information security

Home/Tag: information security

2020 Security & Compliance Check List – WST

2020-01-09T19:56:17+00:00

January 9, 2020 2020 Security & Compliance Check List - WST Yep, another year has flown by and a new decade is here. Now is a great time to take a close look at your 2020 schedule to make sure the critical elements of your information security & compliance programs are mapped out. Items you may want to schedule: Policy Review, Updates & Approval (Annually) IT Risk Assessment Update FFIEC Cybersecurity Self-Assessment Tool IT Security Report to the Board (GLBA) Program Training & Testing: End user training; Tabletop exercises; Walk-through exercises; and Partial or full tests of [...]

2020 Security & Compliance Check List – WST2020-01-09T19:56:17+00:00

The Low-Down on Multi-Factor Authentication

2019-02-22T21:57:57+00:00

The Low-Down on Multi-Factor Authentication Multi-Factor Authentication, Strong Authentication, 2FA, MFA, Token-Based, Out-of-Band Authentication; what does it all mean?  Many more people are familiar with these terms than just a few years ago.  But, not all multi-factor authentication (MFA) types are created equal.   MFA solutions are designed to protect their users’ accounts in the event of credential theft.  With more advances in software technology and features, comes more vulnerabilities and potential ways for attackers to gain your password.  However, just how effective are the various MFA types?  Many MFA solutions have recently flooded the market, and that raises the question: [...]

The Low-Down on Multi-Factor Authentication2019-02-22T21:57:57+00:00

I’ll Tell You What You Need to Know

2019-02-22T18:10:39+00:00

I’ll Tell You What You Need to Know While walking past the president’s office, he sees and summons you into his office and asks if you can fix the printer on the back wall.  After astutely seeing the printer’s status panel is indicating “Out of paper,” you load paper and voila, it prints.  “Hey, you’re pretty good at this technology stuff.  Our last exam said we had to appoint an Information Security Officer that isn’t part of the IT Department.  That will be you.”  The president gets the Board of Directors to formalize the role and title, and before you [...]

I’ll Tell You What You Need to Know2019-02-22T18:10:39+00:00

VPN

2019-02-22T18:17:31+00:00

Virtual Private Networks: Should you be using one? A VPN, or Virtual Private Network, allows you to create an encrypted connection to another network over the Internet.  Most users are familiar with them for connecting back to their institution’s network for remote access.  While this is one reason to use a VPN, it’s far from the only reason to use one.  In today’s environments, eaves-dropping, public Wi-Fi, and location tracking (just to name a few) pose significant issues that often result in unwanted privacy invasions or data theft. One method of helping to prevent this is using a VPN.  In [...]

VPN2019-02-22T18:17:31+00:00