IT Expert Blog
Infosecurity and Cybersecurity Differences
Is there a difference between Information Security Management and Cybersecurity Management? Short answer, YES. If your role is in information security, your main concern would be in protecting your company’s data from unauthorized access – of any kind. Electronic and physical (think file cabinets, trash containers, shred-it boxes, desk drawers, etc.) If your role is…
Apache Vulnerability
As I am sure most of you are aware Apache released information in December concerning a vulnerability in their Log4j module. Apache’s Log4j (log for java) software library affects versions 2.0-beta9 to 2.14.1, known as “Log4Shell.” Resolution of the issue requires patching to the current version, 2.17.1 (Java 8), 2.12.4 (Java 7) or 2.3.2 (Java…
8 Cybersecurity Tips for the Holidays
It is a wonderful and joyful time of the year, but unfortunately, it’s also a busy time for cybercriminals to take advantage of you. The National Retail Federation (and IP Services!) would remind you of these simple precautions: Keep a clean machine – make sure whatever device you use for online shopping has the latest…
Ransomware Threat to the Banking Industry
According to a recent article in the Institutional Asset Manager Newsletter, the financial sector was one of the most targeted by cybercriminals in 2020 during the Covid-19 pandemic at a time when rapid shifts in working practices left organizations vulnerable. In the first emergency phase of the pandemic in Q2 2020, ransomware attacks on financial organizations…
Shadow IT
Shadow IT while always problematic for IT Departments has recently resurfaced as a real and present threat and risk to an organization and in particular, has become a focal area during FDIC examinations. So, what does Shadow IT mean? Shadow IT (a.k.a., “unauthorized technology,” “unauthorized assets,” “unauthorized devices,” etc.) has created quite a name…
Assessing Updates and Preventing Security Breaches
ProblemThe year 2020 held many societal challenges for us to navigate. And as if that wasn’t enough, the year closed out with the announcement of a significant cybersecurity exploit using a widely accepted security software, SolarWinds. PracticeIP Services utilizes many widely adopted best in class enterprise tool sets as a part of our best practices…
Is your Cybersecurity posture ready for remote workers?
Shifting operations to a work from home (WFH) model introduces new cybersecurity considerations to your company/organization. Use this checklist to get ahead—and stay ahead—of new risks. Instigate a cybersecurity health checkup during and after the shift to WFH. Review all cybersecurity controls to identify gaps, prioritize, and remediate accordingly. Update your Technology & Data Use…
Five Cybersecurity Predictions for 2020 that Credit Unions Should Care About!
#1 Privileged Access will become critical to securing the Internet of Things (IoT)! We tend to hype certain things when they are new and interesting. Take, for example, the Internet of Things. It’s nothing new and has been around ever since computers became connected with all things and its ability to create security risk is…
The Criticality of IT Risks
IT Risks should always be taken seriously, there has been a significant amount of information and attention around this topic the last several years. IT Risks have become pervasive and have crossed the boundaries between various industries. The sudden onslaught of IT Risks has become a problem for not only IT people in the organization…
FREE REPORT
Cybersecurity Protection Strategies, Engaging VisibleOps
In a world where cybersecurity threats are increasingly complex, organizations must adopt robust practices to secure their IT operations.
“The VisibleOps Handbook” series produced by IP Services, in partnership with the IT Process Institute, provides a framework to address these challenges, focusing on creating transparent and auditable IT processes.
Learn more about these risks in IP Service's Free Report: "Cyber Attack Primer".