Blog

Blog

Top 3 Things You Can do to Best Manage Your Vendors [VIDEO]

 

We now live in an outsourced world. The ability (and scalability) it allows our businesses by outsourcing functions of our business and IT infrastructure continues to increase each day. That is why vendor management has become a very important practice among CIOs and risk

Read More…

What Are Your #cybersecuritywins?

At Vala Secure, one of our core beliefs is to pursue educational challenges. We believe that if organizations want to improve their security game there needs to be a continued sense of fun and challenge to get better. If it’s not fun or challenging, it’s harder to get better. So we want to embody that each and every day and I’m excited to announce

Read More…

Top Five Takeaways of Information Security in 2017

The nature of information security is that it is ever evolving. As we become more technologically advanced, new challenges present themselves. The key is to never become complacent, and always keep an eye out for advancements that can protect you, your team and your clients.

 

Regulatory compliance moves at a pace that attempts to keep up with

Read More…

Top 5 Information Security Takeaways in 2018

Compliant does not always mean secure - this is one of the maxims held above all at Garland Heart. While being compliant with the regulations of your industry will cut down on the risk of an information breach, it does not mean that all the vulnerabilities in your system have been accounted for.

In order to get in front of any risks (proactive

Read More…

Compliant is NOT Always Secure

 

We are PCI Certified!  How did we get hacked?!?!?
We have a 1 on our FFIEC exam and still had this data breach?
There were no exceptions on their SOC report, but our vendor still had a compromise?
 
At Vala Secure, we have heard these comments and questions time and time again.  You have definitely heard them in the news.  Entities from big

Read More…

Proactive Compliance

 

We understand the budget restraints and "rabbit hole" you can get yourself into regarding compliance and security. How much do I do before the cost outweighs the benefit?

Oftentimes while onsite with our clients we find ourselves discussing the balance between regulations or

Read More…

ADA Website Compliance

As many of you have seen there are numerous companies, including community banks, receiving demand letters claiming the company's website is violating ADA (Americans with Disabilities Act) compliance. We wanted to help simplify it and give folks a plan of action. 
 
ADA Compliance for websites helps the visually impaired "read" your website

Read More…

4 Ways Banks Prevent Security Disasters

In September, Yahoo became the latest company to admit it had a serious data breach. A suspected state-sponsored hacker had compromised the user data, which included security question answers, passwords, phone numbers and birth dates, of 500 million accounts. Many Yahoo users also trusted the company with their bank account and credit card

Read More…

A Complete Guide to the Information Security Lifecycle

When it comes to the safety of your data and technology systems, it’s vital that your organization recognizes the reality of the “information security lifecycle.” By its very name, the info security lifecycle indicates that true information security is a process, not a “one and done” solitary project. Information security has no end-point, and

Read More…

Why a Virtual CISO is the Best-Kept Secret in Information Security

The twin gas pedals of globalization and technology have increased the speed of business to the point where you can blink and suddenly not recognize the landscape around you. This is especially true when it comes to information security, where the very concept of “hacking” and data theft went from Hollywood science fiction to a pressing fact of

Read More…