Support: (615) 499-7801

Category Archives: Cyber Security

ImageQuest recommends companies ban the use of TikTok app

ImageQuest recommends that our clients and other organizations ban the use of TikTok on company devices. We strongly recommend not creating a company account. China-based ByteDance owns TikTok, and we’ve seen numerous reports that the app appears problematic from a security and privacy perspective. For example: We encourage you to learn more by searching for … Continue reading "ImageQuest recommends companies ban the use of TikTok app"
Read More

ImageQuest promotes Mason Funderburg to Security Operations Engineer

Mason Funderburg, Lead Client Support Specialist for ImageQuest, has been promoted to Security Operations Engineer. Mason joins ImageQuest’s Security Operations team led by SecOps Architect Damian King. Mason started with ImageQuest in 2020 as an IT Support Specialist II, then was promoted to Field Tech 10 months later. Seven months ago, he was named Lead … Continue reading "ImageQuest promotes Mason Funderburg to Security Operations Engineer"
Read More

What is the difference between Compliance and Security in IT?

What is the difference between compliance and security in technology?  Is there a difference? Yes, there is a difference. While cybersecurity and IT compliance have elements in common, they are still different protocols. Consider the definitions: Cybersecurity is implementing and managing security controls to protect an organization and its assets. Compliance is implementing and managing … Continue reading "What is the difference between Compliance and Security in IT?"
Read More

Is your Incident Response Plan up to date?

A security incident is an event that would cause financial and/or reputational harm, disrupt daily operations, or create compliance issues with state or federal regulations. An Incident Response Plan (IRP) tackles those problems ahead of time, allowing planning when cooler heads can think clearly. You should develop an IRP to guide your organization’s responses to … Continue reading "Is your Incident Response Plan up to date?"
Read More

ImageQuest retains SOC 2 Type II attestation

We received our 2021 SOC 2 Type II attestation last week when the auditors sent us their report. SOC stands for System and Organization Controls. A SOC 2 report uses a framework developed by the American Institute of Certified Public Accountants to audit how an organization processes, secures, makes available, and keeps confidential information from … Continue reading "ImageQuest retains SOC 2 Type II attestation"
Read More

What is a Vulnerability Management Program?

The recent Log4j exposure raises the question: Do you have a Vulnerability Management Program? A Vulnerability Management Program is a systematic approach to periodically assessing your data exposure. It involves a scan of what you have on your systems – equipment, devices, and software – and checks those assets against databases of known vulnerabilities. To … Continue reading "What is a Vulnerability Management Program?"
Read More

Key questions for your Bank’s Vendor Management program

With everything on your plate, running a Vendor Management program for your Bank’s multiple vendors may seem overwhelming. Who do you call? What do you ask? An effective Vendor Management program will ascertain all vendors’ security postures. It will advise you whether you need to take extra steps to protect your data when using a … Continue reading "Key questions for your Bank’s Vendor Management program"
Read More

Leading managed IT services provider ImageQuest celebrates 15 years in business

ImageQuest marks its 15th year in business this month, and how we started is not what we look like today! Today, ImageQuest is a leading provider of managed IT services, cybersecurity, and IT compliance services to regulated companies and their vendors. Our primary areas of focus include financial institutions, including trusts; medical software and services; … Continue reading "Leading managed IT services provider ImageQuest celebrates 15 years in business"
Read More

How do we create a Cybersecurity Program?

Does the thought of creating a Cybersecurity Program for your bank seem overwhelming? Are you having trouble building a viable, documented program? A Cybersecurity Program should be part of your bank’s Risk Management efforts – as well as a critical element of your board’s fiduciary responsibilities.  A Cybersecurity Program should: Be Right-Sized for your Bank. … Continue reading "How do we create a Cybersecurity Program?"
Read More
a keyboard with a wooden hand rest

Benefits Of A Mechanical Keyboard

If you walk into an office and it’s relatively silent, despite an army of individuals typing away, you’ve probably stepped into a room full of membrane keyboards. While these are certainly cheaper to make and distribute, most IT people, including our cybersecurity service team, prefer the audio and tactile sensation of using an old-fashioned mechanical … Continue reading "Benefits Of A Mechanical Keyboard"
Read More

Hiring a vCISO – is it right for your bank?

Is your team stretched too far in meeting regulatory IT requirements? Are you concerned about your bank’s IT security posture? Are you having trouble assessing the security measures used by your vendors? Then you may need the services of a Chief Information Security Officer (CISO.) This C-level executive typically drives policies and projects tied to … Continue reading "Hiring a vCISO – is it right for your bank?"
Read More

ImageQuest’s Shutt and Ramsay attend KnowBe4 conference

ImageQuest’s Sammi Jo Shutt and Tracy Ramsay increased their expertise in security training, ongoing phishing tests, and other security training strategies by attending the annual KnowBe4 security education conference. Sammi Jo, ImageQuest’s Lead Information Security Advisor, and Tracy, who is also an Information Advisor, attended training sessions on security awareness, security culture, global cyberwar incidents, … Continue reading "ImageQuest’s Shutt and Ramsay attend KnowBe4 conference"
Read More