- The FPA Blog -
Valuable Technology Insights
for Los Angeles Businesses

Blog Topics

How to Increase Your Application Security

Oct 18, 2018

Improving the cybersecurity of your registered investment advisor (RIA) firm should not be limited to protecting only the most critical systems. Improving application security to make systems as secure as possible is achieved by fortifying the ...

Read More
Share:
Surprising Password Guidelines from NIST You Should Know

Surprising Password Guidelines from NIST You Should Know

Oct 16, 2018

Think you’re up to speed on everything there is to know about managing passwords these days? What about staying compliant with password guidelines that are set by regulatory and non-regulatory bodies alike? It isn't easy, that's for sure. The ...

Read More
Share:
Reasons You Should Avoid Public Wi-Fi Networks

3 Reasons You Should Avoid Public Wi-Fi Networks

Oct 09, 2018

Public wireless networks (public wifi, public wi-fi networks) and Wi-Fi hotspots provide unparalleled convenience to mobile and remote users who need internet access while away from their home or business network. However, these networks are ...

Read More
Share:
Why Software Management is Critical to Your Cybersecurity-184105-edited

Why Software Management is Critical to Your Cybersecurity

Oct 04, 2018

The software components that are connected to your IT infrastructure and network are both an advantage and a threat to the security of your business or organization. When properly maintained, and patches and updates are applied consistently, various ...

Read More
Share:
What Is the Dark Web and Why Does It Matter?

What Is the Dark Web and Why Does It Matter?

Sep 27, 2018

Even if they don’t necessarily know the specifics, many people at least have heard of something called the Dark Web. It sounds ominous, like it is potentially something out of a nightmare — and, for some, it is. Although the Dark Web does have some ...

Read More
Share:
How Secure is Email on Microsoft Office 365

How Secure is Email on Microsoft Office 365?

Sep 25, 2018

Microsoft Office 365 is among one of the most popular and widely-used office suites for small to mid-size businesses (SMBs). The cloud-based Office 365 subscription software and services, for which Microsoft guarantees 99.9% uptime, enable employees ...

Read More
Share:
How Security Compliance Gives RIAs a Competitive Edge-271946-edited-366511-edited

Why Vulnerability Management Is Important for CPAs

Sep 20, 2018

Vulnerability management is a critical, yet often overlooked, component of a Los Angeles certified public accountant’s (CPA’s) security posture. Protecting their clients’ sensitive personally identifiable information (PII) and financial data is a ...

Read More
Share:
Why Vulnerability Management Is Important for CPAs-962076-edited-219447-edited

How Security Compliance Gives RIAs a Competitive Edge

Sep 11, 2018

Registered investment advisors (also written as registered investment advisers, or RIAs) have an incredible responsibility to secure and protect the data of their employees, clients, and investors — no matter whether they reside in Los Angeles, the ...

Read More
Share:
The Dangers of RIAs Using Unencrypted Mobile Devices

The Dangers of RIAs Using Unencrypted Mobile Devices

Sep 06, 2018

We live in an age of unprecedented connectivity with nearly 70 percent of the U.S. adult population using a smartphone as of 2017. Due to the increasing use of unencrypted mobile devices and smartphones, we can connect with friends and family around ...

Read More
Share:
Business Continuity  in Your Security Plan

How Business Continuity Can Fill the Hole in Your Security Plan

Sep 04, 2018

You think you’re prepared for the worst: You’ve purchased new antivirus software, have a great new firewall in place, and even hired an IT security “tech” to help “man the gates” to protect your network and computer systems from malicious actors. ...

Read More
Share:
Ways CPAs Can Benefit from Password Managers-901538-edited

4 Ways CPAs Can Benefit from Password Managers

Aug 30, 2018

No matter how much organizations try to increase their cybersecurity stance, their efforts are virtually all for moot if they ignore one of the weakest (yet most vital) components of all: password security. Even as recently as this year, companies ...

Read More
Share: