Tools

Protected: Mobile Banking Tools

  The Horse, Then the Cart: Controlling Mobile Banking Risk The top five risks with Mobile Banking and how to avoid them. Whether we’re offering fully engaged Mobile Banking solutions, dipping our toes in the water with text-based notifications, or are simply waiting...

Social Media Slides Added to Tools Page (m.infotex.com/tools)

Security Awareness Training – Acceptable use Social Media is a hot topic in Security Awareness Training agendas these days. As such, Dan Hadaway, an expert speaker on the subject of “Acceptable Use,” is making available an excerpt from his normal User Awareness Trai...

Wireless (Mobile) Banking Tools

Whether we’re offering fully engaged Mobile Banking solutions, dipping our toes in the water with text-based notifications, or are simply waiting proudly to be safe, late majority adapters . . . . we all know that the many technologies under the umbrella called “Mobile” ...

Protected: Technical Audit Toolkit

Workshop Portal Upon completion of the Technical Audit Toolkit Workshop, infotex grants attendees permission to use these boilerplates and will turn over copyright of the resulting documents to your financial institution. By using any of the boilerplates, you signify agre...

Data Inventory

Do you know where your data is? went? A good incident response plan puts the finishing touch on an IT Governance Program. Where are the boundaries of what you used to call your “network?”   Though not the first priority in developing a sound IT Governance Pro...

Data Classification Policy

Sorting your data . . . . Data Classification is a Proactive Control. “It’s not as much about what to protect as it is about what hoops to jump through to protect it.”   Sound IT Governance eventually includes developing a Data Inventory, and one of the...

Digital Evidence Collection

It’s almost Friday and I still haven’t come up with a winner for my weekly Dan’s New Leaf post.  So I’m going to cheat again.  It’s easy for me to write about services that I think are going to really do well with our clients.   (Especially w...

Social Media: Business Benefits and Security, Governance and Assurance Perspectives

ISACA has published a white paper covering the impacts of social media; what is considered “social media”; risks, security, and privacy concerns; and other various issues concerning the business use of social media. Initiated as a consumer-oriented technology,...

Social Media Tools

The following tools are very helpful in trying to build a social media presence. First, a tool suggested to my by my friend, client, and associate Marwan Hanania. It’s an on-line application called twollow. Twollow finds tweets with key words you choose. You then...

Infotex Webinar – Data Flow Diagramming

If you’ve performed your Cybersecurity Assessment you’re probably wondering, “what is this data flow diagramming thing, why have my auditors never asked me for it, and how do I do one for my bank?” Join us as we run down the answers to those three ...