Data Flow Diagrams – Mapping Your Way To Better Security

Today’s business landscape is fast paced, and ever-changing. If you are always reactive instead of proactive, generally, you are losing. Despite this, there is one fact that never changes: threat-actors are always looking for a way in. For hundreds of years protecting your business was about physical security, and while still vital, the evolution of… Read more »

SOC for Cybersecurity Q&A

“You cannot endow even the best machine with initiative; the jolliest steamroller will not plant flowers.” Walter Lippmann In 2017 the AICPA announced a new attestation engagement called SOC for Cybersecurity. DeTech wrote about the technical aspects of the engagement soon after its announcement (see that article here). We have since completed the AICPA’s coursework… Read more »

The Deep vs. The Dark Web

When the topic of the deep or dark web comes up, it is hard not to picture Hollywood’s ‘The Matrix.’  In fact, I specifically picture the scene where Morpheus offers Neo his choice of either the blue pill, giving him a path back to his everyday life, or the red pill, and an opportunity to… Read more »

The Passing of Time: 2018 Recap

“The long unmeasured pulse of time moves everything. There is nothing hidden that it cannot bring to light, nothing once known that may not become unknown. Nothing is impossible.” – Sophocles Here we are at the end of another year… Time to put 2018 to bed and to begin afresh in 2019. Many of us will… Read more »

Why Is Vendor Management Important?

In today’s business environment, most companies use some sort of outsourced service provider. You may only use a company to print statements; you may have your core application outsourced; or you may have all your servers in the cloud. Whether it is small services or big, you probably have data living somewhere outside your buildings…. Read more »

ISACA | State of Cybersecurity Survey

ISACA recently released results from the annual global State of Cybersecurity Survey conducted last October.  A total of 2,366 individuals with a Certified Information Security Manager (CISM) and/or Cybersecurity Nexus Practitioner (CSX Practitioner) participated in the 2017 survey.  The results were not earth shattering but some were of interest. From a threat landscape perspective, the… Read more »

YHB Welcomes Bryan Newlin as Partner

Winchester, VA (June 5, 2018) — The shareholders of Yount, Hyde and Barbour, P.C. (YHB) have voted to admit Bryan Newlin as principal into the Firm effective June 1, 2018. “We are proud to welcome Bryan as a partner of YHB,” said Scott Moulden, Managing Partner. “Bryan has been a key player in growing the… Read more »

Succession Planning – Take Control of Your Destiny

Why do I need to do succession planning? Ask yourself the following questions: How would the business continue if something happened to me? Would there be an orderly transition of the business? Would our client/customer needs continue to be met in a timely fashion? How would the business be liquidated?   When evaluating the first… Read more »

Regulatory Update: What to Expect from your Examiners in 2018

For the third year running, I have had the opportunity to participate in the Virginia Bankers Association’s Operations & Technology Conference, this year as part of the consolidated VBA Protect Conference, on the “What to Expect from your Regulators” panel. It’s always fun and interesting to forecast hot-button topics but as with any forward looking… Read more »