- The FPA Blog -
Valuable Technology Insights
for Los Angeles Businesses

Blog Topics

Top Cybersecurity Terms Everyone Should Know

Jan 16, 2020

Cybersecurity is the buzzword of the day and rightfully so. With all the ransomware, CEO fraud, and other vulnerabilities, it's a critical concept we as IT professionals need to stay ahead of. This means, now more than ever, there are more cyber ...

Read More
Share:
Cyber Liability Insurance-1-782950-edited

4 Tips For Buying Cyber Liability Insurance

Jan 02, 2020

When you buy a house or a car, you’re sure to purchase adequate insurance to protect both in the case that something bad happens. For your business, I'm sure you also have insurance to protect various aspects of it.  I wish I could say that this ...

Read More
Share:
Why Data Leakage Should Matter to Los Angeles CPAs

What is Data Leakage And Why It Should Matter to You

Dec 09, 2019

Data leakage, simply put, is the unauthorized transfer of information from a computer inside of your organization to somewhere (or someone) outside of your organization. The key word here is "unauthorized."  As a business professional, your ...

Read More
Share:

Security? But No One Wants Our Data.

Sep 26, 2019

“No one wants our data." In poker, there's this thing known as a "tell."  It's a mannerism or habit that indicates or "tells" your competitor something about  you - usually it's something that says either you have a great hand or you're bluffing.  ...

Read More
Share:

8 Ways to Protect Your Business From Ransomware

Aug 29, 2019

Ransomware.  The word should send a shiver down any responsible IT support person's spine.  There's nothing worse than being told not only that you've been infected by a virus preventing you from getting to any of your data on your network, but on ...

Read More
Share:
CFO’s Guide to Cybersecurity banner

Four Cybersecurity Essentials Your Executive Leadership Team Wants to Know

Jul 18, 2019

Leadership teams run their organizations with constantly shifting priorities.  Often these priorities can run the gamut from managing A/R and increasing sales to improving culture and increasing staff retention. All too often, technology ends up ...

Read More
Share:
NSA-Warns-Windows-BlueKeep-Bug-640x360

CISA Urging Users to Patch BlueKeep Vulnerability

Jun 19, 2019

T he United States Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning to Microsoft Windows users regarding a critical security vulnerability. By issuing the "update now" warning, CISA has ...

Read More
Share:
what you should know about cyber security-030002-edited

Why Cybersecurity Must Be a Top Priority for Small & Midsize Businesses

Jun 06, 2019

The big companies may be grabbing all of the headlines and attention when it comes to cybersecurity breaches, but did you know that SMBs have the most to lose in the aftermath of a data breach? From Target to Yahoo to LinkedIn to Equifax, it seems ...

Read More
Share:
Two Factor Authentication-952500-edited-253740-edited

Dual Factor Authentication Really is a Must Have

May 09, 2019

After last year’s record-setting rate of cybercrime and data breaches, login security is becoming more and more critical for every business. However, not many business owners or key decision makers know the difference between using a single-sign on ...

Read More
Share:
Frazzled_woman

What To Do If Someone Hacks Your Email Account

Apr 11, 2019

Oh no!  You think your email's been hacked.  What do you do?  Before we jump into what to do, we first need to start with how do you know for sure? What I mean by this is - how do you know for sure if your email account has been hacked?  Finding out ...

Read More
Share:
What's A Password Management System & Why You Need One

What's A Password Management System and Why Do You Need One?

Feb 28, 2019

Simply put, one of the most impactful, yet least talked about, cybersecurity user habits is when users reuse the same password across multiple accounts.  In fact, more than eight out of 10 Americans are guilty of doing just this according to ...

Read More
Share: