About Us | Contact Us
View Cart
Archive for 'Security Standards' Category

Forgotten But Not Gone: The Ex-Employee Risk

By Vigilize - Last updated: Friday, August 25, 2017

Failure to deprovision former employees presents a real risk to businesses. An article review. When terminating an employee you probably make sure that they turn in keys, access cards, and any other physical access credentials, but how sure are you that their electronic credentials have been revoked? A new study being highlighted by CIO Insight […]


Small Business Resource Page

By Dan Hadaway - Last updated: Friday, August 25, 2017

Dan has whittled all the noise to five resources a Small Business Owner should investigate (and utilize).


Ten Must-Reads For Information Security Awareness

By Vigilize - Last updated: Thursday, April 20, 2017

These titles should be on every professional’s list. An article review. If there’s one thing you can take away from the most recent installment of our annual T7 article, it’s that the threats we face when securing IT assets are a diverse and constantly evolving lot. That’s why staying current is one of the most […]


Digital Security Standard Compliance: Is It Enough?

By Jolley | Hadaway - Last updated: Friday, February 24, 2017

While the credit card industry-backed program has good aspects, it should not replace the SOC-2. With the number of different security standards–and ways to test those standards–out there, it can be difficult to stay on top of just what is required, compliance wise, for a specific situation. Case in point, we recently had a client with […]


Getting Started on Cybersecurity

By Dan Hadaway - Last updated: Thursday, July 9, 2015

Process Flow for Institutions . . . and why Dan loves the Cybersecurity Assessment Tool! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Real quick:  What should you do to get started on understanding the new Cybersecurity Assessment Tool (and its impact on future […]


Ultrasonic Technology Takes Fingerprint Security to the Next Level

By Vigilize - Last updated: Monday, July 6, 2015

Mobile devices getting a boost in security with ultrasonic 3D fingerprint scanner. A new 3D imaging technique of fingerprint scanning, using an ultrasonic sensor, has researchers excited about the prospects of “smartphone security” to another level. We’ve never been enthusiastic about biometrics. Way back in the early 2000’s one of our “early adopter” Clients inadvertently […]


Segregation Not!

By Vigilize - Last updated: Monday, June 29, 2015

Study shows that network engineers are knee deep in Information Security Investigations.


Two New Statements, One Read!

By Dan Hadaway - Last updated: Tuesday, March 31, 2015

Dan gives a quick rundown on the two statements released by the FFIEC on 03/30/15.


Windows Susceptible to FREAK Attack After All

By Vigilize - Last updated: Sunday, March 22, 2015

An article review. Microsoft admits that Internet Explorer is vulnerable to HTTPS hack Earlier this month, Microsoft announced that any Windows computer running any version of Internet Explorer is vulnerable to a FREAK attack. Now the FREAK vulnerability has been around for years; however, it was believed to only affect certain browsers and devices, like […]


Would I love to interview Lenovo’s Incident Response Team!

By Dan Hadaway - Last updated: Friday, March 6, 2015

How much can failure be worth? Dan gets an idea while filling out a “customer satisfaction survey!” Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . So though I tried to comment on Lenovo’s site during the early days of their Superfish incident and they wouldn’t […]