Social Engineering Techniques and How Yahoo Put Us All At Risk
by Geoff Yeagley on December 15, 2016 at 1:49 PM
I read this article the other day that one of my colleagues passed on to me that said 91% of all cyber-attacks begin with a phishing email. That is an incredible number and one that should grab your attention and the attention of your Sr. Leadership team. As you dig further into the s …
Vendor Management Requirements for Financial Institutions in New York
by Geoff Yeagley on December 12, 2016 at 9:29 AM
I recently wrote a blog post that discussed legislation in the State of New York that is set to take effect on January 1, 2017. This legislation will effect all financial institutions in the state around Cybersecurity and the development of a formal Cybersecurity program. Click here t …
5 Quick Tips To Help With Information Security
by Geoff Yeagley on November 29, 2016 at 1:30 PM
Information Security is a moving target. Once you "think" that you have it figured out, boom, here comes another new threat to knock you back on your heels and question just how strong your Information Security program is. That's the bad news. The good news is that we are going to giv …
How to Secure WiFi in 5 Simple Steps
by Kyle Daun on November 21, 2016 at 10:15 AM
The recent reports of rising cyber-attacks throughout the world have many businesses and people investigating ways that they can improve the cybersecurity of their work and home environments. Since the inception of the 802.11 protocols nearly 20 years ago, WiFi has become more prevale …
Why You Need A PCI ROC
by Geoff Yeagley on November 9, 2016 at 10:00 AM
In one of our first blog posts, we talked about "What is a PCI ROC?". This post covered the basics of a PCI Report on Compliance, discussed which merchants and service providers take part in the PCI ROC process, and how a ROC differs from a Risk Assessment. Today, I want to share some …
The Importance of IT Policies and Procedures
by Geoff Yeagley on October 17, 2016 at 12:00 PM
We talk all the time and hear in the news all the time about recent attacks that take place. Whether it is stolen credit card data or the latest strain of Ransomware that hits the market, most of the news that we hear has to do with bad actors stealing information from the outside.