– when I used ChatGPT to write last week’s DNL?Or am I using AI as a tool?Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . If you haven’t been following this blog, you may not have noticed that:I set a goal ...
Another awareness poster for YOUR customers (and users). Now that we have our own employees aware, maybe it’s time to start posting content for our customers!
Check out posters.infotex.com for the whole collection!
Download the large versions here:
Awareness Poste...
Trending: Awareness Posters Meet Infographics
Here are the top seven posters as of the last twelve months!
As always, our Awareness Posters were a hit in 2022! So we decided to run some reports to see what our most popular posters were since November 2021....
With nearly three in four people using third-party payment services tied to their bank accounts, the risk isn’t limited to your own policies and procedures…
An article review.
When working on cybersecurity awareness messages for your customers you may be in...
What to Expect in an Annual Information Security Report to the Board
Webinar-Movie
Information security ranks as a top risk to financial institutions, both in terms of likelihood and overall impact. It is important that boards receive annual comprehensive reporting from m...
Top 7 Trend Articles of 2022. . .
. . .For ISOs of Small Financial Institutions.
Welcome to our annual T7 article: a list of our favorite trend articles from the past year. Our intent: help you organize your thoughts as you work through your strategic planning proce...
A new way of helping people “read” new guidance…
Look for more in the future!
To save you time, we are proud to present “Adam Reads” . . . recorded versions of our Guidance Summaries!
Below you can find an embedded player for the audio file...
Software Bill of Materials (SBOMs) are becoming more and more important. . .
We are all very familiar with one aspect of the software supply chain – updates. New features, bug fixes, and performance upgrades are a regular occurrence to any device’s lifecycl...
Understanding Banking Trojans…
Another Technical Article by Tanvee Dhir!
What are Banking Trojans?
A trojan is a malicious program that masquerades as a genuine one. They are often designed to steal sensitive information from users (login passwords, account numbe...
Millions of phishing emails will get through automated defenses this year, are your employees ready?
An article review.
With cybersecurity threats such as cryptocurrency miners and ransomware seeming to dominate the news, it can be easy to forget about older threats suc...