How to Protect Yourself from Identity Theft Tax Refund Fraud

Identity Theft Tax Refund Fraud Tax season is officially upon us. It’s time to gather your W-2s, crunch numbers and mail your annual income taxes to Uncle Sam. It’s also time to learn about the number one fraud of the season: identity theft tax refund fraud. Understanding how cyber criminals pull it off and what the consequences are for victims can help protect yourself. Identity theft tax refund fraud occurs when someone uses another person’s [...]

By | January 19th, 2016
Security Awareness|Comments Off on How to Protect Yourself from Identity Theft Tax Refund Fraud

What’s a Security Awareness Program and why do I need one?

What’s this Security Awareness Program you speak of? In case you didn’t know, a security awareness program is a crucial piece of the newest multi-factor authentication (MFA) guidance that was put in place January of 2012. So if you’re a financial institution looking for a good example of why you should have a security awareness program, or you’re just trying to figure out what people are talking about pertaining security awareness, this is where you’re [...]

By | June 20th, 2013
Compliance & Business Continuity, Industry InSights|Comments Off on What’s a Security Awareness Program and why do I need one?

Five Steps to Take When Your Twitter Account Has Been Hacked

If your Twitter account is sending tweets and/or direct messages that you haven't actually sent, your Twitter account has been hacked. Some of the messages may look like this: Hey someone is spreading nasty rumors about you: <link added> LOL! I’m laughing so hard at this pic of you:  <link added> Did you see this funny tweet about you? <link added> Watches on Sale! $99 <link added> Lose weight fast! <link added> If your Twitter [...]

By | November 20th, 2012
IT Infrastructure, Social Media|Comments Off on Five Steps to Take When Your Twitter Account Has Been Hacked

Malware, Viruses, Trojans, OH MY!

Malware. What is it and why should I care? Two years ago, there were nearly 3 million unique forms of malicious code, and thousands of new ones are discovered daily. The risk of being infected is greater than ever because every single possible data communication method can be used to transmit malware. And we know this is true because we so often see it in the news. But what exactly is malware? Malware = MALicious [...]

By | August 10th, 2012
IT Infrastructure|Comments Off on Malware, Viruses, Trojans, OH MY!

Holiday Shopping Security Tips

By | December 6th, 2011
Industry InSights, Network Security & Solutions|Comments Off on Holiday Shopping Security Tips

Threat Morphosis: Two Decades of Malware

By | November 14th, 2011
Industry InSights, Network Security & Solutions|Comments Off on Threat Morphosis: Two Decades of Malware

Embracing Social Media in the Workplace: Risk or Reward?

Social networking is more than just websites like Facebook, Twitter and Google+ -- it’s also the devices and users that access these sites. Today’s digitally-aware generation of employees are bringing their smart phones and tablets right into the workplace. Not because this digitally-native generation prefers texting to phone calls, and status updates over emails. Mobile technology is not a convenience for them - it’s how they live, and increasingly, how they work. Some organizations view [...]

By | October 25th, 2011
Industry InSights, Network Security & Solutions|Comments Off on Embracing Social Media in the Workplace: Risk or Reward?

Tips for Securing Mobile Devices in the Enterprise

As smartphone and tablet sales continue to increase, more employees are bringing their personal mobile devices into the corporate environment. Allowing these devices to connect to your network enterprise without any guidelines can pose a serious risk. Securing mobile devices is one of the biggest challenges facing IT security professionals as cyber criminals turn their attention to this platform. Research firm IDC says global spending on mobile security is on track to balloon to $1.9 [...]

By | October 17th, 2011
Industry InSights, IT Infrastructure, Network Security & Solutions|Comments Off on Tips for Securing Mobile Devices in the Enterprise

Bank Companion and InfoSight Enter into Strategic Alliance for the Financial Industry

Partnership Will Focus on Offering Mobile Banking and Mobile Marketing Solutions to Financial Institutions Bank Companion, a leading provider of mobile banking software to banks, community banks and credit unions around the world today announced its partnership with Infosight, Inc. a leading provider of IT infrastructure, security and compliance solutions for financial institutions. Research shows that an increasing number of financial institutions have made mobile banking as one of their top priorities. An Accenture Survey [...]

By | October 12th, 2011
Industry InSights, IT Infrastructure, Network Security & Solutions|Comments Off on Bank Companion and InfoSight Enter into Strategic Alliance for the Financial Industry

How Hackers Target Your Twitter Account

Can you guess how many of the top 10 Twitter users have been hacked? Or what the most common password was before Twitter had to ban it for security reasons? There’s a lot to learn from this infographic from MediaBistro, especially if you’re good at learning from others’ mistakes

By | September 27th, 2011
Industry InSights|Comments Off on How Hackers Target Your Twitter Account