Cybersecurity Best Practices

Cybersecurity resources, best practices, and tips to help our clients protect their firms from increasing and evolving cyber threats, including ransomware attacks.

Best practices and tips

abstract image with a lock and shield

UPDATE: Okta Concludes Investigation, Determines Only Two Tenants Affected

An update from a previous cyber alert. Okta has revealed the impacted customers trace back to a January security incident.

Cyber Alert
  • Cybersecurity
  • Cybersecurity Resources
abstract image with a lock and shield

Microsoft Identifies Critical Remote Code Vulnerability

On April 12, 2022, Microsoft notified users of a remote code execution vulnerability (CVE-2022-26809). Immediate patching is needed.

Cyber Alert
  • Cybersecurity
  • Cybersecurity Resources
abstract image with a lock and shield

SEC Maintains Information Security and Operational Resilience Focus in 2022

The SEC Division of Examinations released their annual Exam Priorities for the fiscal year (FY) 2022 and has highlighted information security and operational resiliency as significant focus areas for examinations.

Cyber Alert
  • Cybersecurity
  • Cybersecurity Resources
abstract blue shapes connected by dots of light

Operational Resilience in Focus, Part One: What is Operational Resilience?

In the first part of our Operational Resiliency Series, we dissect what exactly is operational resiliency, what are its domains, the foundational components, the benefits of operational resiliency and how it's different from business continuity planning.

Article
  • Cybersecurity
  • Cybersecurity Resources
abstract image with a lock and shield

Preliminary Investigation Finds No Evidence of Okta Breach

Screenshots and images of Okta's internal systems were circulated online early March 22nd by the hacking group LAPSUS$.

Cyber Alert
  • Cybersecurity
  • Cybersecurity Resources
abstract image with a lock and shield

Cybersecurity And the Workplace: Part 2

Cybersecurity implications surrounding the Great Resignation. This blog post is the second in a series that aims to breakdown the cybersecurity implications of current trends in the workplace.

Article
  • Cybersecurity
  • Cybersecurity Resources