About Us | Contact Us
View Cart
Archive for 'Awareness Messages' Category

Can We Trust Our Technology?

By Vigilize - Last updated: Monday, February 4, 2019

A new exploit involving Apple’s FaceTime is a reminder that our gadgets can be turned against us… An article review. Our regular readers know that we usually try to avoid reporting on current events, but this latest exploit really caught our attention! In short, it is possible to activate the microphone or camera on an […]


“Reply-All” Email Incident Hits Microsoft

By Vigilize - Last updated: Monday, January 28, 2019

At its peak over 11,500 employees were ensnared in the email chain… An article review. When it comes to email awareness we usually focus on threats coming into our mailboxes from the outside world, like phishing scams. A recent incident at Microsoft, however, serves as a reminder that there’s more than phishing to be aware […]


Data For Sale: How Anyone Can Locate Your Phone

By Vigilize - Last updated: Monday, January 21, 2019

Third party ‘location brokers’ are reselling data from carriers, and there may not be much you can do about it. An Article Review. For many years it has been common knowledge that your cell phone’s physical location can be identified–signal triangulation, GPS and even nearby wifi networks can be used by your cell phone company, […]


R-7 – The Top Seven Risks – 2019

By Dan Hadaway - Last updated: Monday, January 7, 2019

Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . When Dan presents audit reports to boards of directors, he also talks to the board about the top risks the institution is facing. Since 2006, Dan has been compiling a list of the “top seven risks […]


Legacy Devices Pose A Security Risk

By Vigilize - Last updated: Monday, November 19, 2018

Devices like fax machines and copiers are often classified as office supplies and slip past IT scrutiny… An article review. Despite all the advances in technology, most offices still generate large volumes of printed documents, and the devices used to produce and process those documents could expose you to more risk than you’d think. A […]


The Rise of “Shadow Data”

By Vigilize - Last updated: Monday, October 8, 2018

Even if you haven’t ever used Facebook, your friends and family may have already let them build a profile on you… An article review. For this week’s review we had initially planned on using this interesting piece from Brian Krebs, about the dangers of resold personal information ending up in the cloud (and the dark […]


The Pine Processionary

By Dan Hadaway - Last updated: Saturday, September 8, 2018

Battling Procedure Fatigue in Cybersecurity . . . Or . . . making sure we don’t just go through the motions! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . When it comes to the routine things in life, it can be easy to get […]


National Cybersecurity Awareness Month Themes Announced

By Vigilize - Last updated: Monday, September 3, 2018

Weekly themes for the annual event have been announced… An article review. October is National Cybersecurity Awareness Month, and the weekly themes for this year’s event have been released: Oct. 1­–5: Make Your Home a Haven for Online Safety Oct. 8–12: Millions of Rewarding Jobs: Educating for a Career in Cybersecurity Oct. 15–19: It’s Everyone’s […]


The Risk of Convenience

By Vigilize - Last updated: Thursday, August 16, 2018

Consolidating passwords and other account information can save time, but expose you to risk… An article review. Given the amount of account related information that the average person is expected to keep track of–such as account numbers, passwords, PINs and secret questions–it’s no wonder that a convenience like the Fuze Card was such a success […]


The 12 Billion Dollar Scam

By Vigilize - Last updated: Sunday, July 22, 2018

New FBI statistics suggest compromised business email accounts have led to over 12 billion dollars in losses since 2013… An article review. So much attention has been paid to ransomware, botnets and other relatively recent developments that it’s easy to forget about some of the older threats that are still out there claiming victims. Our […]