A Real-World Example of Social Engineering

A social engineering test presents a challenge to your IT security team like no other.  Typically, advanced systems can manage technical points of entry into your environment with firewalls, logging, SIEM systems, malware scanners, etc.  However, when the point of...

Integrating Instant Issuance Cards

Instead of sending a debit card in the mail, many banks and credit unions are providing debit cards using “instant issuance” technology. Instant issuance produces a debit card – including personalization options – to the bank customer in minutes. Some financial...

How to protect yourself from ransomware

You have a top-flight antivirus solution deployed and managed on your system. Your hardware firewall is automatically updated and continuously monitored by a great security team. You’ve blocked access to all known malicious and questionable web sites. Your email...

Why EMV cards won’t stop CNP fraud

As U.S. banks deploy chip-enabled EMV debit and credit cards, most articles on the subject imply the new cards will dramatically reduce fraud. According to a 2014 report by Aite Group, 37% of all U.S. credit card fraud involved theft of credit card numbers and...

Protecting your virtual infrastructure just got easier

With the release of version 8, Veeam introduced Cloud Connect. This new feature allows you to easily send your backup data off-site to a third party data center. As opposed to on-line backup systems like Carbonite or Mozy, Veeam allows you to maintain complete control...