The Need For Accuracy | The Basis of Auditing

2018 is flying by and it won’t be long before the end of the year! But before that fresh, new start in 2019 comes the audit season. That time of year when your friendly auditors show up to interrupt your already busy day! As an auditor, I get it… it is stressful and burdensome but we try to… Read more »

What is missing? | Disaster Recovery Planning

With all of the focus on Cybersecurity in IT these days I think it is important to not forget about your disaster planning.  A cyber-event can definitely be considered a disaster and sometimes your Disaster Recovery Plan (DRP) could save you from a cyber-event but I want to talk about a basic element of a… Read more »

ISACA | State of Cybersecurity Survey

ISACA recently released results from the annual global State of Cybersecurity Survey conducted last October.  A total of 2,366 individuals with a Certified Information Security Manager (CISM) and/or Cybersecurity Nexus Practitioner (CSX Practitioner) participated in the 2017 survey.  The results were not earth shattering but some were of interest. From a threat landscape perspective, the… Read more »

2018 Verizon DBIR Highlights

In April, the cybersecurity world hotly anticipates the arrival of the Verizon’s annual Data Breach Investigation report. The deTECH team always takes some time to investigate the investigation and provide a digest of some interesting takeaways. If you would like to read it for yourself, you can go here. Or if you want to drill… Read more »

YHB Welcomes Bryan Newlin as Partner

Winchester, VA (June 5, 2018) — The shareholders of Yount, Hyde and Barbour, P.C. (YHB) have voted to admit Bryan Newlin as principal into the Firm effective June 1, 2018. “We are proud to welcome Bryan as a partner of YHB,” said Scott Moulden, Managing Partner. “Bryan has been a key player in growing the… Read more »

Regulatory Update: What to Expect from your Examiners in 2018

For the third year running, I have had the opportunity to participate in the Virginia Bankers Association’s Operations & Technology Conference, this year as part of the consolidated VBA Protect Conference, on the “What to Expect from your Regulators” panel. It’s always fun and interesting to forecast hot-button topics but as with any forward looking… Read more »

More Stories About Russians

The news media seems obsessed with Russians.  Whether it is their involvement in the election, relationship with Donald Trump, or assassinating ex-spies, there doesn’t seem to be a day without some scandal involving the Russians.  On April 16th the United States Computer Emergency Readiness Team (US-CERT), a part of the Department of Homeland Security, released… Read more »

Lasting Impacts

Forty-eight years ago today (April 10, 1970), Paul McCartney announced the official breakup of the Beatles. It’s true that relations had been declining for some time, but Sir Paul’s announcement was the first public acknowledgement that the end had arrived. The reverberations of their music continues to ring through popular music even today. And although… Read more »

“GDPR” – Another Acronym You Need to Know!

Privacy is important to all of us but to most Europeans it is even more critical.  I was at a conference a while back and the presenter made the comment that European’s trust of companies and governments are colored by the events of WW2 and totalitarian regimes that used personal data to subjugate and terrorize… Read more »

Back to Basics: Protecting the Perimeter

The past several articles in the Back to Basics series have addressed controls inside the network—passwords, user management, and mobile device security. But even the best of these controls are for naught without strength at the perimeter of your network. Today we consider ways to minimize cybersecurity risk to your organization’s system from the outside… Read more »