About Us | Contact Us
View Cart
Archive for 'Awareness Messages' Category

The Rise of “Shadow Data”

By Vigilize - Last updated: Monday, October 8, 2018

Even if you haven’t ever used Facebook, your friends and family may have already let them build a profile on you… An article review. For this week’s review we had initially planned on using this interesting piece from Brian Krebs, about the dangers of resold personal information ending up in the cloud (and the dark […]


The Pine Processionary

By Dan Hadaway - Last updated: Saturday, September 8, 2018

Battling Procedure Fatigue in Cybersecurity . . . Or . . . making sure we don’t just go through the motions! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . When it comes to the routine things in life, it can be easy to get […]


National Cybersecurity Awareness Month Themes Announced

By Vigilize - Last updated: Monday, September 3, 2018

Weekly themes for the annual event have been announced… An article review. October is National Cybersecurity Awareness Month, and the weekly themes for this year’s event have been released: Oct. 1­–5: Make Your Home a Haven for Online Safety Oct. 8–12: Millions of Rewarding Jobs: Educating for a Career in Cybersecurity Oct. 15–19: It’s Everyone’s […]


The Risk of Convenience

By Vigilize - Last updated: Thursday, August 16, 2018

Consolidating passwords and other account information can save time, but expose you to risk… An article review. Given the amount of account related information that the average person is expected to keep track of–such as account numbers, passwords, PINs and secret questions–it’s no wonder that a convenience like the Fuze Card was such a success […]


The 12 Billion Dollar Scam

By Vigilize - Last updated: Sunday, July 22, 2018

New FBI statistics suggest compromised business email accounts have led to over 12 billion dollars in losses since 2013… An article review. So much attention has been paid to ransomware, botnets and other relatively recent developments that it’s easy to forget about some of the older threats that are still out there claiming victims. Our […]


Gimmicks and Bribes in Awareness Training

By Vigilize - Last updated: Monday, March 12, 2018

Motivating employees toward awareness can take more than prizes and prodding… An article review. Keeping your employees on top of security related issues can sometimes seem to be a daunting task, and it’s not something that can ever be considered finished: it’s an ongoing process much like the threats themselves. Considering that, it’s not surprising […]


Understanding Patch Management

By Jolley | Hadaway - Last updated: Wednesday, January 10, 2018

It’s like a recall on your car… A Jolley | Hadaway Article. If you like to stay current on technology news, you’ve probably found it hard to ignore the recent stories about a major security problem with Intel processors, and the rush from software and hardware companies to mitigate the issue.  Most of the solutions […]


infotex Reorganizes its Vigilize Post Category

By Vigilize - Last updated: Tuesday, July 18, 2017

In order to facilitate awareness messaging in email and social media, infotex is returning to the original meaning of their word, “Vigilize.” Articles posted at my.infotex.com/copy-n-paste are meant for you to use in your awareness campaigns free of charge. Just copy them, paste them, and edit them to make them yours! Intended Use: The purpose […]


Why you should ALWAYS use strong passwords!

By Dan Hadaway - Last updated: Thursday, June 22, 2017

We can’t predict where the bad guys will strike next . . . Or how they can use technology to hurt us! A Vigilize Post!  Sometimes you might think, “well . . .  okay, I buy in this strong password thing, but I am not going to use strong passwords in all my applications and websites […]


The Anatomy of a CAT Attack

By Dan Hadaway - Last updated: Tuesday, August 27, 2013

In order to understand the power of the three layers of security required by the June 2011 Supplement to the FFIEC’s 2005 Guidance on Authentication in an Internet Banking Environment, it is helpful to understand just how a corporate account takeover (CAT) attack works. Nowadays, criminals can purchase applications that are designed to attack American […]