About Us | Contact Us
View Cart
Archive for 'Programs' Category

Temporary Passwords: A Potential Weak Link

By Vigilize - Last updated: Monday, April 16, 2018

Some small organizations continue to use customer data to generate initial passwords, despite the risks. An article review. When rolling out a new online banking platform organizations are often faced with the task of issuing new usernames and passwords to existing users, but how they choose to do that can have a big impact on […]


“Summer Vacation” Awareness Poster

By Vigilize - Last updated: Thursday, April 12, 2018

Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your office.  


Risk Versus Severity When In A Panic

By Dan Hadaway - Last updated: Monday, April 9, 2018

Risk isn’t the only thing to consider when planning a decision tree. Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . During tuning, we’re sometimes asked, as we help our MSSP Clients establish a detailed decision tree (modify our default to their own situation), “are […]


Firewall Log Retention: Beyond The Guidance

By Dan Hadaway - Last updated: Monday, March 26, 2018

In the absence of specific guidance, organizations are left to use their judgement in retaining logs… Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Not long ago a Client asked for my input on their firewall log policy, as they were collecting logs but […]


Merchandising as an Information Security Concept

By Dan Hadaway - Last updated: Monday, March 19, 2018

Haven’t rotated your posters in a while? Your customers may not be seeing them anymore. Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . One of the things I recently realized: some bankers I interact with do not have the same  understanding of merchandising that I […]


Gimmicks and Bribes in Awareness Training

By Vigilize - Last updated: Monday, March 12, 2018

Motivating employees toward awareness can take more than prizes and prodding… An article review. Keeping your employees on top of security related issues can sometimes seem to be a daunting task, and it’s not something that can ever be considered finished: it’s an ongoing process much like the threats themselves. Considering that, it’s not surprising […]


You’re a Winner

By Vigilize - Last updated: Thursday, March 8, 2018

Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your office.  


Object Access Limitations

By Matt Jolley - Last updated: Monday, March 5, 2018

Object Access Limitations. . . While offering some visibility, there are limitations to object access monitoring. If your organization has to comply with industry regulations such as GLBA, HIPAA, or Sarbanes Oxley, you know that maintaining data security and privacy are important, and one of the ways you can accomplish that is with object access […]


Catphishers

By Vigilize - Last updated: Friday, February 9, 2018

Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your office.  


Three Things About Insurance That Will Save You Time

By Jolley | Hadaway - Last updated: Monday, February 5, 2018

If you’re in charge of reviewing insurance from an IT perspective, here are three helpful hints… A Jolley | Hadaway Short. Tell your critical vendors you want to have an “endorsement” on  their cyber insurance policies.  Note:  this does not put you ahead of anybody in the “lawsuit line,”  That is a myth.  But what […]