Protected: Cybersecurity Basics
There is no excerpt because this is a protected post.
Tax Season Means An Old Scam Is On The Rise
An article review. Polite phishers try to capitalize on confusion “If your CEO appears to be e-mailing you for a list of company employees, check it out before you respond.” That’s the statement from the Commissioner of the IRS in an article our friend Larry Turner brought to our attention, and since tax season is upon […]
IT Departments Prepare For Smartwatches
As The New Technology Increases In Popularity, Organizations Must Assess The Risks Involved Recently the enterprise mobility management divisions of both BlackBerry and VMWare began adding tools to their platforms with the goal of helping IT departments manage smartwatches, ahead of a predicted explosion in the popularity of the devices. IDC reports that over 20 […]
FREE Infotex Webinar – Data Flow Diagramming
FREE Infotex Webinar – Data Flow Diagramming March 17th, 2016 1pm – 2pm EST FREE Infotex Webinar: Data Flow Diagramming If you’ve performed your Cybersecurity Assessment you’re probably wondering, “what is this data flow diagramming thing, why have my auditors never asked me for it, and how do I do one for my bank?” Join […]
Alarming Recurring Finding
“Mal-Configured Secure E-Mail . . .” A new risk arises as Secure Messaging Enters the Late-Majority Adoption Phase! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . So we’re auditing a bank and they send us files using their shiny new “Secure E-Mail System” and guess […]
Time To Re-Think Mandatory Password Changes?
Aging, in an attempt to be security-focused policy, could have unintended consequences which put data at risk. A new blog post by the Federal Trade Commission’s Chief Technologist offers new research and insight on a subject our Managing Partner Dan Hadaway originally brought up all the way back in 2009*: the unintended consequences of mandatory routine password […]
Protected: 2016 Due Diligence Packet
There is no excerpt because this is a protected post.
The Magnificent Seven – 2016
Alias: M-7 2016 Seven trends impacting small bank Information Security Officers! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Shhh . . . . . I’m sneaking this article in at the end of February! Hopefully no one will notice . . . So Okay. […]
Oracle Announces End Of Support For Java Plug-in
As Security Concerns Lead Browser Developers Away From Plug-ins, Oracle Winds Down Support Oracle recently announced plans to depreciate its Java browser plug-in with the release of Java 9, and will completely discontinue support at a later date. For many years Java had been a favorite of hackers due to its wide adoption and the […]
The 2016 IT Governance Tour!
Workshops and Conferences in 2016 and 2017! Note: all dates are tentative! Wanna know where infotex is going to be teaching this year? Scroll to the bottom for the latest, check out the top for movies of where we’ve already been! Let us know which topics you would like to see! 02/10/16 @ 9AM – […]