Archive for Cybersecurity

A CTO’s Guide to Fighting Remote Worker Cybersecurity Complacency

Here’s a list of cybersecurity reminders you can share with your remote workforce to refresh their understanding of your firm’s cybersecurity expectations and their role in keeping the firm secure.

Cybersecurity & Governance Framework Meet the Gold Standard

If your company has made it this far into the COVID-19 pandemic and is still healthy, it’s a good time to address any processes or practices you’ve been putting off.

5 Actions to Take Ahead of CCPA Enforcement

Enforcement of the California Consumer Privacy Act (CCPA) went into effect earlier this year to protect consumers’ personal information, including how it’s collected, stored, and shared.

When COVID-19 Spread, So Did Your Data. Here’s How to Protect It.

As workers become more comfortable in their new remote routines, it’s important to ensure they don’t let their guard down when it comes to storing and sharing company information.

7 Office Quirks We Miss Most

The Agio team celebrates National Work from Home Day by reminiscing about the good ol’ days at the office.

Are You Ready for Insurance Risk Assessments? Agio Says Yes

As a community, we may have started out thinking working remotely was temporary, but it’s now clear this is how we’ll be doing business for the foreseeable future.

Phishing Attack Targets Financial Services Executives

A phishing campaign is targeting Office 365 users specifically at financial services firms, and have compromised over 150 businesses.

Telehealth & COVID-19: The New Reality

Given the seriousness of the COVID-19 pandemic, the Office for Civil Rights (OCR) is allowing providers to use their discretion in setting up telehealth meetings with patients.

The COO’s Guide to Business Continuity During COVID-19

Here are steps to help you organize, prioritize, and ask the right questions to modify your Business Continuity Plan (BCP) to be airtight for the next business-impacting disaster.

Top 10 Sources for COVID-19 Cybersecurity Reporting

The best thing you can do is create a list of trusted sources. Here are some sources we recommend.

COVID-19: Malicious Domains, Malware & Phishing

Attackers were buying domains, building malicious websites, and creating phishing scams to steal information and shut down IT networks, including those at critical health facilities.

Healthcare’s Ransomware Exposure in the Time of COVID-19

Once impacted by ransomware, large hospitals to small physician practices struggle with issues such as if and how to pay a ransom, or how to maintain a safe patient environment with a critical system down.