Skip to main content

Resources

What Documentation Should You Review for a Critical Vendor?

Wednesday, July 31, 2019

What Documentation Should You Review for a Critical Vendor?

How do you get assurance that a vendor is properly protecting your confidential customer information? Short of physically auditing or inspecting a vendor yourself, the best way to gain confidence in your vendor’s security posture is through the gathering of security-related documentation. So then – ...

Read More...

Categories: Blog

Windows Operating Systems Reaching End of Life in January 2020

Sunday, June 9, 2019

Windows Operating Systems Reaching End of Life in January 2020

The popular Microsoft operating system Windows 7 is slated to stop receiving extended support on January 14th, 2020. This means that Microsoft will no longer release patches for vulnerabilities or add any features to the Windows 7 operating system, which comprises nearly 34% of all active Windows OS...

Read More...

Categories: Blog

Building Out the Core Responsibilities of an ISO

Wednesday, May 29, 2019

Building Out the Core Responsibilities of an ISO

There are plenty of different roles and responsibilities a financial institution has to consider; however, one of the more difficult roles to address is that of the Information Security Officer (ISO). Even though all financial institutions have been expected to assign the role of ISO for nearly two ...

Read More...

Categories: Blog

Reporting Critical Information Security Areas Upstream

Thursday, May 23, 2019

Reporting Critical Information Security Areas Upstream

One of the most critical aspects of any Information Security Program is communication and sharing information. This is especially true with Executives and Board of Directors, who need to be educated and informed on all aspects of information security so they can ask better questions and make appropr...

Read More...

Categories: Blog
Page 11 of 26First   Previous   6  7  8  9  10  [11]  12  13  14  15  Next   Last