Technical Security Standards

Cybersanity in the Incident Response Age

Their unprecedented breach presents an opportunity to learn. A Jolley | Hadaway Article. The recent data breach at Equifax has shocked many of us, even the ones who have become desensitized to the “breach parade,” the regular stream of news regarding major o...

Forgotten But Not Gone: The Ex-Employee Risk

Failure to deprovision former employees presents a real risk to businesses. An article review. When terminating an employee you probably make sure that they turn in keys, access cards, and any other physical access credentials, but how sure are you that their electronic...

Small Business Resource Page

Small Business Technology Risk Management Starting Points Remember, these are merely generic starting points! They may not be all-inclusive for your unique business! The infotex Small Business Technology Risk Assessment A starting point to determine tactics. For a movie...

When You Accidentally Go Open Source

32 TB of Windows 10-related source code is now available, for better or for worse… An article review. Releasing the source code for a project has been a common practice among some developers for decades now–proponents say allowing any interested parties to v...

Ten Must-Reads For Information Security Awareness

These titles should be on every professional’s list. An article review. If there’s one thing you can take away from the most recent installment of our annual T7 article, it’s that the threats we face when securing IT assets are a diverse and constantl...

Digital Security Standard Compliance: Is It Enough?

While the credit card industry-backed program has good aspects, it should not replace the SOC-2. With the number of different security standards–and ways to test those standards–out there, it can be difficult to stay on top of just what is required, complian...

A Password Management Horror Story

Not having strong policies surrounding shared passwords could make your data a hostage An article review. Do you know who is in control of the various account credentials used by your organization’s employees? One Indianapolis company is, but only after a fired e...

In-Memory Malware Hitting Banks Across The Globe

Residing almost entirely in memory, these new attacks are much harder to combat An article review. Our friend Wes Pollard at Home Bank turned us on to this story from Ars Technica about a rash of new malware attacks with a new twist: they reside almost entirely in a co...

The TSP: An Important Consideration

Something to look at when choosing your next service provider. . . A short Jolley | Hadaway article In our due diligence packet prospects and clients eventful tax will discover that we are proud to be part of a program that is called the FFIEC’s Technology Service Prov...

Alarming Recurring Finding

“Mal-Configured Secure E-Mail . . .” A new risk arises as Secure Messaging Enters the Late-Majority Adoption Phase! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . So we’re auditing a bank and the...