Cybersecurity Blog

Blogs June 09, 2020 CAPstone Webcast Series: Computing Security

This content features a recap of the discussion from EisnerAmper’s (CAP)Stone series webcast titled “Cyber Action Plan – Computing Security,” including topics based on working from home and recognizing trouble spots.

Blogs February 12, 2020 Ahoy! 5 Ways to Spot Email Phishing

The key to preventing phishing email scams is education and awareness—before your electronic security becomes compromised. Here’s a look at five instances that may indicate an email is from a bad actor with nefarious intentions for your data.

Blogs December 02, 2019 Keep Your Smart Home Devices Secure

The Internet of Things means an increased use of smart products in homes—such as automatic lights, thermostats, etc. Here are a few tips for keeping those devices secure so that cyber thieves, as well as in-home/small business burglars, don’t comprom…

Blogs November 15, 2019 Enhanced Security and Risk Mitigation in Today’s World

A Florida Business Summit panel that took a deep dive on cybercrime. The discussion included types of crime (e.g., ransomware), the high stakes involved, and how companies can protect themselves (e.g., cyber insurance).

Blogs October 30, 2019 Important Security Updates for Android Phones and Windows 10 Computers

Security updates for Windows and Android that you should be aware of. These relate to audio, video and image files that could be open to hacking.

Blogs October 17, 2019 Roots of Marriott Breach Run Deep

A review of the root causes and the fallout from the Marriott cyber breach, along with a look at how to mitigate cyber risk at your organization.

Blogs August 26, 2019 Combatting Vulnerabilities in Building Control Systems

How can you combat building control systems attacks? Recommendations include protecting network devices with a firewall, constantly monitoring network traffic for irregular activity, developing patches to the software in a timely manner.

Blogs July 25, 2019 Pair of National Labs Latest to Suffer Unnecessary Data Breaches

Companies that employ best practices for vendor risk management programs utilize technology to organize, synthesize and analyze their vast amounts of data.

Blogs June 20, 2019 Information Security in the Real Estate Environment

An EisnerAmper cybersecurity event geared specifically to the real estate sector. The expert panel conveyed the costs of NOT having a proactive cybersecurity plan as well as tips for developing a successful program.