- The FPA Blog -
Valuable Technology Insights
for Los Angeles Businesses

Blog Topics

Why Vulnerability Management Is Important for CPAs

Sep 20, 2018

Vulnerability management is a critical, yet often overlooked, component of a Los Angeles certified public accountant’s (CPA’s) security posture. Protecting their clients’ sensitive personally identifiable information (PII) and financial data is a ...

Read More
Share:
Why Vulnerability Management Is Important for CPAs-962076-edited-219447-edited

How Security Compliance Gives RIAs a Competitive Edge

Sep 11, 2018

Registered investment advisors (also written as registered investment advisers, or RIAs) have an incredible responsibility to secure and protect the data of their employees, clients, and investors — no matter whether they reside in Los Angeles, the ...

Read More
Share:
The Dangers of RIAs Using Unencrypted Mobile Devices

The Dangers of RIAs Using Unencrypted Mobile Devices

Sep 06, 2018

We live in an age of unprecedented connectivity with nearly 70 percent of the U.S. adult population using a smartphone as of 2017. Due to the increasing use of unencrypted mobile devices and smartphones, we can connect with friends and family around ...

Read More
Share:
Business Continuity  in Your Security Plan

How Business Continuity Can Fill the Hole in Your Security Plan

Sep 04, 2018

You think you’re prepared for the worst: You’ve purchased new antivirus software, have a great new firewall in place, and even hired an IT security “tech” to help “man the gates” to protect your network and computer systems from malicious actors. ...

Read More
Share:
Ways CPAs Can Benefit from Password Managers-901538-edited

4 Ways CPAs Can Benefit from Password Managers

Aug 30, 2018

No matter how much organizations try to increase their cybersecurity stance, their efforts are virtually all for moot if they ignore one of the weakest (yet most vital) components of all: password security. Even as recently as this year, companies ...

Read More
Share:
BEFORE SPENDING MONEY ON SECURITY COMPLIANCE

What to Consider Before Spending Money on Security Compliance

Aug 28, 2018

The realm of IT security and cybersecurity is an increasingly complex world that is governed by a variety of security compliance regulations depending on your organization’s industry. For example, organizations in the United States that focus on ...

Read More
Share:
Restrict User Permissions

3 Reasons Why You Should Restrict User Permissions

Aug 21, 2018

Although some of your employees may disagree, not every employee should have access to every network, IT infrastructure, or computer system within your organization. Giving employees and contractors unrestricted user permissions and user access ...

Read More
Share:
Why Cybersecurity Should Be Important to Startups-284170-edited

Why Cybersecurity Should Be Important to Startups

Aug 09, 2018

Businesses are vital to the success and growth of our local and national economies. Start up companies (startups) and small and medium-size businesses (SMBs), in particular, play a significant role in the economy. According to the U.S. Small ...

Read More
Share:
Protecting Your WiFi Hotspots-955684-edited

The Importance of Protecting Your WiFi Hotspots

Jul 24, 2018

In today’s highly mobile and on-the-go world, WiFi (Wi-Fi) has become an integral part of daily life. WiFi is a staple of organizations and businesses worldwide, and unsecured WiFi hotspots are now an increasingly common convenience offered by many ...

Read More
Share:
Cyber attacks 2017-665043-600x175

Sextortion - The Latest Email Scam Using Hacked Passwords

Jul 20, 2018

Here’s a clever twist on an old email scam that serves to make the con totally believable. The message purports to have been sent from a hacker who’s compromised your computer and used your webcam to record a video of you while you were watching ...

Read More
Share:
What Your Network Security Health Says about You-647719-edited

What Your Network Security Health Says about You

Jul 19, 2018

Regardless of your industry, making your network security as effective as possible is imperative to the safety of your business’ data (and that of your clients who trust you). Having a healthy and secure network is one sign that your organization or ...

Read More
Share: