Security News

Security News2018-05-30T15:32:31+00:00
808, 2019

SPF. DMARC. DKIM. Oh My!

By |August 8th, 2019|Categories: Information Security News|Tags: , , , |

We spend a lot of time making sure we have policies in place to protect our institution from reputational risks associated with technology, and even more time is spent on training, auditing, and compliance to manage those risks. But rarely do we consider what goes on outside of the physical or virtual perimeter of our networks. Consider this: what would you say if I told you that there is [...]

1807, 2019

Securing IoT

By |July 18th, 2019|Categories: Information Security News|Tags: , |

A tongue-in-cheek, but realistic scenario for IoT compromise Your customers are complaining.  And they make a valid point that your Internet banking application is unavailable inside your very own bank branch walls, because you don’t offer free Wi-Fi in your 150-year-old stone building with no cell signal.  Well shucks, that makes a lot of sense, doesn’t it? Now the employees are complaining that they can’t listen to Pandora while [...]

307, 2019

Why Do I Need a Tarp?

By |July 3rd, 2019|Categories: Information Security News|Tags: , |

Full disclosure, I was a Firefighter. And we love water. A few years after getting my Firefighter 1 certification I found myself on a quarter section of blackened earth, with a shovel and a six-foot wall of fire extending a few hundred yards in either direction moving away from me at a rather quick pace thanks to those hot summer Kansas winds. A pond, a loafing shed, and a [...]

304, 2019

Penetration Testing – What kind should you get

By |April 3rd, 2019|Categories: Information Security News|Tags: , , , |

What’s in a Penetration Test? Penetration testing has become a standard requirement for the majority of our clients, and there are myriad factors that go into a successful penetration testing engagement for both the client and the evaluator.  Let’s take a look at what commonly comprises a penetration test, and the related testing actions that are performed. External Penetration Testing This is generally the type of test people think [...]

2102, 2019

The Low-Down on Multi-Factor Authentication

By |February 21st, 2019|Categories: Information Security News|Tags: , , , , |

The Low-Down on Multi-Factor Authentication Multi-Factor Authentication, Strong Authentication, 2FA, MFA, Token-Based, Out-of-Band Authentication; what does it all mean?  Many more people are familiar with these terms than just a few years ago.  But, not all multi-factor authentication (MFA) types are created equal.   MFA solutions are designed to protect their users’ accounts in the event of credential theft.  With more advances in software technology and features, comes more vulnerabilities [...]

1306, 2018

I’ll Tell You What You Need to Know

By |June 13th, 2018|Categories: Information Security News|Tags: , , , |

I’ll Tell You What You Need to Know While walking past the president’s office, he sees and summons you into his office and asks if you can fix the printer on the back wall.  After astutely seeing the printer’s status panel is indicating “Out of paper,” you load paper and voila, it prints.  “Hey, you’re pretty good at this technology stuff.  Our last exam said we had to appoint [...]

Load More Posts

“Very pleased with the engagement and value it adds in helping us recognize and work toward recommendations to improve overall security environment and exam prep. Always easy to work with!

— GS $2.3B FI in Midwest

Keep your institution off the evening news. Contact us today!