Archive for 'Awareness Messages' Category
Consolidating passwords and other account information can save time, but expose you to risk… An article review. Given the amount of account related information that the average person is expected to keep track of–such as account numbers, passwords, PINs and secret questions–it’s no wonder that a convenience like the Fuze Card was such a success […]
New FBI statistics suggest compromised business email accounts have led to over 12 billion dollars in losses since 2013… An article review. So much attention has been paid to ransomware, botnets and other relatively recent developments that it’s easy to forget about some of the older threats that are still out there claiming victims. Our […]
Motivating employees toward awareness can take more than prizes and prodding… An article review. Keeping your employees on top of security related issues can sometimes seem to be a daunting task, and it’s not something that can ever be considered finished: it’s an ongoing process much like the threats themselves. Considering that, it’s not surprising […]
It’s like a recall on your car… A Jolley | Hadaway Article. If you like to stay current on technology news, you’ve probably found it hard to ignore the recent stories about a major security problem with Intel processors, and the rush from software and hardware companies to mitigate the issue. Most of the solutions […]
Notification is not explicitly required following a breach, but… Recently we published a short piece on the Family Educational Rights and Privacy Act (FERPA) and how it factors in to your incident response program. While we were working on that piece, though, we came across something we thought was odd: notification isn’t explicitly required by […]
In order to facilitate awareness messaging in email and social media, infotex is returning to the original meaning of their word, “Vigilize.” Articles posted at my.infotex.com/copy-n-paste are meant for you to use in your awareness campaigns free of charge. Just copy them, paste them, and edit them to make them yours! Intended Use: The purpose […]
We can’t predict where the bad guys will strike next . . . Or how they can use technology to hurt us! A Vigilize Post! Sometimes you might think, “well . . . okay, I buy in this strong password thing, but I am not going to use strong passwords in all my applications and websites […]
In order to understand the power of the three layers of security required by the June 2011 Supplement to the FFIEC’s 2005 Guidance on Authentication in an Internet Banking Environment, it is helpful to understand just how a corporate account takeover (CAT) attack works. Nowadays, criminals can purchase applications that are designed to attack American […]
A quick explanation of what we mean by “strong passwords” meant to be used in security reminders.
Some think that it is strictly the Information Security Officer’s job to keep us secure. Others think that it is the Network Administrator’s role. Still others think the task belongs to Superman. Sure, those individuals are important in keeping a “hacker free” network, but there is more to it than that!