The Passing of Time: 2018 Recap

“The long unmeasured pulse of time moves everything. There is nothing hidden that it cannot bring to light, nothing once known that may not become unknown. Nothing is impossible.” – Sophocles Here we are at the end of another year… Time to put 2018 to bed and to begin afresh in 2019. Many of us will… Read more »

Why Is Vendor Management Important?

In today’s business environment, most companies use some sort of outsourced service provider. You may only use a company to print statements; you may have your core application outsourced; or you may have all your servers in the cloud. Whether it is small services or big, you probably have data living somewhere outside your buildings…. Read more »

ISACA | State of Cybersecurity Survey

ISACA recently released results from the annual global State of Cybersecurity Survey conducted last October.  A total of 2,366 individuals with a Certified Information Security Manager (CISM) and/or Cybersecurity Nexus Practitioner (CSX Practitioner) participated in the 2017 survey.  The results were not earth shattering but some were of interest. From a threat landscape perspective, the… Read more »

YHB Welcomes Bryan Newlin as Partner

Winchester, VA (June 5, 2018) — The shareholders of Yount, Hyde and Barbour, P.C. (YHB) have voted to admit Bryan Newlin as principal into the Firm effective June 1, 2018. “We are proud to welcome Bryan as a partner of YHB,” said Scott Moulden, Managing Partner. “Bryan has been a key player in growing the… Read more »

Succession Planning – Take Control of Your Destiny

Why do I need to do succession planning? Ask yourself the following questions: How would the business continue if something happened to me? Would there be an orderly transition of the business? Would our client/customer needs continue to be met in a timely fashion? How would the business be liquidated?   When evaluating the first… Read more »

Regulatory Update: What to Expect from your Examiners in 2018

For the third year running, I have had the opportunity to participate in the Virginia Bankers Association’s Operations & Technology Conference, this year as part of the consolidated VBA Protect Conference, on the “What to Expect from your Regulators” panel. It’s always fun and interesting to forecast hot-button topics but as with any forward looking… Read more »

More Stories About Russians

The news media seems obsessed with Russians.  Whether it is their involvement in the election, relationship with Donald Trump, or assassinating ex-spies, there doesn’t seem to be a day without some scandal involving the Russians.  On April 16th the United States Computer Emergency Readiness Team (US-CERT), a part of the Department of Homeland Security, released… Read more »

Lasting Impacts

Forty-eight years ago today (April 10, 1970), Paul McCartney announced the official breakup of the Beatles. It’s true that relations had been declining for some time, but Sir Paul’s announcement was the first public acknowledgement that the end had arrived. The reverberations of their music continues to ring through popular music even today. And although… Read more »

Back to Basics: Protecting the Perimeter

The past several articles in the Back to Basics series have addressed controls inside the network—passwords, user management, and mobile device security. But even the best of these controls are for naught without strength at the perimeter of your network. Today we consider ways to minimize cybersecurity risk to your organization’s system from the outside… Read more »