Goode Cyber Security BLOG

10 Cybersecurity tips that everyone can practice now!

CYBERSECURITY TIPS By taking basic cybersecurity precautions, you can prevent most cyberattacks. Here are some basic things to do and not do: 1.   Create different passwords for each account: While it may seem like a lot of trouble remembering all your passwords, multiple accounts should never have the same password. If you use the

Read More »

3 Tips for Better 401k Plan Cybersecurity

Everyone, it seems, is concerned about cybersecurity, and with good reason. Each week seems to bring a new round of headlines, making it clear that identity theft and criminal cyber activity have become persistent features of our lives. The victims of cyber-crime can be wide-ranging, including governments, industry sectors, corporations of all sizes and individuals.

Read More »

Why CSIRTS are Crucial to Cybersecurity in the Financial Industry

Does your retirement plan provider, advisor, or recordkeeper have a Computer Security Incident Response Team? (Photo: Getty) Born out of crisis, the modern Computer Security Incident Response Team, or CSIRT (pronounced ‘see-sert’) is responsible for coordinating the response to an organization’s computer security incidents. With cybersecurity threats everywhere, CSIRTs play an indispensable role in the

Read More »

Too Many Hands in the PII

Personally identifiable information, or P.I.I, is any data that could potentially be used to identify a person or account. Examples include a full name, Social Security number, driver’s license number, bank account number, passport number, and email address. Too many companies do not have a full understanding of the number of their employees who have

Read More »

Ransomware: A Report from the Frontlines

Phishing is the number one delivery vehicle for ransomware. The motive behind this is that phishing emails are easy to send and lead to a faster return on investment (ROI). Phishing, as part of social engineering schemes, lures victims into executing actions without realizing the malicious drive. The less aware the targeted user is, the

Read More »

17 Questions To Ask Before Sending A HIPAA-Compliant Marketing Email

You’ve just been told that your email marketing program is putting your company at risk of violating HIPAA.What now? If you want to continuing using email to communicate with patients, you must implement HIPAA-compliant email marketing. Start by breaking down that goal into two components: becoming HIPAA-compliant and achieving your marketing objectives. Setting up HIPAA-compliant

Read More »
Scroll to Top