Skip to main content

Blog

OCC Answers Your Fintech, Vendor Management Questions

Thursday, June 15, 2017

OCC Answers Your Fintech, Vendor Management Questions

The OCC released 2013-29 FAQ on June 7th. It is 14 questions long and contains plenty of valuable information. Here are the Top 5 Takeaways, though SBS encourages you to read the FAQ in its entirety, especially if you are responsible for vendor management at your institution.

Read More...

Categories: Blog

{Cyber Byte Video} Protecting Your Mobile Devices

Thursday, June 15, 2017

{Cyber Byte Video} Protecting Your Mobile Devices

Why do we need security around our mobile devices? Confidential business data, access to personal information, rising cost of data usage, saved logins, and links to bank and credit card accounts are just a few of the many reasons why! Watch and share this video to review four critical steps to prote...

Read More...

Categories: Blog, Videos

{Whitepaper} How Often Should I Replace My Device?

Friday, June 9, 2017

{Whitepaper} How Often Should I Replace My Device?

Continued innovation in the smartphone market ensures the debut of a new flagship smartphone every 12-18 months. Yet, all this excitement around new smartphones likely won’t be the primary motivation for your organization to purchase new equipment every year. So how often should you replace your dev...

Read More...

Categories: Blog, Whitepapers

CAT 1.1 Is Out Of The Bag!

Friday, June 2, 2017

CAT 1.1 Is Out Of The Bag!

On the morning of Thursday, June 1st, an updated CAT was revealed to the financial industry. The good news is that the updates are not massive or wholesale, but rather necessary and welcomed. There are three important items about CAT 1.1 that you should know.

Read More...

Categories: Blog, In the News

WannaCry: Stop What You're Doing and Patch Your Computers!

Monday, May 15, 2017

WannaCry: Stop What You're Doing and Patch Your Computers!

WannaCry is the biggest malware event the Internet has ever seen, hands-down. This version of ransomware is the prophetic fulfillment of all those fire-and-brimstone IT folks that have been saying there will be a global malware epidemic. WannaCry is being called a “weapon of mass destruction,” and w...

Read More...

Categories: Blog

Risk's New Normal

Friday, May 12, 2017

Risk's New Normal

Risk Doesn’t Have to be a Four-Letter Word Here's the thing about risk: it doesn't have to be a bad thing. Risk means you're doing something new; something different. There's risk when you jump in a half-ton of metal and rubber and hurtle yourself down the highway at 65 mile...

Read More...

Categories: Blog

{Cyber Byte Video} How to Recognize a Fake Email

Wednesday, April 26, 2017

{Cyber Byte Video} How to Recognize a Fake Email

It only takes one compromise to get information from your organization. ONE person -> ONE moment -> ONE opportunity. Today, are YOU going to be that ONE? Watch and share this video to know what to look for in a suspicious email, what to do if you spot one, and what to do if you realize you cli...

Read More...

Categories: Blog, Videos

Authentication: What is Multi-Factor?

Friday, April 21, 2017

Authentication: What is Multi-Factor?

"Now Yahoo? Guess I have to change my password again." In the current online security climate, it seems like an almost daily occurrence to see a major website notifying users to change their passwords after a security incident. Secure, accurate, and quick authentication is more important than ever.

Read More...

Categories: Blog

{CYBER BYTE VIDEO} SYSTEM ACCESS AUTHENTICATION

Saturday, April 15, 2017

{CYBER BYTE VIDEO} SYSTEM ACCESS AUTHENTICATION

Your digital organization is under attack 24 hours a day, 7 days a week. Security controls are a must to prevent the loss of data and information, money, and reputation. Watch this video to learn more about password best practices and multifactor authentication to help strengthen your access securit...

Read More...

Categories: Blog, Videos
Page 19 of 22First   Previous   13  14  15  16  17  18  [19]  20  21  22  Next   Last