Incident response testing is the stone that kills many birds… Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Good morning. It’s 5:00am on a weekend, and I’m preparing my talk for the Cybersecurity Conference this week. While the talk is only supposed to be […]
A simplified method for Change Management! (a proposal for small banks) We all suffer from it: way too much to do, not enough time to do it. How do we make sure our day-to-day activities comply with policy while also aligning with our technology strategy? In this webinar, Dan Hadaway, CRISC CISA CISM will propose […]
“Deep Fake” Technology is Behind The New Trend of AI-Assisted Fraud… An article review. It’s a scenario that probably happens far more often than we’d like to admit: an employee gets a phone call from a superior requesting they perform some task that is out of the ordinary. There are policies in place requiring more […]
Four out of five schools have experienced a cybersecurity incident… An article review. While it seems like these days every organization faces cybersecurity threats, as we’ve pointed out in the past schools are an increasingly attractive target to hackers—and a new audit carried out by the cybersecurity wing of the UK’s Government Communications Headquarters (GCHQ) […]
Another awareness poster for YOUR customers (and users). Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your office.
These tools will help you assess and improve your cybersecurity preparedness… An article review. If you’re a regular reader of our blog, you know that we think cybersecurity training and the tools that go along with it are vitally important to any organization that relies upon computers—which is pretty much everyone, now. The Federal Financial […]
Nearly 50 vulnerabilities were found in printers from the top six brands… An article review. You’re aware of phishing scams, you don’t open e-mail attachments you weren’t expecting to receive, your virus definitions are updated regularly and you don’t connect to unsecured wifi networks…but when was the last time you thought about your printer? A […]
A lack of funding and IT staff makes for an inviting target… An article review. While it seems like everyone from individuals to major corporations are targeted by hackers these days, one group has been targeted with increasing frequency—and success: school districts. That’s according to a recent article in The New York Times, which notes […]