- The FPA Blog -
Valuable Technology Insights
for Los Angeles Businesses

Blog Topics

Security? But No One Wants Our Data.

Sep 26, 2019

“No one wants our data." In poker, there's this thing known as a "tell."  It's a mannerism or habit that indicates or "tells" your competitor something about  you - usually it's something that says either you have a great hand or you're bluffing.  ...

Read More
Share:

8 Ways to Protect Your Business From Ransomware

Aug 29, 2019

Ransomware.  The word should send a shiver down any responsible IT support person's spine.  There's nothing worse than being told not only that you've been infected by a virus preventing you from getting to any of your data on your network, but on ...

Read More
Share:
CFO’s Guide to Cybersecurity banner

Four Cybersecurity Essentials Your Executive Leadership Team Wants to Know

Jul 18, 2019

Leadership teams run their organizations with constantly shifting priorities.  Often these priorities can run the gamut from managing A/R and increasing sales to improving culture and increasing staff retention. All too often, technology ends up ...

Read More
Share:
NSA-Warns-Windows-BlueKeep-Bug-640x360

CISA Urging Users to Patch BlueKeep Vulnerability

Jun 19, 2019

T he United States Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning to Microsoft Windows users regarding a critical security vulnerability. By issuing the "update now" warning, CISA has ...

Read More
Share:
what you should know about cyber security-030002-edited

Why Cybersecurity Must Be a Top Priority for Small & Midsize Businesses

Jun 06, 2019

The big companies may be grabbing all of the headlines and attention when it comes to cybersecurity breaches, but did you know that SMBs have the most to lose in the aftermath of a data breach? From Target to Yahoo to LinkedIn to Equifax, it seems ...

Read More
Share:
Two Factor Authentication-952500-edited-253740-edited

Dual Factor Authentication Really is a Must Have

May 09, 2019

After last year’s record-setting rate of cybercrime and data breaches, login security is becoming more and more critical for every business. However, not many business owners or key decision makers know the difference between using a single-sign on ...

Read More
Share:
Frazzled_woman

What To Do If Someone Hacks Your Email Account

Apr 11, 2019

Oh no!  You think your email's been hacked.  What do you do?  Before we jump into what to do, we first need to start with how do you know for sure? What I mean by this is - how do you know for sure if your email account has been hacked?  Finding out ...

Read More
Share:
What's A Password Management System & Why You Need One

What's A Password Management System and Why Do You Need One?

Feb 28, 2019

Simply put, one of the most impactful, yet least talked about, cybersecurity user habits is when users reuse the same password across multiple accounts.  In fact, more than eight out of 10 Americans are guilty of doing just this according to ...

Read More
Share:
BEFORE SPENDING MONEY ON SECURITY COMPLIANCE

A New Phishing Attack To Be Aware Of

Feb 18, 2019

How do you know if a website asking for your credentials is fake or legit to login to? Do you check first to see if the URL is accurate? Do you check first to make sure the URL is spelled right? (ie: faceb00k vs. facebook) Do you check first to make ...

Read More
Share:
5 ‘How-To’ Hints for Improving Technology for LA Investment Advisors-118807-edited

The Impact of Cybersecurity on Being a Trusted Advisor

Jan 31, 2019

I've been doing this a long time - 27 years and counting. And it still amazes me by the laissez faire attitudes I get when I discuss the value of securing a business' network. When I initially speak with most people, all too often we're discussing ...

Read More
Share:
ccpa-og

What the CCPA Means to Your Cybersecurity

Jan 04, 2019

2 018 was a pivotal year for those concerned with data privacy. Earlier this year the General Data Protection Regulation (GDPR) from the EU foreshadowed the coming shifts in the relationship between businesses, customers, and their data. Governments ...

Read More
Share: