How Breach Assessment Services Help Financial Institutions

How likely is it that your financial institution will experience a data breach in the near future? Can you even be certain that you haven’t already experienced a data breach? Most importantly, do you know how you would respond if you discovered that a breach had occurred? A breach assessment can help you answer these questions. What you discover

ADA Website Compliance

As many of you have seen there are numerous companies, including community banks, receiving demand letters claiming the company's website is violating ADA (Americans with Disabilities Act) compliance. We wanted to help simplify it and give folks a plan of action. 
ADA Compliance for websites helps the visually impaired "read" your website

Common Misconceptions About SOC Reporting

Service organization reports (SOC) are vital to businesses. These internal reports let organizations know about the risks associated with outsourced services. They help to establish regulatory compliance and are an extremely important part of any cybersecurity audit. Organizations use SOC reporting to reveal vulnerabilities in their current

4 Things to Watch For When Running an In-House Penetration Test

Businesses that keep sensitive data on their computer networks need penetration tests to make sure hackers do not have access to the information. Testing often starts with a vulnerability assessment, which is an exercise that evaluates the network's security and creates a list of potential security flaws. By scanning the network, you can often

5 Frequent Mistakes Made in Vendor Contract Negotiations

Negotiating vendor contracts is never easy. You need strong relationships with your vendors to grow and expand your business, but rushing to sign on with companies may lead to higher risk deals. Your short-term needs may get met, but you suffer over the long-term from it. If you do not have the technology and relationship to scale effectively and

5 Powerful Reasons to Test Your Cybersecurity Today

It's natural for an organization to plan for success. However, that success could all be for nothing if you don't also plan for worst-case scenarios, especially breaches to your information technology systems. Continuity of operations and disaster recovery plans are essential for taking proactive action against the very real threats to data

4 Ways Banks Prevent Security Disasters

In September, Yahoo became the latest company to admit it had a serious data breach. A suspected state-sponsored hacker had compromised the user data, which included security question answers, passwords, phone numbers and birth dates, of 500 million accounts. Many Yahoo users also trusted the company with their bank account and credit card

Vulnerability Assessments vs. Penetration Testing: What's the Difference?

If you don't know much about the world of cybersecurity, some of the terms professionals use may seem a bit opaque. Many people don't know what vulnerability assessments or penetration tests are, and they may conflate them. A vulnerability assessment is a scan of your network that detects security vulnerabilities, while a penetration test

Cyber Security New: White House Names their First Cyber Security Chief

If you blinked, you might have missed it. Nestled back in September's headlines, there was a little news item that indicates how much the world has changed. In the face of new cyber threats, the U.S. government took an important first step toward getting hacking under control: they announced that Gregory Touhill, a retired Air Force

3 Tips to Ensure Your Financial Institution Meets New Accounting Standards

In June 2016, the Financial Accounting Standards Board (FASB) issued an Accounting Standards Update designed to give investors and other financial statement users more timely information about credit losses on loans.

Under the Accounting Standards Update (ASU), all banks and financial institutions that issue loans or lines of credit must now