/Mike Smith

About Mike Smith

This author has not yet filled in any details.
So far Mike Smith has created 5 blog entries.

Email Security – WST


August 8, 2019 Email Security - WST People tend to think of email security as a surface level process like not sending customer data in a message body or accepting Wires via email without secondary verification.  And yes, those are common-sense things, but email security is a much deeper process.  The technology behind email security is vast and includes proper configuration of email servers or services, email security appliances, and secured email encryption to automate the security process and take the control out of the hands of the weakest link.  Us. This week’s blog post focuses on [...]

Email Security – WST2019-08-22T17:31:09+00:00



We spend a lot of time making sure we have policies in place to protect our institution from reputational risks associated with technology, and even more time is spent on training, auditing, and compliance to manage those risks. But rarely do we consider what goes on outside of the physical or virtual perimeter of our networks. Consider this: what would you say if I told you that there is a 79.7% likelihood that a third party is either actively sending email as if it came from your domain without your knowledge, or has in the past? Don’t get all bristly; [...]

SPF. DMARC. DKIM. Oh My!2019-08-08T15:26:56+00:00

Securing IoT-WST


July 18, 2019 Securing IoT - WST Right now, today, Internet of Things (IoT) devices are generally a security issue.  Unless you plan to ban every mobile device, Dot, Echo, Google Home, Siri, Bixby, and Alexa from earshot of all your spoken business, it is possible these services are capturing this information.  Although not subject to unwanted eves-dropping, even IoT enabled hair straighteners – yes you read that right – are subject to malicious attack, to the point that a hacker can burn down your house. These days we hear about functionality being implemented to allow the [...]

Securing IoT-WST2019-08-22T17:31:26+00:00

Securing IoT


A tongue-in-cheek, but realistic scenario for IoT compromise Your customers are complaining.  And they make a valid point that your Internet banking application is unavailable inside your very own bank branch walls, because you don’t offer free Wi-Fi in your 150-year-old stone building with no cell signal.  Well shucks, that makes a lot of sense, doesn’t it? Now the employees are complaining that they can’t listen to Pandora while churning out millions of dollars in mortgage documentation all day long.  That seems fair, after all employee happiness and retention – especially a concern for younger generations – should be at [...]

Securing IoT2019-07-18T15:18:45+00:00

Why Do I Need a Tarp?


Full disclosure, I was a Firefighter. And we love water. A few years after getting my Firefighter 1 certification I found myself on a quarter section of blackened earth, with a shovel and a six-foot wall of fire extending a few hundred yards in either direction moving away from me at a rather quick pace thanks to those hot summer Kansas winds. A pond, a loafing shed, and a pump house lay beyond. As we tried to improve the chances of survival for the shed and the pump house, there were two things running through my mind as we tried [...]

Why Do I Need a Tarp?2019-07-18T14:14:56+00:00