Shadow IT

Shadow IT while always problematic for IT Departments has recently resurfaced as a real and present threat and risk to an organization and in particular, has become a focal area during FDIC examinations.     So, what does Shadow IT mean? Shadow IT (a.k.a., “unauthorized technology,” “unauthorized assets,” “unauthorized devices,” etc.) has created quite a name…

Read More

Is your Cybersecurity posture ready for remote workers?

WFA Cybersecurity

Shifting operations to a work from home (WFH) model introduces new cybersecurity considerations to your company/organization. Use this checklist to get ahead—and stay ahead—of new risks. Instigate a cybersecurity health checkup during and after the shift to WFH. Review all cybersecurity controls to identify gaps, prioritize, and remediate accordingly. Update your Technology & Data Use…

Read More

Five Cybersecurity Predictions for 2020 that Credit Unions Should Care About!

#1 Privileged Access will become critical to securing the Internet of Things (IoT)! We tend to hype certain things when they are new and interesting. Take, for example, the Internet of Things. It’s nothing new and has been around ever since computers became connected with all things and its ability to create security risk is…

Read More

The Criticality of IT Risks

IT Risks should always be taken seriously, there has been a significant amount of information and attention around this topic the last several years.   IT Risks have become pervasive and have crossed the boundaries between various industries. The sudden onslaught of IT Risks has become a problem for not only IT people in the organization…

Read More