2 min read
Managing the Relationship Between Information Technology and Information Security
It’s easy to use the terms “Information Technology (IT)” and “Information Security (IS)” interchangeably. They are equally important but serve...
2 min read
It’s easy to use the terms “Information Technology (IT)” and “Information Security (IS)” interchangeably. They are equally important but serve...
2 min read
Everyone is on high alert right now because of Russian ransomware attacks as a part of the conflict in Ukraine.
2 min read
This week the threat from Russia to the Ukraine has turned to reality. The attack was preceded by cyber threats probably long before the physical...
1 min read
Every year, thousands of people fall victim to tax-related phishing scams. As with most intrusions, it only takes one click on a fraudulent link to...
2 min read
In August, the FFIEC released new guidance titled “Authentication and Access to Financial Institution Services and Systems”. Because the guidance...
2 min read
Most information security professionals understand the compliance and business requirements of keeping management informed of the Information...
2 min read
This post is intended to help community financial institutions appropriately prioritize their response efforts to the Log4Shell vulnerability. If...
2 min read
We often run into situations where different staff in an institution have different understandings of the goals and operations of their backup...
2 min read
Phishing remains one of the top threats to organizations today. Every user regularly receives emails designed to trick them into clicking on a link,...
3 min read
There’s been an interesting trend in the virtual CISO industry over the last several months.