Skip to main content

Blog

BE LEERY OF FREE SECURITY

Wednesday, October 21, 2015

For many people, the best part of mobile security software isn’t the fact that they are getting the best protection; it’s that they are getting the best price. After all, who doesn’t want free anti-virus protection? Nonetheless, the concept of “free” software can lead to many consequences.

Read More...

Categories: Blog

WHO'S RESPONSIBLE FOR YOUR CUSTOMER DATA?

Friday, September 18, 2015

The FFIEC makes sure to remind us in multiple instances of guidance that it is ULTIMATELY the Board of Directors and Senior Management's responsibility to ensure the protection of YOUR customer data. Financial institutions must understand HOW their customers information is being protected.

Read More...

Categories: Blog

CATO: BEWARE OF THE MAN IN THE EMAIL

Thursday, September 3, 2015

In 2015 California-based Ubiquiti Networks fell victim to a $46M CATO scheme using a simple, yet complicated attack from a familiar technology - email. Man-in-the-email scams highlight the importance of monitoring cybersecurity trends and continually updating your CA Risk Assessment process.

Read More...

Categories: Blog

HEARD OF 1800?

Monday, August 3, 2015

Last time we had a new series for IT was in 1990, that's 25 years ago! In the past 30 days there has been significant activity around cybersecurity between NIST and FFIEC.

Read More...

Categories: Blog, In the News

INTERPRETING YOUR FFIEC CAT RESULTS

Monday, July 27, 2015

Great questions this week from bankers on the Cybersecurity Assessment process and how to interpret the results. I wanted to provide some general feedback on how to interpret your Risk/Maturity Relationship.

Read More...

Categories: Blog

IS THE FFIEC CYBERSECURITY ASSESSMENT TOOL REQUIRED?

Friday, July 17, 2015

The question that has been discussed in detail by examiners, bankers, and experts is this – “Is the FFIEC Cybersecurity Assessment Tool required?” I want to highlight a few clear facts that will hopefully help you decide, not necessarily is the tool required, but should I complete it today?

Read More...

Categories: Blog

HOW WHITELISTING HELPS PREVENT AND DETECT CATO

Wednesday, June 17, 2015

Many financial institutions and business customers have experienced the type of electronic banking theft known as Corporate Account Takeover (CATO). With this type of compromise, thieves attack the customer’s computer system and use this access to fraudulently change the ACH origination file.

Read More...

Categories: Blog
Page 31 of 31First   Previous   22  23  24  25  26  27  28  29  30  [31]  Next   Last