Access Management

IT Governance documentation is both extremely important and extremely difficult to create for IT managers, Information Security Officers, and Compliance Officers alike. infotex has been maturing GLBA and HIPAA templates since before the regulations were law. Our first Accept...

Shredding: New and Old Risks

In these days of drill-down risk assessments on new technologies and issues ranging from mobile banking to customer awareness to social media to FILs and Supplements, I’m often asked: “Since we now have to track these risk assessment triggers do we need to continue the annua...

User Accountability

Keeping Passwords Safe and Log-ins Secure As users of your information resources, your employees should be reminded on a periodic basis that they are responsible for all activity that takes place while using their user name. If the security of their user login is compromise...

FFIEC Scores on Supplement to Authentication Guidance

Jump to Dan’s Bottom Line Okay, let me be the first to admit that until today I had not “analyzed” the new authentication guidance.  Like many of my clients, I felt the guidance “couldn’t have come at a worse time.”  I was busy with a hundred projects and couldn’t mus...

Orchestrated Attacks and the Business Case for Zitmo

A story of how professional hackers have targeted weaknesses in two-factor authentication systems makes a great example of how the bad guys orchestrate attacks, practice good IT Governance practices, and thus execute a “continuous improvement process” as prescribed by most f...

x’ or ‘a’=’a

The Chronicles of Daniel Hadaway the Ungeek and Owner of Neville Bartholomew’s Credentials! So I need to prepare for my demonstration, to start the IBA’s IT Security Conference, called Hack Attack Live.  Last year Matt Jonkman of Emerging Threats Pro blew away a...

Data Inventory

Do you know where your data is? went? A good incident response plan puts the finishing touch on an IT Governance Program. Where are the boundaries of what you used to call your “network?”   Though not the first priority in developing a sound IT Governance Progra...

Data Classification Policy

Sorting your data . . . . Data Classification is a Proactive Control. “It’s not as much about what to protect as it is about what hoops to jump through to protect it.”   Sound IT Governance eventually includes developing a Data Inventory, and one of the fa...

Banking Passwords Often Used for Other Sites

According to an article post, nearly three-quarters of computer users have the same password for their online banking accounts that they have for other, less secure websites. Data drawn from 4 million users of Trusteer’s Rapport browser security service indicates that ...

Finally, the Mainstream Endorses Passwords!

The New York Times recently posted an article about passwords that you might want to share with your team. The title says it all . . . “If Your Password Is 123456, Just Make It HackMe” by Ashlee Vance. What I really like is the sidebar listing the most common passwords. No...