3 min read
Discussions Triggered from the LastPass Breach
Over the past month, many have written about the latest LastPass breach. If you have not kept up with the breach, you can see the disclosure from...
3 min read
Over the past month, many have written about the latest LastPass breach. If you have not kept up with the breach, you can see the disclosure from...
1 min read
What exactly is a user access review? In its simplest form, this review is a process that certifies that users’ (including vendors’) access within...
2 min read
It’s been a long and crazy two years since Covid showed up and changed the world. Yes, a lot of things are different now, but I’d like to take a few...
1 min read
Financial institutions are required to regularly assess the authentication controls, security layers, and monitoring of Internet Banking to prepare...
2 min read
News this week brought us word of something very disappointing, a breach in a large player in the identity services company, Okta. If I’m being 100%...
2 min read
In August, the FFIEC released new guidance titled “Authentication and Access to Financial Institution Services and Systems”. Because the guidance...
2 min read
We often run into situations where different staff in an institution have different understandings of the goals and operations of their backup...
2 min read
Application programming interfaces, or APIs, enable applications to exchange data and functionality easily with other applications and users in or...
2 min read
It is a good practice to identify a cybersecurity framework as part of an institution’s Information Security Program. A framework helps to identify...