Skip to main content

Resources

Petya: PLEASE Patch Your Computers!

Thursday, June 29, 2017

Petya: PLEASE Patch Your Computers!

The internet has experienced yet another “global” ransomware epidemic, this time in the form of a new variant named “Petya.” Petya was initially discovered in the wild back in March of 2016, but this new variant sports some serious upgrades. Petya is now “wormable,” using the same SMBv1 exploit, als...

Read More...

Categories: Blog, In the News

OCC Answers Your Fintech, Vendor Management Questions

Thursday, June 15, 2017

OCC Answers Your Fintech, Vendor Management Questions

The OCC released 2013-29 FAQ on June 7th. It is 14 questions long and contains plenty of valuable information. Here are the Top 5 Takeaways, though SBS encourages you to read the FAQ in its entirety, especially if you are responsible for vendor management at your institution.

Read More...

Categories: Blog

{Cyber Byte Video} Protecting Your Mobile Devices

Thursday, June 15, 2017

{Cyber Byte Video} Protecting Your Mobile Devices

Why do we need security around our mobile devices? Confidential business data, access to personal information, rising cost of data usage, saved logins, and links to bank and credit card accounts are just a few of the many reasons why! Watch and share this video to review four critical steps to prote...

Read More...

Categories: Blog, Videos

{Whitepaper} How Often Should I Replace My Device?

Friday, June 9, 2017

{Whitepaper} How Often Should I Replace My Device?

Continued innovation in the smartphone market ensures the debut of a new flagship smartphone every 12-18 months. Yet, all this excitement around new smartphones likely won’t be the primary motivation for your organization to purchase new equipment every year. So how often should you replace your dev...

Read More...

Categories: Blog, Whitepapers

CAT 1.1 Is Out Of The Bag!

Friday, June 2, 2017

CAT 1.1 Is Out Of The Bag!

On the morning of Thursday, June 1st, an updated CAT was revealed to the financial industry. The good news is that the updates are not massive or wholesale, but rather necessary and welcomed. There are three important items about CAT 1.1 that you should know.

Read More...

Categories: Blog, In the News

WannaCry: Stop What You're Doing and Patch Your Computers!

Monday, May 15, 2017

WannaCry: Stop What You're Doing and Patch Your Computers!

WannaCry is the biggest malware event the Internet has ever seen, hands-down. This version of ransomware is the prophetic fulfillment of all those fire-and-brimstone IT folks that have been saying there will be a global malware epidemic. WannaCry is being called a “weapon of mass destruction,” and w...

Read More...

Categories: Blog

Risk's New Normal

Friday, May 12, 2017

Risk's New Normal

Risk Doesn’t Have to be a Four-Letter Word Here's the thing about risk: it doesn't have to be a bad thing. Risk means you're doing something new; something different. There's risk when you jump in a half-ton of metal and rubber and hurtle yourself down the highway at 65 mile...

Read More...

Categories: Blog

{Cyber Byte Video} How to Recognize a Fake Email

Wednesday, April 26, 2017

{Cyber Byte Video} How to Recognize a Fake Email

It only takes one compromise to get information from your organization. ONE person -> ONE moment -> ONE opportunity. Today, are YOU going to be that ONE? Watch and share this video to know what to look for in a suspicious email, what to do if you spot one, and what to do if you realize you cli...

Read More...

Categories: Blog, Videos

Authentication: What is Multi-Factor?

Friday, April 21, 2017

Authentication: What is Multi-Factor?

"Now Yahoo? Guess I have to change my password again." In the current online security climate, it seems like an almost daily occurrence to see a major website notifying users to change their passwords after a security incident. Secure, accurate, and quick authentication is more important than ever.

Read More...

Categories: Blog
Page 29 of 33First   Previous   24  25  26  27  28  [29]  30  31  32  33  Next   Last