About Us | Contact Us
View Cart
Archive for 'Articles' Category

The Risk of Convenience

By Vigilize - Last updated: Thursday, August 16, 2018

Consolidating passwords and other account information can save time, but expose you to risk… An article review. Given the amount of account related information that the average person is expected to keep track of–such as account numbers, passwords, PINs and secret questions–it’s no wonder that a convenience like the Fuze Card was such a success […]


Cyber Challenge: A Community Bank Cyber Exercise

By Vigilize - Last updated: Sunday, July 29, 2018

The FDIC has released new training material to help small banks start a discussion on risk… An article review. Sometimes it can be difficult to find a starting point when getting your employees discussing risk and technology, and while we do provide our own resources on the subject we wanted to pass along another resource […]


The 12 Billion Dollar Scam

By Vigilize - Last updated: Sunday, July 22, 2018

New FBI statistics suggest compromised business email accounts have led to over 12 billion dollars in losses since 2013… An article review. So much attention has been paid to ransomware, botnets and other relatively recent developments that it’s easy to forget about some of the older threats that are still out there claiming victims. Our […]


New Bill Adds Industrial Control Systems to Homeland Security’s Oversight

By Vigilize - Last updated: Sunday, July 15, 2018

While already happening in practice, the new legislation would officially make it one of the agency’s priorities. An article review. In an acknowledgment of what is recognized as a growing threat, legislation introduced recently in the House of Representatives would officially add industrial control systems to the Department of Homeland Security’s cybersecurity priorities. The bill, […]


Equifax Ordered To Implement Security Measures

By Vigilize - Last updated: Sunday, July 1, 2018

Financial regulators from eight states impose new rules in the wake of the credit reporting agency’s historic breach. An article review. The investigation by federal regulators and law enforcement officials into the breach that resulted in the release of over 140 million people’s personal information is still ongoing, but Equifax has already reached an agreement […]


Reminder: Siri Risk!

By Jolley | Hadaway - Last updated: Sunday, June 17, 2018

Voice assistants can be helpful, but their “always on” functionality can leave you vulnerable… A Jolley | Hadaway Short. By this point if you’re like us, you’re probably already a little tired of voice assistants like Siri being integrated into seemingly every new device–it sometimes feels as if we are going to get these “helpful” […]


Don’t Believe Your Eyes: Router-Based Malware Can Change Website Data

By Vigilize - Last updated: Sunday, June 10, 2018

Previously thought to be designed to deliver a DDoS attack, VPNFilter can alter data in transit and change what you see on your screen. An article review. Initially, researchers thought that a new piece of router-based malware called VPNFilter was a relatively simple tool for directing and implementing a distributed denial of service (DDoS) attack. […]


Alert Fatigue: A Problem With Few Easy Solutions

By Vigilize - Last updated: Sunday, June 3, 2018

Getting a message to the user is one thing, having them see it is another… An article review. In IT we often focus on identifying and communicating risk: to our users, to our superiors and to others in the field. Over the years, we’ve even developed new tools and methods to identify issues and notify […]


Project Indigo: Blurring The Lines Between Government and Private Sector Cybersecurity

By Vigilize - Last updated: Sunday, May 27, 2018

US Cyber Command joins with the FS-ISAC to share threat intelligence… An article review. Threat intelligence sharing is a concept we’re all probably familiar with, at least in passing–it’s hard to imagine where we’d be without the efforts of organizations that work to identify and communicate new and developing threats! However, until relatively recently those […]


Unless You Are Based in Europe

By Dan Hadaway - Last updated: Sunday, May 27, 2018

Some businesses are attempting to capitalize on confusion over just who the GDPR applies to… Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Several Clients have emailed a question to me this week (one even picked up that thing called a telephone, and called […]