Information Security

Phishing attacks remain a cybersecurity problem, experts say

Have you recently received a communication that initially scared you? Perhaps a notice that your credit card had unauthorized transactions, your bank account needed attention, or your favorite shopping site needed to verify some information to complete your latest purchase, which you knew was an important but last-minute gift? And this notice asked you to …

Phishing attacks remain a cybersecurity problem, experts say Read More »

Social Media – A Cybercriminal Resource

Do you know someone who spends a lot of time on Social Media? Someone who’s posting nearly daily about their activities? Even if you avoid Facebook, Instagram, Pinterest, TikTok, and other Social Media outlets, your friend could still be putting you at risk. During Cybersecurity Month – and all year – the U.S. Cybersecurity and …

Social Media – A Cybercriminal Resource Read More »

What is the difference between Compliance and Security in IT?

What is the difference between compliance and security in technology?  Is there a difference? Yes, there is a difference. While cybersecurity and IT compliance have elements in common, they are still different protocols. Consider the definitions: Cybersecurity is implementing and managing security controls to protect an organization and its assets. Compliance is implementing and managing …

What is the difference between Compliance and Security in IT? Read More »

Is your Incident Response Plan up to date?

A security incident is an event that would cause financial and/or reputational harm, disrupt daily operations, or create compliance issues with state or federal regulations. An Incident Response Plan (IRP) tackles those problems ahead of time, allowing planning when cooler heads can think clearly. You should develop an IRP to guide your organization’s responses to …

Is your Incident Response Plan up to date? Read More »

Key questions for your Bank’s Vendor Management program

With everything on your plate, running a Vendor Management program for your Bank’s multiple vendors may seem overwhelming. Who do you call? What do you ask? An effective Vendor Management program will ascertain all vendors’ security postures. It will advise you whether you need to take extra steps to protect your data when using a …

Key questions for your Bank’s Vendor Management program Read More »

ImageQuest’s Shutt and Ramsay attend KnowBe4 conference

ImageQuest’s Sammi Jo Shutt and Tracy Ramsay increased their expertise in security training, ongoing phishing tests, and other security training strategies by attending the annual KnowBe4 security education conference. Sammi Jo, ImageQuest’s Lead Information Security Advisor, and Tracy, who is also an Information Advisor, attended training sessions on security awareness, security culture, global cyberwar incidents, …

ImageQuest’s Shutt and Ramsay attend KnowBe4 conference Read More »

Enjoy Your Free Download!

Enjoy Your Free Download!

Enjoy Your Free Download!

Referral Program: Earn Rewards With ImageQuest

Apply Now

"*" indicates required fields

First Name*
Last Name*
Drop files here or
Accepted file types: jpg, png, pdf, Max. file size: 20 MB, Max. files: 5.

    Enjoy Your Free Download!

    Enjoy Your Free Download!

    Enjoy Your Free Download!

    Enjoy Your Free Download!

    Enjoy Your Free Download!

    Enjoy Your Free Download!

    Enjoy Your Free Download!

    Enjoy Your Free Download!

    Enjoy Your Free Download!

    Enjoy Your Free Download!

    Enjoy Your Free Download!

    Enjoy Your Free Download!

    Enjoy Your Free Download!

    Enjoy Your Free Download!

    Enjoy Your Free Download!

    Enjoy Your Free Download!

    Scroll to Top