About Us | Contact Us
View Cart
Archive for 'Risk Management' Category

Tactical Plan Alternatives

By Sara Fultz - Last updated: Wednesday, November 18, 2020

  Alternatives From 2020 Conferences The 2020 Update Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Each year as we go to various conferences throughout the Midwest ranging in scope; from small banker conferences that Dan himself moderates, to hacker conferences like Defcon.  We […]


US Treasury Warns Against Paying Ransomware Gangs

By Vigilize - Last updated: Wednesday, October 21, 2020

Ransomware payments sent to countries under sanctions could result in fines… An article review. Whether or not to pay the organization behind a ransomware attack has been a hotly debated subject for many years, but a new advisory issued by the Treasury Department’s Office of Foreign Assets Control (OFAC) warns those who do pay up […]


2020 IBA Cybersecurity Conference Insurance Review Checklist

By Vigilize - Last updated: Friday, October 2, 2020

Welcome 2020 IBA Cybercon Attendees! You can download a zip folder that includes our Simplified Insurance Review Boilerplate! Download Here Also, if you are interested in Insurance Review check out our video!    


Intelligence Agencies Release Joint Cybersecurity Advisory

By Vigilize - Last updated: Monday, September 7, 2020

Intelligence agencies from five nations contributed to the new advisory… An article review. For the first time, the cybersecurity divisions of the nations in the “Five Eyes” alliance (The United States, United Kingdom, Canada, Australia and New Zealand) have released a joint advisory concerning incident response. The report, available here, does not provide a complete […]


“Sharing Too Much” Awareness Poster

By Vigilize - Last updated: Thursday, August 13, 2020

Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office.  


Zoom Security: No longer an Oxymoron

By Reynolds | Hadaway - Last updated: Tuesday, July 14, 2020

Lessons Learned from Zoom’s Rise… The only constant is change. An illustration of impermanence in information security. Zoom’s popularity is in a large part thanks to its ease of use and low cost. How can you go wrong with an application that is popular, cost effective, and easy to use? Good question, easy answer: security. […]


Security in a Cloud Computing Environment

By Adam Reynolds - Last updated: Tuesday, June 16, 2020

An Update to the FFIEC Outsourced Cloud Computing Document In April 2020, the FFIEC released their “Joint Statement on Risk Management for Cloud Computing Services” as an update to their 2012 statement “Outsourced Cloud Computing.” The 2012 statement was a short, four-page document that addressed the key elements of outsourced cloud computing as identified in […]


Experts Warn of Attacks on Telecommuters

By Vigilize - Last updated: Monday, March 23, 2020

As more offices rely on working remotely, hackers are working to take advantage… An article review. As concerns over the coronavirus continue to mount, more Americans than ever are working remotely from their homes…and hackers are looking to take advantage of the situation.  That’s according to the Department of Homeland Security’s Cybersecurity and Infrastructure Security […]


FFIEC Releases Updated Pandemic Guidance

By Vigilize - Last updated: Monday, March 9, 2020

As reports of Coronavirus spread, the agency has updated its 2007 guidance… An article review. As what began as a few isolated incidents late last year have bloomed into a what some are calling a pandemic, fears of Coronavirus (also known as COVID-19) have spread into nearly all sectors…and banking is no exception. In light […]


The Threat From Within

By Vigilize - Last updated: Monday, March 2, 2020

One of the biggest data security threats you face comes from inside… An article review. We spend a lot of time thinking about the threats to our network posed by hackers: from ransomware and phishing scams to data breaches, we often view the culprit as being some unknown person or organization… someone possibly not even […]