NIBA Features Article on Ransomware During COVID and Proactive Cyber Hygiene: Authored by Braden Perry

NIBA Features Article on Ransomware During COVID and Proactive Cyber Hygiene: Authored by Braden Perry

NIBA features article by Braden Perry on ransomware during COVID and proactive cyber hygiene as part of cybersecurity awareness month. Earlier this year, the COVID-19 pandemic caused businesses to rapidly deploy a remote workforce, which created new challenges for financial firms, but also an opportunity for hackers to gain access to IT systems and sensitive

Braden Perry Featured as Expert in Proactive vs Reactive Cybersecurity Article

Braden Perry Featured as Expert in Proactive vs Reactive Cybersecurity Article

VPNRanks highlights Braden Perry, among other experts, in an article on proactive vs reactive cybersecurity models. Most companies use reactive cybersecurity which includes implementing defense mechanisms like antivirus software, firewalls, password protections, spam filters, and ad-blockers. The reactive approach has proven to be useful, but companies should not rely solely on this strategy as their

SEC: Cybersecurity Procedures Must be Reasonably Designed to Fit Specific Business Models

SEC: Cybersecurity Procedures Must be Reasonably Designed to Fit Specific Business Models

The Securities and Exchange Commission recently announced that a Des Moines-based broker-dealer and investment adviser has agreed to pay $1 million to settle charges related to its failures in cybersecurity policies and procedures surrounding a cyber intrusion that compromised personal information of thousands of customers. This is the latest SEC action demonstrating that cybersecurity must be tailored to the practices of the business.

The SEC charged Voya Financial Advisors Inc. (VFA) with violating the Safeguards Rule and the Identity Theft Red Flags Rule, which are designed to protect confidential customer information and protect customers from the risk of identity theft.  This is the first SEC enforcement action charging violations of the Identity Theft Red Flags Rule.