Skip to main content

Resources

Entries for April 2017

{Webinar} Top 10 Missing FFIEC Cybersecurity Assessment Controls

Friday, April 28, 2017

{Webinar} Top 10 Missing FFIEC Cybersecurity Assessment Controls

The FFIEC Cybersecurity Assessment process is here to stay. At a minimum, most regulators are requiring financial institutions to complete an assessment on an annual basis. This process includes a review of an institutions Inherent Risk Level, identification of currently implemented controls to redu...

Read More...

Categories: Webinars

{Cyber Byte Video} How to Recognize a Fake Email

Wednesday, April 26, 2017

It only takes one compromise to get information from your organization. ONE person -> ONE moment -> ONE opportunity. Today, are YOU going to be that ONE? Watch and share this video to know what to look for in a suspicious email, what to do if you spot one, and what to do if you realize you cli...

Read More...

Categories: Blog, Videos

Authentication: What is Multi-Factor?

Friday, April 21, 2017

"Now Yahoo? Guess I have to change my password again." In the current online security climate, it seems like an almost daily occurrence to see a major website notifying users to change their passwords after a security incident. Secure, accurate, and quick authentication is more important than ever.

Read More...

Categories: Blog

{CYBER BYTE VIDEO} SYSTEM ACCESS AUTHENTICATION

Saturday, April 15, 2017

Your digital organization is under attack 24 hours a day, 7 days a week. Security controls are a must to prevent the loss of data and information, money, and reputation. Watch this video to learn more about password best practices and multifactor authentication to help strengthen your access securit...

Read More...

Categories: Blog, Videos

The Password is Dead; Long Live the Password

Thursday, April 6, 2017

One morning, your computer screen greets you with the dreaded “your password will expire soon, please change it” notification as you enter your credentials. A battle ensues to conjure up a new password in an attempt to meet password length and complexity requirements.

Read More...

Categories: Blog