Skip to content
TRAC-Logo
 

Frustration-Free Risk Management

Simplify cybersecurity risk management and tackle your cybersecurity challenges with ease. TRAC automates the tedious risk assessment process and produces customized results that align with regulations, best practices, and your strategic goals.

Blog_HeaderGradients-10

Shane Daniel

avatar
Shane Daniel is a Senior Information Security Consultant for SBS CyberSecurity. As a former community bank internal auditor and compliance officer, Shane has over 25 years of experience helping financial institutions manage risk and profitability.

Blog Post by Shane Daniel

SBS Institute: FDIC INTREx Changes and their Impact on your next IT Exam

Stay informed about the impact of recent changes and updates to the IT Risk Examination (InTREx) program on your next IT Exam. Discover how the new guidelines on third-party relationships, accountability, and reporting requirements will affect you.
Start Reading

The New R-Sat: Changes in Latitudes, Changes in Attitudes

Discover the latest Ransomware Self-Assessment updates while exploring the fascinating connection between Jimmy Buffet and our inner Parrot Heads.
Start Reading

Threat Advisory: MOVEit Transfer Zero-Day Vulnerability

Progress Software's MOVEit Transfer tool is facing a zero-day vulnerability that could allow unauthorized access. Security experts are urging users to disable connectivity, apply patches, and monitor for compromise.
Start Reading

Threat Advisory: Recent Increase in BEC Activity

SBS CyberSecurity witnesses rise in BEC phishing emails posing as secure portals, confirming industry reports on prevalence of attacks.
Start Reading

Are Password Managers Secure?

Learn about the recent LastPass breach and the risks of using a central vault for passwords. Discover why password managers are still the most secure option.
Start Reading

Should I Test Employee Security Awareness?

Learn how to effectively test employee security awareness with various methodologies such as quizzes, workplace security reviews, dumpster diving, pretext phone calls, physical impersonation, flash drive drop attacks, and phishing attack simulations.
Start Reading