Back to the Basics: User Access Management

Ok, so I’m terrible at sports analogies. Forgive me. But with the ever-increasing business risks that come with plugging a computer into a network it often feels as though you’re leading your organization down the gauntlet. I picture American Gladiators circa 1990 with Nitro shooting a tennis ball cannon at us while we try to… Read more »

Back to the Basics: Protecting Mobile Devices

The RAS team recently came up with the idea to go over some general cybersecurity topics at the ten thousand foot level as part of our “Back to the Basics” series. Something that impacts 99.99% of our readers is mobile device security practices, so we wanted to take a moment to talk about why we… Read more »

2000 Years | The Terracotta Army & YHB

2017 was a big year for YHB: we celebrated our 70th anniversary.  Throughout the year we had various events culminating with our Richmond event at the Virginia Museum of Fine Arts (VMFA).  To celebrate our continued success we are helping to sponsor the VMFA’s exhibit: Terracotta Army: Legacy of the First Emperor of China.  We… Read more »

Don’t Forget the WAP

Every year around this time, since it also happens to be close to the day, a memory from high school pops in my head from my 16th birthday. I was a pretty shy kid, so I loathed anything that made me a) the center of attention or b) divulged something about me that was embarrassing…. Read more »

Framing a Framework | Understanding Your IT Environment

IT is complex.  In order to keep the complexity under control it is wise to consider a framework to evaluate and plan your IT environment.  A framework is defined as a basic structure underlying a system, concept, or text.  While generally most frameworks are intended for larger organizations, it can also prove useful in smaller… Read more »

Back to Basics: Password Security

This week I want to take a few minutes to discuss something that generates more groans and eye-rolls than a bad pun. But first I mustache you a question. (See?) What is the primary line of defense against data leaks? The answer: Passwords. Think about passwords like the keys on your key ring.  Would you… Read more »

Banking Regulatory Update 2017 | Part Deux

Last month, the Risk Advisory Services Team attended the Community Banking Technology Forum hosted by the Federal Reserve in Richmond. Bryan and I divided up the conference, so he attended Day 1, and I attended Day 2. He previously talked about the ideas that stuck with him from that forum, and this is my take… Read more »

Equifax | When the bad guys have everything, what do we do next?

We have all become accustomed to hearing about Cybersecurity Breaches but this one may be the Mother of all Breaches.  The latest estimate, released October 2, is that 145.5Million people were impacted by the breach.  So almost half of America has had their Social Security Number compromised. When a credit bureau is breached to this… Read more »

Banking Regulatory Update 2017

Last week the Risk Advisory Services Team attended the Community Banking Technology Forum hosted by the Federal Reserve in Richmond. Nearly all the regulatory agencies in the Fed’s 5th District were represented including the Federal Reserve, FDIC, Office of the Comptroller of the Currency, Virginia Bureau of Financial Institutions, West Virginia Division of Financial Institutions,… Read more »

Knock! Knock! Who’s there…

When I was a kid, one of my favorite books was Bram Stoker’s Dracula; I loved reading about the ways the small band of vampire hunters went about systematically hunting down Dracula’s lairs in London while he was doing his best to find ways to avoid detection while creating new victims. Something that always stuck… Read more »