About Us | Contact Us
View Cart
Archive for 'Articles' Category

New Malware Can Cause Issues After Deletion

By Vigilize - Last updated: Monday, June 26, 2017

Targeting financial institutions, victims can serve as drones even after cleaning. An Article Review. Our friend Wes Pollard at Home Bank submitted this new malware alert to us and because it targets banking institutions specifically we thought we’d share it with you as well. Dubbed Pinkslipbot, the malware uses a variety of methods to harvest […]


Lack of Updates Cause Endpoint Security Concerns

By Vigilize - Last updated: Tuesday, June 20, 2017

Smartphones and tablets may receive infrequent updates and can be difficult to manage. An article review. Your desktop receives new virus definitions and other updates on what seems like an hourly basis, but when was the last time your smartphone received an OS update? Duo Security released their 2017 Trusted Access Report recently, and it […]


The Science of Thinking

By Vigilize - Last updated: Tuesday, May 30, 2017

Our cognitive blind spots revealed, and how we can avoid falling into them. An article review. Have you given much thought to how you think? Our friend Wes Pollard at Home Bank sent us a link to an interesting video that explores the science behind how we approach problems, and how those methods can be […]


The Advantages of Being Small

By Vigilize - Last updated: Thursday, May 25, 2017

Questionable social media campaign passed through layers of management unquestioned An article review. Sometimes it can seem like being one of the big guys makes security easy–finding a second set of eyes to look at a problem is never a problem, and of course the generous budgets don’t hurt, either. But having access to those […]


Goldilocks and the Three Posters

By Dan Hadaway - Last updated: Thursday, May 25, 2017

An Electronic Fairy Tale . . . The search for a poster that was “just right!” Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . WARNING: If you’re short on time, this article is rather silly. . . Once upon a time, there was an […]


Nine Years Later, NIST Agrees With Dan!

By Vigilize - Last updated: Friday, May 19, 2017

For the sake of user comfort, new draft document calls for an end to mandatory password changes, and other requirements. An article review. Long-time readers may remember Dan’s Password Manifesto, originally published in the Hoosier Banker Magazine in 2008, where he spoke out against the “conventional wisdom” requiring frequent password changes, advocating instead other mitigating factors […]


Ransomware: Should You Pay or Should You Go?

By Jolley | Hadaway - Last updated: Wednesday, May 3, 2017

When it comes to paying a ransomware demand, there’s no one-size-fits-all policy…


New Employee Press Release

By Sofia Tafoya - Last updated: Friday, April 21, 2017

BUSINESS NEWS   New Employee for infotex. infotex has just hired Chris Dietrich to be a new Data Security Analyst. “We are excited to have Chris as part of our team here at infotex.”says Chad Smith, NOC Manager of the Firm. “We believe he will help us continue to exceed our Client’s expectations.” “I am […]


Ten Must-Reads For Information Security Awareness

By Vigilize - Last updated: Thursday, April 20, 2017

These titles should be on every professional’s list. An article review. If there’s one thing you can take away from the most recent installment of our annual T7 article, it’s that the threats we face when securing IT assets are a diverse and constantly evolving lot. That’s why staying current is one of the most […]


Four and Four – Questions to Simplify Vendor Management

By Dan Hadaway - Last updated: Thursday, April 6, 2017

Two sets of questions that can help start your vendor due diligence adventure. A quick Dan’s New Leaf Post, meant to inspire thought about IT Governance . . . . When you’re just starting to address the issue of vendor management, it can seem like a daunting task.  And how do you explain to your vendor […]