All the Latest in Industry Happenings—Here in the ImageQuest IT Blog
Get the latest cybercrime trends, tips for securing your data, compliance, and industry news. These are just some topics you’ll discover in the ImageQuest IT blog.
‘MFA Fatigue’ is a new type of cyberattack
We have a new term for you: MFA Fatigue. While you may feel you are tired of the additional efforts required by multifactor authentication to log in to something, that is not the MFA fatigue of which we speak. This MFA Fatigue is a new type of cyberattack. When a hacker gains a password on […]
Read More>>ImageQuest recommends companies ban the use of TikTok app
ImageQuest recommends that our clients and other organizations ban the use of TikTok on company devices. We strongly recommend not creating a company account. China-based ByteDance owns TikTok, and we’ve seen numerous reports that the app appears problematic from a security and privacy perspective. For example: In January 2020, researchers found the app could allow […]
Read More>>ImageQuest promotes Mason Funderburg to Security Operations Engineer
Mason Funderburg, Lead Client Support Specialist for ImageQuest, has been promoted to Security Operations Engineer. Mason joins ImageQuest’s Security Operations team led by SecOps Architect Damian King. Mason started with ImageQuest in 2020 as an IT Support Specialist II, then was promoted to Field Tech 10 months later. Seven months ago, he was named Lead […]
Read More>>What is the difference between Compliance and Security in IT?
What is the difference between compliance and security in technology? Is there a difference? Yes, there is a difference. While cybersecurity and IT compliance have elements in common, they are still different protocols. Consider the definitions: Cybersecurity is implementing and managing security controls to protect an organization and its assets. Compliance is implementing and managing […]
Read More>>Is your Incident Response Plan up to date?
A security incident is an event that would cause financial and/or reputational harm, disrupt daily operations, or create compliance issues with state or federal regulations. An Incident Response Plan (IRP) tackles those problems ahead of time, allowing planning when cooler heads can think clearly. You should develop an IRP to guide your organization’s responses to […]
Read More>>ImageQuest retains SOC 2 Type II attestation
We received our 2021 SOC 2 Type II attestation last week when the auditors sent us their report. SOC stands for System and Organization Controls. A SOC 2 report uses a framework developed by the American Institute of Certified Public Accountants to audit how an organization processes, secures, makes available, and keeps confidential information from […]
Read More>>What is a Vulnerability Management Program?
The recent Log4j exposure raises the question: Do you have a Vulnerability Management Program? A Vulnerability Management Program is a systematic approach to periodically assessing your data exposure. It involves a scan of what you have on your systems – equipment, devices, and software – and checks those assets against databases of known vulnerabilities. To […]
Read More>>Key questions for your Bank’s Vendor Management program
With everything on your plate, running a Vendor Management program for your Bank’s multiple vendors may seem overwhelming. Who do you call? What do you ask? An effective Vendor Management program will ascertain all vendors’ security postures. It will advise you whether you need to take extra steps to protect your data when using a […]
Read More>>Leading managed IT services provider ImageQuest celebrates 15 years in business
ImageQuest marks its 15th year in business this month, and how we started is not what we look like today! Today, ImageQuest is a leading provider of managed IT services, cybersecurity, and IT compliance services to regulated companies and their vendors. Our primary areas of focus include financial institutions, including trusts; medical software and services; […]
Read More>>How do we create a Cybersecurity Program?
Does the thought of creating a Cybersecurity Program for your bank seem overwhelming? Are you having trouble building a viable, documented program? A Cybersecurity Program should be part of your bank’s Risk Management efforts – as well as a critical element of your board’s fiduciary responsibilities. A Cybersecurity Program should: Be Right-Sized for your Bank. […]
Read More>>How the Benefits of SD-WAN Can Improve Business Operations
Does your business have multiple locations, remote workers, a call center, or just need reliable continuous operations? Are network ‘hiccups’ harmful to your business? Then it might be worthwhile to investigate the next generation of WAN, known as SD-WAN. SD-WAN is a solution for network outages. As work – software applications, customer accounts, and business […]
Read More>>Merry Christmas to Special Kids of Tennessee
Special Kids is a nursing and therapy center in Murfreesboro, Tn. They serve children who need extra help to reach their greatest potential in life. The children served by Special Kids may have feeding difficulties, may be medically fragile, and may be sensitive to certain stimuli, such as sounds, lights, or even changing activities or […]
Read More>>Why It’s Necessary to Implement a Zero Trust Security Model for Your Business’s Network
With the rampant rise of cybercrime worldwide, you want to protect your organization’s data security. Not only is it necessary for compliance reasons, but it also helps to improve your customers’ trust in your company. You may believe you’re protected with a traditional cybersecurity model, but that cyber strategy has many gaps. To bridge those […]
Read More>>Why Should I Hire a Managed Security Services Provider (MSSP)?
If your business collects data from customers—whether it’s as simple as name and address or more complex as financial or personal health information—you need proper security measures to protect that data. With an increase in the number of cybersecurity regulations and the growing number of customers in your enterprise, it can be hard for small […]
Read More>>Phishing attacks remain a cybersecurity problem, experts say
Have you recently received a communication that initially scared you? Perhaps a notice that your credit card had unauthorized transactions, your bank account needed attention, or your favorite shopping site needed to verify some information to complete your latest purchase, which you knew was an important but last-minute gift? And this notice asked you to […]
Read More>>ImageQuest’s Shutt speaks about Vendor Management at NGage
Director of Information Security Services Sammi Jo Shutt served as a panelist on Vendor Management Tuesday at the NGage annual conference in Newport Beach, Calif. Sammi Jo joined two others on the topic of best practices for vendor relationships. The session focused on making the Vendor Management process more than due diligence. It also covered […]
Read More>>Annoyed by having to use Multi-factor Authentication?
Do you find it annoying to have to deal with Multi-Factor Authentication? Multi-factor authentication (MFA) is that extra log-in step that cyber experts, including Microsoft and the FBI, say will stop 95 percent of attacks. (Some say 99 percent!) We will stipulate: It can be annoying to have to stop and provide that extra credential. […]
Read More>>ImageQuest promotes Shutt to Director of Advisory Services
ImageQuest has promoted Sammi Jo Shutt to Director of Advisory Services from Lead Information Security Advisor. The promotion includes her ascension onto the ImageQuest executive leadership team. Sammi Jo, who joined ImageQuest in January 2019 as a Security Analyst, has been instrumental in helping the company’s Information Advisory Services practice double in size since her […]
Read More>>Do You Have The Technology To Support A Fully Remote Workforce?
