Cybersecurity Best Practices

Cybersecurity resources, best practices, and tips to help our clients protect their firms from increasing and evolving cyber threats, including ransomware attacks.

Best practices and tips

abstract image with a lock and shield

Firms Receive Phishing Attempts From False FINRA and SIPC Domains

ACA confirmed several firms received a wave of phishing emails from fake FINRA email domains.

Cyber Alert
  • Cybersecurity Resources
  • Cybersecurity
abstract image with a lock and shield

Microsoft Notifies of Two Critical, Potentially Exploitable Vulnerabilities

Immediate Action is Advised to address two critical, potentially exploitable vulnerabilities: CVE-2022-30136 and CVE-2022-30190.

Cyber Alert
  • Cybersecurity
  • Cybersecurity Resources
abstract image with a lock and shield

CISA Issues Emergency Directive and Cybersecurity Advisory for VMware Vulnerabilities

The Cybersecurity & Infrastructure Security Agency (CISA) issued Cybersecurity Advisory (CSA) AA22-138B and Emergency Directive (ED) 22-03 alerting users to active vulnerabilities susceptible to exploitation in several VMware products.

Cyber Alert
  • Cybersecurity
  • Cybersecurity Resources
abstract image with a lock and shield

Global Cybersecurity Authorities Warn of Cyber Threats Against Managed Service Providers

The joint Cybersecurity Advisory (CSA) advises that MSPs, are prime targets for cyber-attacks, a trend likely to continue for the foreseeable future, as threat actors aim to exploit the innate trust in MSP-customer relationships.

Cyber Alert
  • Cybersecurity
  • Cybersecurity Resources
abstract image with a lock and shield

SEC Increases The Size Of Their Crypto Assets and Cyber Unit

With new challenges and risks crypto poses to investors, the U.S. Securities and Exchange Commission endeavors to dedicate more resources to protect market participants from securities law violations related to crypto.

Cyber Alert
  • Cybersecurity
  • Cybersecurity Resources
  • Compliance
abstract blue shapes connected by dots of light

Cybersecurity And The Workplace: Part 3

In part 3 of our series, we discuss how to confront cybersecurity workforce shortages through flexible hiring and retention strategies

Article
  • Cybersecurity
  • Cybersecurity Resources