- The FPA Blog -
Valuable Technology Insights
for Los Angeles Businesses

Blog Topics

What to Consider Before Spending Money on Security Compliance

Aug 28, 2018

The realm of IT security and cybersecurity is an increasingly complex world that is governed by a variety of security compliance regulations depending on your organization’s industry. For example, organizations in the United States that focus on ...

Read More
Share:
Restrict User Permissions

3 Reasons Why You Should Restrict User Permissions

Aug 21, 2018

Although some of your employees may disagree, not every employee should have access to every network, IT infrastructure, or computer system within your organization. Giving employees and contractors unrestricted user permissions and user access ...

Read More
Share:
Why Cybersecurity Should Be Important to Startups-284170-edited

Why Cybersecurity Should Be Important to Startups

Aug 09, 2018

Businesses are vital to the success and growth of our local and national economies. Start up companies (startups) and small and medium-size businesses (SMBs), in particular, play a significant role in the economy. According to the U.S. Small ...

Read More
Share:
Hackers Already Have Your Passwords-680954-edited

Poor Password Security: Hackers Already Have Your Passwords

Aug 07, 2018

What if you were told protecting your online accounts was virtually impossible in today’s cyber crime environment? According to Experian’s Data Breach Industry Forecast 2018, “Weak or stolen credentials continue to top the list of attack vectors, ...

Read More
Share:
Protecting Your WiFi Hotspots-955684-edited

The Importance of Protecting Your WiFi Hotspots

Jul 24, 2018

In today’s highly mobile and on-the-go world, WiFi (Wi-Fi) has become an integral part of daily life. WiFi is a staple of organizations and businesses worldwide, and unsecured WiFi hotspots are now an increasingly common convenience offered by many ...

Read More
Share:
Cyber attacks 2017-665043-600x175

Sextortion - The Latest Email Scam Using Hacked Passwords

Jul 20, 2018

Here’s a clever twist on an old email scam that serves to make the con totally believable. The message purports to have been sent from a hacker who’s compromised your computer and used your webcam to record a video of you while you were watching ...

Read More
Share:
What Your Network Security Health Says about You-647719-edited

What Your Network Security Health Says about You

Jul 19, 2018

Regardless of your industry, making your network security as effective as possible is imperative to the safety of your business’ data (and that of your clients who trust you). Having a healthy and secure network is one sign that your organization or ...

Read More
Share:
4 Things to Consider When Evaluating 2FA Solutions

4 Things to Consider When Evaluating 2FA Solutions

Jul 17, 2018

When it comes to IT security, multi-factor authentication is an integral component to increasing the defense of your network and infrastructure. Two factor authentication (2FA), also known as dual factor authentication (DFA), is a form of ...

Read More
Share:
HOW RIAS CAN TELL IF DATA IS BEING SOLD ON THE DARK WEB-822410-edited

How RIAs Can Tell If Data is Being Sold on the Dark Web

Jul 05, 2018

It’s the worst fear of every registered investment advisor (RIA): Discovering that your information, or that of your clients, has been hacked and is being used by malicious users. This type of data breach can result in a loss of trust in your firm ...

Read More
Share:
Human Firewall

Increase Your Cybersecurity Defense with a ‘Human Firewall’

Jun 27, 2018

Did you know that most cybersecurity and data breaches occur because of people than a lack of technology? While it is important to do everything we can to improve the security of our technology, if we ignore the human weaknesses of IT security, ...

Read More
Share:
Finding the Balance Between Cybersecurity & Convenience-119402-edited-185606-edited

Finding the Balance Between Cybersecurity & Convenience

Jun 20, 2018

Cybersecurity threats are on the rise with each passing year, bringing higher levels of incidents that threaten businesses of all sizes. Whether you’re the smallest “mom and pop” business or are among the largest international corporations or ...

Read More
Share: