Archive for 'Controls' Category
A quick explanation of what we mean by “strong passwords” meant to be used in security reminders.
This white paper addresses the risks associated with the relatively new phenomena surrounding the introduction of corporate-owned data on Portable Devices, currently known by buzzwords such as mobile computing, mobile devices, mobile technology, etc.
IT Governance documentation is both extremely important and extremely difficult to create for IT managers, Information Security Officers, and Compliance Officers alike. infotex has been maturing GLBA and HIPAA templates since before the regulations were law. Our first Acceptable Use Policy was written in 1989. Each time we audit a new client, we learn from […]
It’s hard to believe almost a year ago Infotex set out on the path to create a new “branchless banking kit” which would include all the IT Policy and Procedure templates necessary to address a total re-write of the typical “E-banking Policy.” The decision to do this was accompanied by an article in Dan’s New Leaf entitled “Manifesto: Time to Revolutionize our E-banking Policies.”
There is no such thing as Information Security, because controls that work today won’t always work. Why we need to repeat the risk management cycle annually, using the weakening of “shredding” as a control.
The Office of Comptroller of the Currency has joined the public-private coalition that supports the fourth annual Protect Your Identity Week (PYIW), an initiative of the National Foundation for Credit Counseling (NFCC) and the Council of Better Business Bureaus (BBB). The week-long initiative, October 16 – 22, 2011, brings focus to the PYIW national campaign’s Web site and community events aimed at identity theft protection and education.
Before selling or discarding an old computer, or throwing away a CD or DVD, you naturally make sure that you’ve copied all of the files you need. You’ve probably also attempted to delete your personal files so that other people aren’t able to access them. However, unless you have taken the proper steps to make sure the hard drive, CD, or DVD is erased, people may still be able to resurrect those files.
With the advent of Wireless Banking, don’t you think it’s time to restructure our E-banking policies?
An Information Advisory has been issued by the National Security Agency concerning recommended actions for SecurID users in response to the RSA cyber intrusion.
Do you know where your data is? went? Where are the boundaries of what you used to call your “network?” Though not the first priority in developing a sound IT Governance Program, you will eventually need to get around to making an inventory of your data. This process, if done correctly, usually starts with […]