Category: Uncategorized

  • Apple iPhone & Fingerprint Scanning – Security Solved?

    Screen Shot 2013-09-12 at 9.03.55 AM
    In case you haven’t heard, Apple finally released some new iPhones. (Apple fanboys rejoice!) One is more for the budget conscious but the other, the iPhone 5S, has the security geeks interested because it includes a new fancy sensor on the Home button that works as a fingerprint scanner. They are calling it Touch ID. Now does this solve the security issues of the iPhone since about half of all iPhone users don’t even put a passcode on their phones? Not hardly. But, it increases the simplification of security (which we’re big fans of) and that will not only make the person more secure but the organization they are employed by more secure, too. In short, it’s a nice evolution to the security of the smartphone but at the end of the day, no security measure is without its flaws.

    (more…)
  • Webinar – IT Security at Quality Management

    IT Webinar imageThe webinar this month features a senior security consultant, Courtney Treadaway, who has been working with IT Security of financial institutions. This webinar shares some ideas and benefits of looking this area of the business as more Quality Management instead of a painful process. Wouldn’t it be much better if IT Security & Audit was recognized for it’s ability to reliably deliver trust to the business and to the customer?

    (more…)
  • Are Smartwatches the Next Target for CyberAttacks?

    The future of cyber security is almost never clear. New devices are popping up all the time, and making informed decisions on device security can be tricky. However, where smartwatches are concerned, the decision might not be so difficult for you and your business.cyber security consulting

    (more…)

  • 3 Ways to Ensure HIPAA Compliance While Building Your Online Brand

    We live in an era of constant communication, and brand awareness demands that health care institutions maintain an active social media presence. At the same time, however, there is increasing emphasis placed on safeguarding personal information, and the regulations governing health data are appropriately restrictive. 

    (more…)
  • The Pains of a Core Selection or Contract Renegotiation

    Financial institutions have a real challenge in either selecting a new Core Software package or negotiating an updated contract in today’s world. There are SO many options with different vendors on the Core side, not to mention the plethora of ancillary products. To add to this challenge, many of the vendors have a large menu of Core products and sometimes are just taking a shot in the dark to put the right product with the right bank, credit union or savings bank.

    (more…)
  • 3 New Tips to Boost Email Security

    Email may be a convenient way to communicate with coworkers and clients, but it isn’t inherently secure. As such, there are security holes in email that you should be aware of and address when applicable to data security. Here are a few advanced email hacks that can help reduce the risk and help keep your information safer in or out of the workplace. Use these three tips to boost your email security.

       (more…)

  • RiskKey Template Spotlight: Vendor Management

    Vendor Management

    Vendor Management. Its been a hot topic over the last couple of years with examiners, and best practices require that this process be done well. It can be a daunting task, and many organizations struggle to do it well. A well-rounded risk assessment process is critical to managing your vendor management program. RiskKey can help! Our vendor management templates are one of the many templated offerings available to the RiskKey community.

    Vendor Management Template
    (more…)