FCI

Forbes cites Brian Edelman, FCI CEO & Cybersecurity Expert

Link to: “15 Ways to Leverage And Supplement AI In Your Cybersecurity Efforts”   With more companies moving to permanent remote or hybrid work models, more endpoints are accessing systems of private data without proper…

Managed Is Most Secure

For endpoint protection, you could provide instructions to your users or your IT team to manually configure settings (complex password, screen saver, personal firewall, etc.) and install tools (antivirus, full-disk encryption, multifactor authentication, etc.). With…

NYDFS Announces Statement of Charges Hearing against First American Financial

Subsequent to the first ever cybersecurity enforcement action filed by The New York State Department of Financial Services (NYDFS) on July 22, 2020, a Statement of Charges Hearing will be held on January 21, 2022, to determine whether First American Title Insurance Company has committed violations of §§ 500.02, 500.03, 500.04, 500.07, 500.09, 500.10, 500.14, 500.15…

NYDFS Issued Industry Guidance on Multi-Factor Authentication

On December 7, 2021, the New York Department of Financial Services (NYDFS) issued Industry Guidance for all regulated entities on Multi-Factor Authentication (MFA) as an essential technical control required by the Cybersecurity Requirements for Financial…

Hardening Systems of Private Data

We all focus on Endpoint and Network Security but too often overlook software and how security settings should be hardened. For example, when you start to use a software, it is usually configured generically by…

Ransomware Protection

Ransomware incidents are up 300% in the past year and remain a top cyber threat as attacks continue to surge against the financial sector. Implementing cybersecurity technical controls is the best defense against ransomware attack.…

Brian Edelman, Cybersecurity Expert & FCI CEO, cited in Ebix article

Link to: What the SEC Cybersecurity Crackdown Means for Financial Advisers  Recent SEC Enforcement Actions against eight financial firms for violations of cybersecurity safeguards is a clear signal that implementation of cybersecurity controls is paramount for protection and to avoid penalty.  In discussion with Ebix, Brian Edelman, Cybersecurity Expert and FCI CEO, shared that “Broker-dealers and financial institutions have…

Cybersecurity Risk Assessment

As firms face an increased rate of sophisticated cyberattacks, there is no better time to execute a Cybersecurity Risk Assessment. Proactive vulnerability scans and network penetration testing of your environment allows for risk identification and…

3iCO article cites Brian Edelman, Cybersecurity Expert & FCI CEO

Link to the article: The Increasing Importance of Cybersecurity for Registered Investment Advisors 3iCO is a NY based provider of Independent Compliance Officers for Independent Investment Advisers and Private Funds. As compliance and legal professionals,…

Beware of Phishing

Phishing remains a leading cybersecurity threat as cybercriminals use increasingly sophisticated tactics to obtain private data by exploiting human behavior. Posing as a known contact or trusted organization, phishing aims to trick users into providing…

Your Own Gateway VPN

When working remotely or traveling, best practice for securing data across the internet is use of a business-grade firewall with a gateway VPN (Virtual Private Network) that enables encrypted internet connection from anywhere in the…

Ensure Encryption

Encryption is a vital cybersecurity safeguard that protects data while at rest on your device and in transit across a network. Made possible by cryptography, the technique of applying an algorithm to scramble data in…

Keep Your OS Current

Cybersecurity regulations require that you use a currently supported Operating System (OS) version. OS software has a lifecycle defined by the manufacturer during which critical security updates are issued. When an OS approaches “end of…

Audit Preparedness

When it comes to audit preparedness are you a Cyber Ant or Grasshopper? If you don’t have a strong cybersecurity program and safeguards in place by the time Regulators come knocking, it’s already too late.…