“GDPR” – Another Acronym You Need to Know!

Privacy is important to all of us but to most Europeans it is even more critical.  I was at a conference a while back and the presenter made the comment that European’s trust of companies and governments are colored by the events of WW2 and totalitarian regimes that used personal data to subjugate and terrorize… Read more »

Back to Basics: Protecting the Perimeter

The past several articles in the Back to Basics series have addressed controls inside the network—passwords, user management, and mobile device security. But even the best of these controls are for naught without strength at the perimeter of your network. Today we consider ways to minimize cybersecurity risk to your organization’s system from the outside… Read more »

SEC Guidance on Cybersecurity

On Wednesday, the SEC issued new guidance for public companies on the disclosure of information about a cybersecurity incident or risk. The previous guidance was issued in October 2011 and a lot has changed since then.  The new guidance is not clear on some of the expectations about timing of informing the public or the… Read more »

Back to the Basics: User Access Management

Ok, so I’m terrible at sports analogies. Forgive me. But with the ever-increasing business risks that come with plugging a computer into a network it often feels as though you’re leading your organization down the gauntlet. I picture American Gladiators circa 1990 with Nitro shooting a tennis ball cannon at us while we try to… Read more »

Back to the Basics: Protecting Mobile Devices

The RAS team recently came up with the idea to go over some general cybersecurity topics at the ten thousand foot level as part of our “Back to the Basics” series. Something that impacts 99.99% of our readers is mobile device security practices, so we wanted to take a moment to talk about why we… Read more »

2000 Years | The Terracotta Army & YHB

2017 was a big year for YHB: we celebrated our 70th anniversary.  Throughout the year we had various events culminating with our Richmond event at the Virginia Museum of Fine Arts (VMFA).  To celebrate our continued success we are helping to sponsor the VMFA’s exhibit: Terracotta Army: Legacy of the First Emperor of China.  We… Read more »

Don’t Forget the WAP

Every year around this time, since it also happens to be close to the day, a memory from high school pops in my head from my 16th birthday. I was a pretty shy kid, so I loathed anything that made me a) the center of attention or b) divulged something about me that was embarrassing…. Read more »

Framing a Framework | Understanding Your IT Environment

IT is complex.  In order to keep the complexity under control it is wise to consider a framework to evaluate and plan your IT environment.  A framework is defined as a basic structure underlying a system, concept, or text.  While generally most frameworks are intended for larger organizations, it can also prove useful in smaller… Read more »

Back to Basics: Password Security

This week I want to take a few minutes to discuss something that generates more groans and eye-rolls than a bad pun. But first I mustache you a question. (See?) What is the primary line of defense against data leaks? The answer: Passwords. Think about passwords like the keys on your key ring.  Would you… Read more »

Banking Regulatory Update 2017 | Part Deux

Last month, the Risk Advisory Services Team attended the Community Banking Technology Forum hosted by the Federal Reserve in Richmond. Bryan and I divided up the conference, so he attended Day 1, and I attended Day 2. He previously talked about the ideas that stuck with him from that forum, and this is my take… Read more »