User Awareness Program

Did I Cheat?

– when I used ChatGPT to write last week’s DNL?Or am I using AI as a tool?Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . If you haven’t been following this blog, you may not have noticed that:I set a goal ...

“Pop-Up Awareness” Awareness Poster

Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poste...

P-7 The Top Seven Awareness Posters 2022

Trending: Awareness Posters Meet Infographics Here are the top seven posters as of the last twelve months! As always, our Awareness Posters were a hit in 2022! So we decided to run some reports to see what our most popular posters were since November 2021....

Why Awareness Training Should Go Beyond Your Own Services

With nearly three in four people using third-party payment services tied to their bank accounts, the risk isn’t limited to your own policies and procedures… An article review. When working on cybersecurity awareness messages for your customers you may be in...

What to Expect in an Annual Information Security Report to the Board Webinar Movie

What to Expect in an Annual Information Security Report to the Board Webinar-Movie Information security ranks as a top risk to financial institutions, both in terms of likelihood and overall impact. It is important that boards receive annual comprehensive reporting from m...

T7: The Trend of Trends 2022

Top 7 Trend Articles of 2022. . .  . . .For ISOs of Small Financial Institutions. Welcome to our annual T7 article:  a list of our favorite trend articles from the past year.  Our intent: help you organize your thoughts as you work through your strategic planning proce...

Adam Reads: The “36 Hour Rule” Guidance Summary

A new way of helping people “read” new guidance… Look for more in the future! To save you time, we are proud to present “Adam Reads” . . . recorded versions of our Guidance Summaries! Below you can find an embedded player for the audio file...

Managing Software Supply Chain Risk

Software Bill of Materials (SBOMs) are becoming more and more important. . . We are all very familiar with one aspect of the software supply chain – updates.  New features, bug fixes, and performance upgrades are a regular occurrence to any device’s lifecycl...

Banking Trojans: Menace to the Financial World

Understanding Banking Trojans… Another Technical Article by Tanvee Dhir! What are Banking Trojans? A trojan is a malicious program that masquerades as a genuine one. They are often designed to steal sensitive information from users (login passwords, account numbe...

New Report Highlights Changing Phishing Trends

Millions of phishing emails will get through automated defenses this year, are your employees ready? An article review. With cybersecurity threats such as cryptocurrency miners and ransomware seeming to dominate the news, it can be easy to forget about older threats suc...