Cybersecurity Best Practices

Cybersecurity resources, best practices, and tips to help our clients protect their firms from increasing and evolving cyber threats, including ransomware attacks.

Best practices and tips

ACA's Password Best Practices

Password Reset Best Practices

From work-related accounts to online banking or shopping to gym memberships, passwords have long been our golden ticket to accessing the online world and keeping our accounts safe. With so many accounts and passwords, it is no surprise that account users often dread when their passwords expire, forcing them to add to their ever-expanding alphabet soup of passwords. 

Article
  • Cybersecurity Resources
  • Cybersecurity
ACA's Password Best Practices

Password Strength Best Practices

Passwords are the most common method of authentication, but remembering a unique password for each account you have can be a pain. Here are ACA Aponix's best practices for creating and managing passwords to help protect your accounts from a cyber-attack.

Article
  • Cybersecurity
  • Cybersecurity Resources
Protect Your Data at Home

Protecting Your Home's Smart Devices

Our homes are becoming increasingly connected to the outside world through "smart" devices, which work together over your Wi-Fi network to make your home more comfortable, safe, and convenient. Common smart devices include thermostats, televisions, light bulbs, and surveillance systems.

Article
  • Cybersecurity
  • Cybersecurity Resources
Protect Your Online Identity

Protecting Your Online Identity

As cyber security attacks continue to increase in frequency and complexity alongside evolving technologies, the COVID-19 pandemic, and remote work and school, it is essential to prioritize protecting your identity online. Here are some ways you can control the amount of personal information that is available online.

Article
  • Cybersecurity
  • Cybersecurity Resources
Talking to your family about cybersecurity

Talking to Your Family and Friends About Cybersecurity

The recent increase in high-profile cyber incidents have put millions of people around the world at risk for identity theft and other cyber-crimes. This blog post contains tips and information you can share with your family and friends about staying safe online.

Article
  • Cybersecurity
  • Cybersecurity Resources
abstract blue shapes connected by dots of light

Ransomware 101 Part 2: How to Prevent and Detect a Ransomware Attack

Our Ransomware 101 blog series addresses multiple aspects of the ransomware issue, including what you should know and what you should do to protect your firm, your clients, and your finances. In part one, we discussed the evolving and growing threat of ransomware. In this article (part two), we’ll provide a framework for what your organization can do to prevent and detect ransomware attacks.

Article
  • Cybersecurity
  • Cybersecurity Resources