Employee data exposure in the legal industry can leave employees vulnerable, lead to identify theft, and jeopardize the integrity of a legal office. That’s why it’s important for you to take the necessary steps to protect against data exposure as well as understand the techniques hackers use in order to implement successful countermeasures. This
This is a good article for Social Engineering awareness written by Adrianne Jeffries for The Verge.
As we are months underway into a new year, not only does it bring us new opportunities; but a reason to get into shape, see the spring flowers, knowing that football season is that much closer, and so on....it also brings us a whole new set of security threats and attacks.
With the continued rise of smart phones and the world of "apps" you can
The Garland Group is comprised of people with an understanding of banking and technology. Our goal is to help banks be better banks. We are open, conversational and someone you can relate to and rely on. Believe it or not, we also like to do fun things like play sports, music, video games, and just kick back and enjoy life.
Brad Garland | CEO
One of the things we pride ourselves on here at The Garland Group is the ability to educate while entertaining you. We like to call it edutainment. We’re always interested in helping our clients and others within the industry understand how to keep your institution safe.
We were approached by Lisa Hochgraf with CUES to produce a short video for
The Garland Group provides a comprehensive and integrated understanding of your processes and technologies and how they impact your business operations. We identify ways to increase your effectiveness and efficiency while reducing your risks.
The Garland Group has developed and customized a software application, RiskKey, that is used to assess
Financial institutions have a real challenge in either selecting a new Core Software package or negotiating an updated contract in today’s world. There are SO many options with different vendors on the Core side, not to mention the plethora of ancillary products. To add to this challenge, many of the vendors have a large menu of Core products and
From Security Pipeline.com
One of the nice things about security is that there’s a lot of information out there. In fact, just about everyone has a favorite theory, a pet practice, or even a set of guidelines that will tell you what to do to be safe.
Problem is, not all of those practices will really improve security in your enterprise, and some