About Us | Contact Us
View Cart
Archive for 'Access Management' Category

An Overview of the FFIEC Architecture, Infrastructure, and Operations Booklet

By Adam Reynolds - Last updated: Monday, July 26, 2021

Our Lead Non-Technical Auditor takes a look at the new AIO Guidance… Architecture, Infrastructure, and Operations (AIO) is the latest booklet released by the Federal Financial Institutions Examination Council (FFIEC) in their line of  IT Examination Handbooks. It is an update to their 2004 Operations booklet and, as the name implies, expands into the areas […]


Risk-Based Authentication Practices

By Dan Hadaway - Last updated: Monday, June 21, 2021

A follow-up on Dan’s 2008 Password Manifesto On the NIST Publication on Digital Identity Guidelines Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . In June 2017, NIST released a special publication on digital identity, NIST SP 800-63, that is starting to get the attention […]


‘Disrupted’ Employees: The New Insider Threat?

By Vigilize - Last updated: Monday, April 12, 2021

Employees working from home may find it more difficult to follow security policies… An article review. The surge in employees working from home during the pandemic created many headaches for IT departments around the world, many of whom had no telecommuting policies or procedures before the start… but what about the employees who had to […]


Reinventing Meeting Management Movie

By Vigilize - Last updated: Monday, January 18, 2021

A Webinar-Movie In our current world of uncertainty there is at least one thing that is certain. Business needs to continue, and that means that it is important for managers to be able to meet with their team even if everyone is working remotely at this point. In this Webinar-Movie, Dan will compare virtual meeting […]


Zoom Security: No longer an Oxymoron

By Reynolds | Hadaway - Last updated: Tuesday, July 14, 2020

Lessons Learned from Zoom’s Rise… The only constant is change. An illustration of impermanence in information security. Zoom’s popularity is in a large part thanks to its ease of use and low cost. How can you go wrong with an application that is popular, cost effective, and easy to use? Good question, easy answer: security. […]


20 Questions – A Pandemic Polling Discussion!

By Vigilize - Last updated: Monday, May 25, 2020

Experts Warn of Attacks on Telecommuters

By Vigilize - Last updated: Monday, March 23, 2020

As more offices rely on working remotely, hackers are working to take advantage… An article review. As concerns over the coronavirus continue to mount, more Americans than ever are working remotely from their homes…and hackers are looking to take advantage of the situation.  That’s according to the Department of Homeland Security’s Cybersecurity and Infrastructure Security […]


The Threat From Within

By Vigilize - Last updated: Monday, March 2, 2020

One of the biggest data security threats you face comes from inside… An article review. We spend a lot of time thinking about the threats to our network posed by hackers: from ransomware and phishing scams to data breaches, we often view the culprit as being some unknown person or organization… someone possibly not even […]


Trust, but Segregate!

By Dan Hadaway - Last updated: Wednesday, October 16, 2019

Show this article to your CFO the next time he or she asks for a budget. Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . It’s time . . . no wait, it’s WAY PAST TIME . . . that community banks spend the money […]


Microsoft Considers Changing Password Guidance

By Vigilize - Last updated: Monday, April 29, 2019

Password expiration rules can create more problems than they solve… An article review. Passwords, it seems, are a lot like diets. They’re often necessary, but no one really wants to have to deal with them–and we’re always looking for the next trick to make the process easier. And just like there’s always a new diet […]