Security News

Security News2018-05-30T15:32:31+00:00
2812, 2017

5 Top Laptop Security Tips

By |December 28th, 2017|Categories: Information Security News|

Today's mobile workforce has generated the awareness and subsequent need for mobile security like never before. As data growth increases, the requirements set forth in new laws and regulations also demand that organizations demonstrate due-care in protecting sensitive customer data. Meanwhile, the ever-increasing amount of sensitive data continues to find its way onto laptops and adds additional threats to these devices. Because of these threats, organizations should follow a [...]

1210, 2016

Penetration Test and the Vulnerability Assessment

By |October 12th, 2016|Categories: Information Security News|

Penetration Test vs the Vulnerability Assessment Some say Potato, some say Patato. The term "Penetration Test" has been thrown around a lot in the Information Security industry. Some vendors and institutions use the term Penetration Test interchangeably with "Vulnerability Scan" (or Assessment), when in fact, the two define very different scopes, methodologies, and deliverables. The recently updated FFIEC Information Security Booklet discusses these types of tests and offers definitions [...]

1210, 2016

Cyber Security Baselines and Anomaly Detection

By |October 12th, 2016|Categories: Information Security News|

Baselining and anomaly detection are security concepts that have been around for quite a while, however, recently both have received renewed interest. This new attention stems from increased regulatory focus on incident response and that in today's cybersecurity world it's no longer a question of "if" but "when." Cyber-attacks have evolved to the point where they can pass through technical defenses, blend into an environment and remain undetected as long [...]

709, 2016

Incident Response Plan

By |September 7th, 2016|Categories: Information Security News|

Responding to Robberies Your Incident Response Plan for Cyber Robberies Ask anyone outside of the banking industry "What do banks have in place for responding to robberies?" and you will likely get a response referring to silent alarms, surveillance video, guards, tracking systems and/or exploding dye packets. It's assumed, and obvious, that banks have robbery prevention and response plans. Now consider this: in 2010 the average bank robbery netted [...]

108, 2016

The Patch is Only the Beginning

By |August 1st, 2016|Categories: Information Security News|

The Patch Sometimes it is only the beginning. Not all patches work out of the gate. Anyone who has been responsible for patch management knows that it is a never ending cycle of download, test, patch and repeat. What is often overlooked, unfortunately, is that sometimes, even when a patch is applied, the vulnerability it is supposed to fix isn't always fixed…not right away at least. Over the past [...]

1207, 2016

Recommended Audit Policy Settings

By |July 12th, 2016|Categories: Information Security News|

Recommended Audit Policy Settings The following recommended settings are based on Microsoft and industry best practices. Note that these settings are basic, and more advanced audit configuration settings exist beginning with Windows 7 and Windows Server 2008 R2. See "Advanced Security Audit Policy Step-by-Step Guide" for more information. Audit Policies Audit policies can be set using the Group Policy Manager, where you can find them at: Computer Configuration\Policies\Windows Settings\Security Settings\Local [...]

Load More Posts

“Very impressed with the service. David was very knowledgeable and professional.”

— SN $700M FI in Southwest

Keep your institution off the evening news. Contact us today!

Contact Us Now