Infosec and Financial Institutions: New York's Proposed Legislation
by Geoff Yeagley on September 27, 2016 at 1:30 PM
Financial Institutions are critical to the foundation of the economy of this country. If you think about it, financial institutions across the country house the wealth of this country and are always under attack. From true brute force hacking to phishing emails, bad actors are relentl …
Ransomware Update: The FBI is Coming, The FBI is Coming...
by Geoff Yeagley on September 20, 2016 at 1:30 PM
Q: Why was the Computer so tired when it got home? A: Because it had a hard drive While the joke above is pretty funny (at least I thought it was), Ransomware is no joke. I have written several blog posts about Ransomware over the past 9 months and the dangers that these types of atta …
Critical Security Control 19: The Incident Response Plan
by Geoff Yeagley on May 17, 2016 at 12:16 PM
In the world of Information Security, we have all heard of the Center for Internet Security Top 20 Critical Security Controls (CSC's) which is formerly known as the SANS Top 20. This is a list of the 20 IT Security Controls that an organization can implement to strengthen their IT Sec …
Ransomware Alert: Big Business and the Evolution of Phising
by Geoff Yeagley on May 3, 2016 at 1:20 PM
Ransomware is certainly nothing new as it has been around for several years, however, it sure is gaining quite a bit of attention these days. In fact, Ransomware is gaining so much attention that on Friday, the FBI released an article discussing the fact that ransomware is on the rise …
How Phishing Emails Can Cost You $40,000
by Geoff Yeagley on March 22, 2016 at 10:00 AM
To me, math is what makes the world work. If you think about it, just about everything involves math, especially when it comes to business. When I was going through my MBA program, I really underestimated the amount of math and calculations that you needed to perform for essentially e …
SSAE 16 SOC 2 Reports: What Are They?
by Geoff Yeagley on February 18, 2016 at 12:28 PM
The SSAE 16 process, on the surface, sounds confusing. Most of this has to do with the terminology that is used, particularly the similarity of the terms used. In this blog post we are going to cover what the SSAE 16 is, what the different SOC Reports, what are the different types of …