Resources & Education

3 Tips for Better 401k Plan Cybersecurity

Everyone, it seems, is concerned about cybersecurity, and with good reason. Each week seems to bring a new round of headlines, making it clear that identity theft and criminal cyber activity have become persistent features of our lives. The victims of cyber-crime can be wide-ranging, including governments, industry sectors, corporations of all sizes and individuals.

Read More »

Why CSIRTS are Crucial to Cybersecurity in the Financial Industry

Does your retirement plan provider, advisor, or recordkeeper have a Computer Security Incident Response Team? (Photo: Getty) Born out of crisis, the modern Computer Security Incident Response Team, or CSIRT (pronounced ‘see-sert’) is responsible for coordinating the response to an organization’s computer security incidents. With cybersecurity threats everywhere, CSIRTs play an indispensable role in the

Read More »

Too Many Hands in the PII

Personally identifiable information, or P.I.I, is any data that could potentially be used to identify a person or account. Examples include a full name, Social Security number, driver’s license number, bank account number, passport number, and email address. Too many companies do not have a full understanding of the number of their employees who have

Read More »

Goode Cyber Security adds Cyber Liability Protection

Goode Cyber Security is pleased to announce that Cyber Liability Protection is now included in all our offerings to our customers. This value-added service significantly enhances our offerings across the board. NEW: Cyber Insurance up to $250,000 Included with all programs. Goode Cyber Security – Customized Cybersecurity Programs Cyberattacks rank as the fastest growing crime

Read More »

Ransomware: A Report from the Frontlines

Phishing is the number one delivery vehicle for ransomware. The motive behind this is that phishing emails are easy to send and lead to a faster return on investment (ROI). Phishing, as part of social engineering schemes, lures victims into executing actions without realizing the malicious drive. The less aware the targeted user is, the

Read More »

17 Questions To Ask Before Sending A HIPAA-Compliant Marketing Email

You’ve just been told that your email marketing program is putting your company at risk of violating HIPAA.What now? If you want to continuing using email to communicate with patients, you must implement HIPAA-compliant email marketing. Start by breaking down that goal into two components: becoming HIPAA-compliant and achieving your marketing objectives. Setting up HIPAA-compliant

Read More »
Scroll to Top