About Us | Contact Us
View Cart

How Well Do You Know Your Endpoints?

By Vigilize | Sunday, April 22, 2018

Many organizations spend time and money deploying endpoint protection, then think they can forget about it… An article review. Not too long ago when it came to endpoint security it was common practice to simply install an antivirus program, set it to automatically update and move on. That kind of hands-off approach has never ensured […]


Temporary Passwords: A Potential Weak Link

By Vigilize | Monday, April 16, 2018

Some small organizations continue to use customer data to generate initial passwords, despite the risks. An article review. When rolling out a new online banking platform organizations are often faced with the task of issuing new usernames and passwords to existing users, but how they choose to do that can have a big impact on […]


“Summer Vacation” Awareness Poster

By Vigilize | Thursday, April 12, 2018

Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your office.  

Filed in Awareness Posters

Risk Versus Severity When In A Panic

By Dan Hadaway | Monday, April 9, 2018

Risk isn’t the only thing to consider when planning a decision tree. Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . During tuning, we’re sometimes asked, as we help our MSSP Clients establish a detailed decision tree (modify our default to their own situation), “are […]


Our Blog Policy

By Vigilize | Monday, April 2, 2018

While we’re not a news service, we often use current events to comment on trends and our services. This blog is intended to get people thinking about topics and trends in Technology Risk Management, through our article reviews, as well as through original blog articles about current events and our MSSP services (such as our […]


Firewall Log Retention: Beyond The Guidance

By Dan Hadaway | Monday, March 26, 2018

In the absence of specific guidance, organizations are left to use their judgement in retaining logs… Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Not long ago a Client asked for my input on their firewall log policy, as they were collecting logs but […]


Merchandising as an Information Security Concept

By Dan Hadaway | Monday, March 19, 2018

Haven’t rotated your posters in a while? Your customers may not be seeing them anymore. Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . One of the things I recently realized: some bankers I interact with do not have the same  understanding of merchandising that I […]


Gimmicks and Bribes in Awareness Training

By Vigilize | Monday, March 12, 2018

Motivating employees toward awareness can take more than prizes and prodding… An article review. Keeping your employees on top of security related issues can sometimes seem to be a daunting task, and it’s not something that can ever be considered finished: it’s an ongoing process much like the threats themselves. Considering that, it’s not surprising […]


You’re a Winner

By Vigilize | Thursday, March 8, 2018

Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your office.  

Filed in Awareness Posters

Object Access Limitations

By Matt Jolley | Monday, March 5, 2018

Object Access Limitations. . . While offering some visibility, there are limitations to object access monitoring. If your organization has to comply with industry regulations such as GLBA, HIPAA, or Sarbanes Oxley, you know that maintaining data security and privacy are important, and one of the ways you can accomplish that is with object access […]