October is Cybersecurity Awareness Month, and since we’ve written A LOT about security over the last few years, we thought it would be helpful to share some of our favorite articles. Here are some of Eze’s latest and greatest cybersecurity articles – happy reading!
- Be smart when browsing/surfing the Internet or clicking links
- Lock your computer and mobile phone(s) when you leave your desk and/or office
- Use care when entering passwords in front of others
- Allow others to use your login ID or password
- Use the same password for every
- Store passwords on a piece of paper or other easily accessible document
- Open email or attachments if the sender is unknown or suspicious
Looking for more cybersecurity best practices to share with your users? Read more dos and don’ts here.
Due to changes in the cyber security landscape, traditional firewalls on the port level are no longer effective at managing traffic. Malicious traffic has the capacity to enter any open port, which invites significant risk into a firm. Next-generation firewalls work further than port-based firewalls by adding application inspection and intrusion prevention. Next generation firewalls have the ability to scan traffic as it enters and leaves the network, therefore stopping potential threats.
Read more about implementing next-gen firewalls to take your firm’s security preparedness to the next level.
The cybersecurity threat landscape continues to evolve, leaving behind significant operational and reputational harm for financial services firms. Cyber-attacks such as those impacting Equifax, LinkedIn, Yahoo and Sony have forced cybersecurity into the limelight via news-making headlines, enough to fill any business with trepidation.
We hear and see a lot of information floating around – some of which, unfortunately, can be misleading or, at times, inaccurate. It is imperative that firms understand how to separate the facts from fiction and develop and deploy sophisticated and appropriate approaches to information security. Click here to uncover six common myths about cybersecurity.
We educate our clients all the time about how to keep their organizations secure and mitigate against insider and outsider threats. But one area of security often overlooked is that of the home office – and the home itself on a larger scale. With new technologies constantly being released – and many of today’s devices linked via the Internet of Things (IoT) – the likelihood of being hacked or having private information stolen also increases.
But what if these technologies are jeopardizing the inherent privacy of your own home? Let’s take a look into the future.
When it comes to cybersecurity protections, many firms often fall short. In this article, we highlight the top security gaps commonly identified during an IT risk assessment, including patch management, data classification, and more. Click here to discover all 10 – and read up on best practices to avoid them.
When was the last time you changed your passwords? What about conducting a simulated phishing exercise? With so many cyber program elements to remember, it’s easy to get overwhelmed. To help, we’ve outlined a basic calendar of security reminders to keep you on track. Get your 12-month calendar here.
We live in a dynamic world. Technology is evolving quickly, and IT outsourcing increasingly makes more sense for firms that aren’t able to keep pace with changing requirements and would rather focus on core competencies. But will outsourcing your technology management open you up to more risk or less? Click here to read more.
There’s a lot to fear in the cyber world: rogue nation states, professional cyber criminals and would-be hacktivists, just to name a few. We took a poll to find out what invesment firms consider their biggest cybersecurity fears. Click here to find out why the cyber threats below are eliciting the most fear.