…