About Us | Contact Us
View Cart
Archive for 'Management Awareness' Category

Interns Present New Social Media Risk

By Vigilize - Last updated: Monday, June 3, 2019

A new generation of interns may open organizations up to new risks… An article review. If you’ve been paying attention to the world of breaches and other security lapses over the years, the idea of the “insider threat” is probably nothing new—your own employees can sometimes be as likely to cause an incident as a […]


The Evolution of Phishing

By Vigilize - Last updated: Monday, April 22, 2019

As user awareness grows, criminals are changing their tactics… An article review. First, some good news: Users are becoming more aware of phishing attacks, especially high-ranking users such as executives. Unfortunately, the bad news is that criminals are aware of this and are adapting their strategies to target new groups. The new targets, according to […]


Asus Malware Highlights The Risk of Supply Chain Attacks

By Vigilize - Last updated: Monday, April 8, 2019

The malware was distributed through Asus’ own tool, and was signed with a valid certificate… An article review. When it comes to avoiding malware and other internet attacks, most users know you should avoid downloading files from unknown sources—but a recent attack targeting Asus customers is a reminder that sometimes even that may not be […]


Bitlocker Attack Puts Data At Risk

By Vigilize - Last updated: Monday, April 1, 2019

A simple $30 part and publicly available code allowed access to keys… An article review. Researchers recently announced a new successful attack against Bitlocker, a full-disk encryption tool that has built into Windows since Vista, and the attack is surprisingly simple in its execution. The attack, detailed in an article submitted to us by our […]


Microsoft Discontinues Support For SHA-1

By Vigilize - Last updated: Monday, March 4, 2019

Known to be vulnerable since 2005, the algorithm will be phased out over the next several months… An article review. Things can move slowly in the world of cryptography, and for evidence of that one needs to look no further than SHA-1–the hash algorithm introduced in 1995, found to be vulnerable to attack in 2005 […]


New Exploits Turn ATM Hacking Into a Game

By Vigilize - Last updated: Monday, February 25, 2019

Hackers are getting unusually creative in their attacks… An article review. One drawback of limiting the scope of our annual review articles (the M-7, T-7 and R-7) to seven items is that we don’t always get to include every subject we’d like to. Luckily we had our friend Wes Pollard to point out a great […]


Can We Trust Our Technology?

By Vigilize - Last updated: Monday, February 4, 2019

A new exploit involving Apple’s FaceTime is a reminder that our gadgets can be turned against us… An article review. Our regular readers know that we usually try to avoid reporting on current events, but this latest exploit really caught our attention! In short, it is possible to activate the microphone or camera on an […]


“Reply-All” Email Incident Hits Microsoft

By Vigilize - Last updated: Monday, January 28, 2019

At its peak over 11,500 employees were ensnared in the email chain… An article review. When it comes to email awareness we usually focus on threats coming into our mailboxes from the outside world, like phishing scams. A recent incident at Microsoft, however, serves as a reminder that there’s more than phishing to be aware […]


R-7 – The Top Seven Risks – 2019

By Dan Hadaway - Last updated: Monday, January 7, 2019

Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . When Dan presents audit reports to boards of directors, he also talks to the board about the top risks the institution is facing. Since 2006, Dan has been compiling a list of the “top seven risks […]


P-7 The Top Seven Awareness Posters 2018

By Vigilize - Last updated: Monday, December 10, 2018

Some of them about passwords . . . By view count, here are the top seven posters as of 12/10/2018!Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Given what a hit the posters we did during the year were, we decided to run some reports to […]