Improve Your Company’s Security with Patch Management
- September 30, 2011
written by Chris Griesemer Although a lot of the subject matter in this article is geared towards banks and the countless...
Email Hoaxing – What Is It and How to Avoid It?
- June 1, 2011
written by Chris Griesemer We are constantly seeing information about new viruses being distributed all over the internet. I could write...
Wireless Security – How to Protect Your Network
- March 1, 2011
Isn’t wireless technology the greatest? I think I have a total of 10 wireless devices attached to my wireless network at home. I use my notebook to browse the web, I use my phone to send emails and texts, my son’s Xbox, I even print to a wireless printer. I wonder if The Whitlock Co knows I use my notebook on this network (Oops!)? Actually, we have followed the guidelines listed below to ensure The Whitlock Company's risk is reduced to none. How many businesses have notebook computers or other wireless devices that wonder into the wireless world without so much as even a guideline for them to follow? Whether it is an employee using their notebook on their unsecured wireless network at home, using it at a public hotspot like Panera Bread or using it at a hotel when they are on the road. All of these locations are security risks.
Preparation Through Disaster
- February 1, 2011
written by Chris Griesemer I am looking out the window at the enormous amounts of snow falling. Am I thinking how...
Hot Points For Your Next IT Exam
- February 26, 2010
Our IT Security Specialist Chris Griesemer’s recent presentation at the Lunch’Learn – Technical Audits, Security and Best Practices in Finance and Banking seminar covered important points for financial institutions.
Securing Your Customer Files And Information
- February 5, 2010
We have been doing IT exams for more than ten years and one overriding area of concern we see constantly is customer privacy. This has become one of the hottest topics with examiners lately. The examiners have a tendency to tell you to do something without giving any guidance. You will not receive an explanation on how to achieve their goals and sometimes they don’t even explain why. Customer information is one example. Why does it need to be so secure? This question has a lot of answers, but this article will focus on the internal risks.