Archive for 'Risk Management' Category
If you’re in charge of reviewing insurance from an IT perspective, here are three helpful hints… A Jolley | Hadaway Short. Tell your critical vendors you want to have an “endorsement” on their cyber insurance policies. Note: this does not put you ahead of anybody in the “lawsuit line,” That is a myth. But what […]
R-7 – The Top Seven Risks – 2018: Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . When Dan presents audit reports to boards of directors, he also talks to the board about the top risks the institution is facing. Since 2006, Dan has been […]
As lines of code continue to replace humans and physical devices, quality control is essential…and often overlooked. An article review. Looking back over the last decade or two it is easy to see how computers have changed physically as they shrank in size, spreading to our pockets and beyond, but another change was going on […]
While Many Devices Have Already Been Patched, Many More May Never Be… An article review. When does exploit news cross the line into being a trend? How about when it impacts essentially every single wi-fi enabled device? That’s the takeaway from the recently announced vulnerability in the WPA2 wireless security standard, detailed in this TechCrunch […]
Infotex is finally ready to say something about the Equifax Breach, the Ultimate Educational Moment. This Jolley | Hadaway article will explain why we’ve been silent, ’til now!
Two Salesforce security team members were let go following their presentation of a new testing platform. An article review. Before you join that panel discussion of disgruntled bankers, consider this story that comes to us by way of Joe Cychosz: a pair of Salesforce security team members were let go shortly after their presentation at the […]
A new study reveals half of the employers think their biggest risk comes from the inside. An article review. When considering threats that your network may face, how often do you consider the people who work for you? A new study from Kaspersky shows more than half of businesses see their employees as their biggest […]
Dan has whittled all the noise to five resources a Small Business Owner should investigate (and utilize).
Recognizing early signs of trouble can save you from big issues later. A Jolley|Hadaway Article Maybe you’ve already seen some of the signs yourself. Your mouse cursor may move on its own, when you’re not touching it. Or you get notifications for a delivery, but the address isn’t yours. Those are some dead canaries: signs […]
We’ve identified a whole new set of trend articles in Information Security that those in the field should know about, and while our take on this year’s installment is coming a little late we think you’ll agree that there have been plenty of new developments since last year!