About Us | Contact Us
View Cart
Archive for 'Asset Management' Category

Zoom Security: No longer an Oxymoron

By Reynolds | Hadaway - Last updated: Tuesday, July 14, 2020

Lessons Learned from Zoom’s Rise… The only constant is change. An illustration of impermanence in information security. Zoom’s popularity is in a large part thanks to its ease of use and low cost. How can you go wrong with an application that is popular, cost effective, and easy to use? Good question, easy answer: security. […]


Security in a Cloud Computing Environment

By Adam Reynolds - Last updated: Tuesday, June 16, 2020

An Update to the FFIEC Outsourced Cloud Computing Document In April 2020, the FFIEC released their “Joint Statement on Risk Management for Cloud Computing Services” as an update to their 2012 statement “Outsourced Cloud Computing.” The 2012 statement was a short, four-page document that addressed the key elements of outsourced cloud computing as identified in […]


Printers Remain a Significant Network Threat

By Vigilize - Last updated: Monday, August 26, 2019

Nearly 50 vulnerabilities were found in printers from the top six brands… An article review. You’re aware of phishing scams, you don’t open e-mail attachments you weren’t expecting to receive, your virus definitions are updated regularly and you don’t connect to unsecured wifi networks…but when was the last time you thought about your printer? A […]


Many School Districts Are Still Vulnerable To WannaCry

By Vigilize - Last updated: Tuesday, May 28, 2019

Years after patches were released, many systems remain vulnerable… An article review. While it has been over two years since the WannaCry exploit was publicly announced, a new report submitted by our own Sean Waugh says that hundreds of thousands of internet-connected machines are still vulnerable…and many of those machines belong to government agencies and […]


Asus Malware Highlights The Risk of Supply Chain Attacks

By Vigilize - Last updated: Monday, April 8, 2019

The malware was distributed through Asus’ own tool, and was signed with a valid certificate… An article review. When it comes to avoiding malware and other internet attacks, most users know you should avoid downloading files from unknown sources—but a recent attack targeting Asus customers is a reminder that sometimes even that may not be […]


Bitlocker Attack Puts Data At Risk

By Vigilize - Last updated: Monday, April 1, 2019

A simple $30 part and publicly available code allowed access to keys… An article review. Researchers recently announced a new successful attack against Bitlocker, a full-disk encryption tool that has built into Windows since Vista, and the attack is surprisingly simple in its execution. The attack, detailed in an article submitted to us by our […]


Sign-In Kiosks May Be Putting You At Risk

By Vigilize - Last updated: Monday, March 11, 2019

New research reveals issues with these commonly overlooked devices… An article review. With computers involved in our lives and businesses in so many ways, it can seem like we’re always being warned of another overlooked device that is ready to wreak havoc. While the attention of many security researchers has been focused on the rise […]


New Exploits Turn ATM Hacking Into a Game

By Vigilize - Last updated: Monday, February 25, 2019

Hackers are getting unusually creative in their attacks… An article review. One drawback of limiting the scope of our annual review articles (the M-7, T-7 and R-7) to seven items is that we don’t always get to include every subject we’d like to. Luckily we had our friend Wes Pollard to point out a great […]


T7: The Trend of Trends 2019

By Vigilize - Last updated: Monday, February 11, 2019

The seven best trend articles in 2019 . . . For ISOs of small financial institutions. While it may not feel like it yet for some of us, we’re well on our way into 2019, and that means it’s time for the last of our annual articles looking at predictions and trends in information technology. Previously, […]


Legacy Devices Pose A Security Risk

By Vigilize - Last updated: Monday, November 19, 2018

Devices like fax machines and copiers are often classified as office supplies and slip past IT scrutiny… An article review. Despite all the advances in technology, most offices still generate large volumes of printed documents, and the devices used to produce and process those documents could expose you to more risk than you’d think. A […]