Security News

Security News2018-05-30T15:32:31+00:00
304, 2019

Penetration Testing – What kind should you get

By |April 3rd, 2019|Categories: Information Security News|Tags: , , , |

What’s in a Penetration Test? Penetration testing has become a standard requirement for the majority of our clients, and there are myriad factors that go into a successful penetration testing engagement for both the client and the evaluator.  Let’s take a look at what commonly comprises a penetration test, and the related testing actions that are performed. External Penetration Testing This is generally the type of test people think [...]

2102, 2019

The Low-Down on Multi-Factor Authentication

By |February 21st, 2019|Categories: Information Security News|Tags: , , , , |

The Low-Down on Multi-Factor Authentication Multi-Factor Authentication, Strong Authentication, 2FA, MFA, Token-Based, Out-of-Band Authentication; what does it all mean?  Many more people are familiar with these terms than just a few years ago.  But, not all multi-factor authentication (MFA) types are created equal.   MFA solutions are designed to protect their users’ accounts in the event of credential theft.  With more advances in software technology and features, comes more vulnerabilities [...]

1306, 2018

I’ll Tell You What You Need to Know

By |June 13th, 2018|Categories: Information Security News|Tags: , , , |

I’ll Tell You What You Need to Know While walking past the president’s office, he sees and summons you into his office and asks if you can fix the printer on the back wall.  After astutely seeing the printer’s status panel is indicating “Out of paper,” you load paper and voila, it prints.  “Hey, you’re pretty good at this technology stuff.  Our last exam said we had to appoint [...]

3105, 2018

Windows Update Management Tips

By |May 31st, 2018|Categories: Information Security News|

Windows Update Management Tips Windows Updates…  Believe it or not, they’ve been around since the days of Windows 98.  They are often despised by end users and IT support staff because they may interrupt the workday, delay leaving at the end of the day, or they may break functionality.  Along the way, Microsoft has improved the deployment and installation process with functions such as Windows Server Update Services (WSUS). [...]

2305, 2018


By |May 23rd, 2018|Categories: Information Security News|Tags: , , , |

Virtual Private Networks: Should you be using one? A VPN, or Virtual Private Network, allows you to create an encrypted connection to another network over the Internet.  Most users are familiar with them for connecting back to their institution’s network for remote access.  While this is one reason to use a VPN, it’s far from the only reason to use one.  In today’s environments, eaves-dropping, public Wi-Fi, and location [...]

1005, 2018

GDPR is coming… but what does it mean, and why should I care?

By |May 10th, 2018|Categories: Information Security News|Tags: , , , |

GDPR is coming… but what does it mean, and why should I care? If your organization hasn’t heard these four letters by now, it may not be time to panic - but it is time to learn what they mean and if they could impact organization.  Below is a brief overview intended to get you familiar with this new international regulation and hopefully answer some of the basic questions. [...]

Load More Posts

“Sales was extremely helpful throughout the entire process. The report was detailed and easy to understand! We will recommend 10-D to others.”

— MT $500M FI in Northeast

Keep your institution off the evening news. Contact us today!