The Horse, Then the Cart: Controlling Mobile Banking Risk
The top five risks with Mobile Banking and how to avoid them.
Whether we’re offering fully engaged Mobile Banking solutions, dipping our toes in the water with text-based notifications, or are simply waiting...
Security Awareness Training – Acceptable use
Social Media is a hot topic in Security Awareness Training agendas these days. As such, Dan Hadaway, an expert speaker on the subject of “Acceptable Use,” is making available an excerpt from his normal User Awareness Trai...
Whether we’re offering fully engaged Mobile Banking solutions, dipping our toes in the water with text-based notifications, or are simply waiting proudly to be safe, late majority adapters . . . . we all know that the many technologies under the umbrella called “Mobile” ...
Workshop Portal
Upon completion of the Technical Audit Toolkit Workshop, infotex grants attendees permission to use these boilerplates and will turn over copyright of the resulting documents to your financial institution. By using any of the boilerplates, you signify agre...
Do you know where your data is? went?
A good incident response plan puts the finishing touch on an IT Governance Program.
Where are the boundaries of what you used to call your “network?”
Though not the first priority in developing a sound IT Governance Pro...
Sorting your data . . . .
Data Classification is a Proactive Control.
“It’s not as much about what to protect as it is about what hoops to jump through to protect it.”
Sound IT Governance eventually includes developing a Data Inventory, and one of the...
It’s almost Friday and I still haven’t come up with a winner for my weekly Dan’s New Leaf post. So I’m going to cheat again. It’s easy for me to write about services that I think are going to really do well with our clients. (Especially w...
ISACA has published a white paper covering the impacts of social media; what is considered “social media”; risks, security, and privacy concerns; and other various issues concerning the business use of social media.
Initiated as a consumer-oriented technology,...
The following tools are very helpful in trying to build a social media presence.
First, a tool suggested to my by my friend, client, and associate Marwan Hanania. It’s an on-line application called twollow. Twollow finds tweets with key words you choose. You then...
If you’ve performed your Cybersecurity Assessment you’re probably wondering, “what is this data flow diagramming thing, why have my auditors never asked me for it, and how do I do one for my bank?” Join us as we run down the answers to those three ...