About Us | Contact Us
View Cart
Archive for 'Ecommerce' Category

Lack of Updates Cause Endpoint Security Concerns

By Vigilize - Last updated: Tuesday, June 20, 2017

Smartphones and tablets may receive infrequent updates and can be difficult to manage. An article review. Your desktop receives new virus definitions and other updates on what seems like an hourly basis, but when was the last time your smartphone received an OS update? Duo Security released their 2017 Trusted Access Report recently, and it […]


Legal Notice

By Vigilize - Last updated: Wednesday, February 22, 2017

Legal notices for the infotex domain.


Protected: Due Diligence MSSP

By Dan Hadaway - Last updated: Sunday, April 3, 2016

There is no excerpt because this is a protected post.


Protected: Due Diligence Public

By Dan Hadaway - Last updated: Sunday, April 3, 2016

There is no excerpt because this is a protected post.


ssae-16_instructions

By Dan Hadaway - Last updated: Sunday, April 3, 2016

Instructions for ordering the SSAE-16 for infotex subservice provider, Expedient! 2017. Instructions are located here.  


Turning Lemons into Lemonade with Incident Response

By Vigilize - Last updated: Thursday, March 12, 2015

Our first “home-base” webinar! Incident Response Management: a seven step approach to developing an incident response process. How Incident Response can help you comply with the NIST CyberSecurity Standard.


Enterprise Risk Management Committee Charter

By Vigilize - Last updated: Friday, February 13, 2015

Quick and Easy ERM Committee Boilerplate! This is a starting point for those wanting to establish an Enterprise Risk Management Committee. (It can also be used as the structure for an ISO Committee Charter, as well as a Audit Committee Charter.) The boilerplate charter is meant to establish the Enterprise Risk Management Committee, its membership, […]


40% of Consumers Attacked DAILY or WEEKLY!

By Vigilize - Last updated: Friday, October 31, 2014

The case for customer education . . . The fact is, when two customers walk into your establishment, one is probably being attacked RIGHT NOW! The results of a Microsoft study revealed in this article by Warwick Ashford of Computer Weekly, is very timely, as they come during an ongoing debate about the legal risk exposure versus the […]


IBA Planning Yet Another Great Conference!

By Dan Hadaway - Last updated: Thursday, October 23, 2014

Have you checked out the itinerary? Another great lineup of speakers! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Yesterday my Client said summed it up pretty well: “I can’t afford not to go!” On 11/19 and 11/20/2014 Information Security Officers from organizations all […]


tat2015

By Dan Hadaway - Last updated: Wednesday, September 3, 2014

Workshop Portal Upon completion of the Technical Audit Toolkit Workshop, infotex grants attendees permission to use these boilerplates and will turn over copyright of the resulting documents to your financial institution. By using any of the boilerplates, you signify agreement to the terms and conditions as contained in the Transfer of Copyright Agreement. However, infotex […]