Blog

Where Have The SEC Cyber Security Rules Gone?

The Silence Is Deafening It’s September as we write this and the SEC hasn’t announced anything notable on the Cybersecurity Rule for RIAs – will they?  At this point we think one of two things is most likely, (1) the ...

WordPress Plugin Alert: Critical Vulnerability in LiteSpeed Cache

In a recent security alert, the widely used LiteSpeed Cache plugin for WordPress has been found to have a critical vulnerability that could impact millions of websites. Here’s what you need to know: What Is the LiteSpeed Cache Plugin? The LiteSpeed Cache plugin is ...

The SEC Cybersecurity Rule for RIAs: Enforcement & Precedent Matter More Than Ever

This is part of our blog series on the SEC's Proposed Cybersecurity Rule for RIAs, titled "Cybersecurity Risk Management for Investment Advisers, Registered Investment Companies, and Business Development Companies" You can download our ebook on the rule at https://ria.tips/ebook. It seems ...

The SEC Cybersecurity Rule for RIAs: No Alignment

This is part of our blog series on the SEC's Proposed Cybersecurity Rule for RIAs, titled "Cybersecurity Risk Management for Investment Advisers, Registered Investment Companies, and Business Development Companies" You can download our ebook on the rule at https://ria.tips/ebook. We've gone ...

How to Safely Share Passwords with Employees

If you ask a security professional, you get by-the book advice about sharing passwords: “Don’t share passwords.” But we know, in reality, that doesn’t work. Your office might be sharing a single password for apps like SurveyMonkey right now to ...

MGM taken down, Caesars paid up

In September MGM Casinos and Hotels suffered a massive cyberattack. WSJ reported: “ I saw employees armed with clipboards and pens everywhere. It was the strangest sight I’ve seen since MGM installed those handwashing stations… tables were filled with binders ...

4 Employee Cyberthreat Traits

To succeed in today’s modern competitive business landscape, you need to understand the strengths and weaknesses of your employees. This will equip you to identify areas where employees may need further training, including cyberthreat and cybersecurity awareness. Are you sure ...

October is Cybersecurity Month

Of course, every month is cybersecurity month here at JM Addington Technology Solutions but for most businesses your core focus is on something else: your core competency. But you still need a time to pull aside long enough to see ...

RIA Cybersecurity Regulations: What's to Come

Tennessee implemented the RIA cybersecurity regulations for state-registered RIAs that goes into effect July 1, with no grace period.  The low down: RIAs are required to, “develop, implement, and maintain a comprehensive written information-security program…” RIAs are required to report ...

GM As Critical Infrastructure

Kevin Tierney, GM's chief cybersecurity officer, is increasingly focusing on power-grid security due to the shift away from gas-powered cars. This, in turn, makes GM a critical infrastructure provider as they set up charging stations across the country. Unlike gas ...

Contact

CyberSecureRIACyberSecureRIA Logo $$$

2024 And 2025 Finalist