About Us | Contact Us
View Cart
Archive for 'Risk Management' Category

A Seven Step Process to Combat Insider Threats

By Dan Hadaway - Last updated: Monday, September 30, 2019

Incident response testing is the stone that kills many birds… Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Good morning.  It’s 5:00am on a weekend, and I’m preparing my talk for the Cybersecurity Conference this week. While the talk is only supposed to be […]


Hearing Isn’t Believing: The Rise of Voice Fraud

By Vigilize - Last updated: Monday, September 16, 2019

“Deep Fake” Technology is Behind The New Trend of AI-Assisted Fraud… An article review. It’s a scenario that probably happens far more often than we’d like to admit: an employee gets a phone call from a superior requesting they perform some task that is out of the ordinary. There are policies in place requiring more […]


FFIEC Emphasizes The Importance of Standardized Cybersecurity Assessments

By Vigilize - Last updated: Tuesday, September 3, 2019

These tools will help you assess and improve your cybersecurity preparedness… An article review. If you’re a regular reader of our blog, you know that we think cybersecurity training and the tools that go along with it are vitally important to any organization that relies upon computers—which is pretty much everyone, now. The Federal Financial […]


Printers Remain a Significant Network Threat

By Vigilize - Last updated: Monday, August 26, 2019

Nearly 50 vulnerabilities were found in printers from the top six brands… An article review. You’re aware of phishing scams, you don’t open e-mail attachments you weren’t expecting to receive, your virus definitions are updated regularly and you don’t connect to unsecured wifi networks…but when was the last time you thought about your printer? A […]


Four Risk Appetite Statements

By Dan Hadaway - Last updated: Thursday, June 6, 2019

Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . For all the same reasons a board of directors would want to establish a risk appetite statement on loan risk or other major risk categories, the 2015 Cybersecurity Assessment Tool gave us the ability to establish […]


Interns Present New Social Media Risk

By Vigilize - Last updated: Monday, June 3, 2019

A new generation of interns may open organizations up to new risks… An article review. If you’ve been paying attention to the world of breaches and other security lapses over the years, the idea of the “insider threat” is probably nothing new—your own employees can sometimes be as likely to cause an incident as a […]


Many School Districts Are Still Vulnerable To WannaCry

By Vigilize - Last updated: Tuesday, May 28, 2019

Years after patches were released, many systems remain vulnerable… An article review. While it has been over two years since the WannaCry exploit was publicly announced, a new report submitted by our own Sean Waugh says that hundreds of thousands of internet-connected machines are still vulnerable…and many of those machines belong to government agencies and […]


Microsoft Considers Changing Password Guidance

By Vigilize - Last updated: Monday, April 29, 2019

Password expiration rules can create more problems than they solve… An article review. Passwords, it seems, are a lot like diets. They’re often necessary, but no one really wants to have to deal with them–and we’re always looking for the next trick to make the process easier. And just like there’s always a new diet […]


Sign-In Kiosks May Be Putting You At Risk

By Vigilize - Last updated: Monday, March 11, 2019

New research reveals issues with these commonly overlooked devices… An article review. With computers involved in our lives and businesses in so many ways, it can seem like we’re always being warned of another overlooked device that is ready to wreak havoc. While the attention of many security researchers has been focused on the rise […]


New Exploits Turn ATM Hacking Into a Game

By Vigilize - Last updated: Monday, February 25, 2019

Hackers are getting unusually creative in their attacks… An article review. One drawback of limiting the scope of our annual review articles (the M-7, T-7 and R-7) to seven items is that we don’t always get to include every subject we’d like to. Luckily we had our friend Wes Pollard to point out a great […]