About Us | Contact Us
View Cart
Archive for 'infotex team' Category

Risk Versus Severity When In A Panic

By Dan Hadaway - Last updated: Monday, April 9, 2018

Risk isn’t the only thing to consider when planning a decision tree. Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . During tuning, we’re sometimes asked, as we help our MSSP Clients establish a detailed decision tree (modify our default to their own situation), “are […]


Our Blog Policy

By Vigilize - Last updated: Monday, April 2, 2018

While we’re not a news service, we often use current events to comment on trends and our services. This blog is intended to get people thinking about topics and trends in Technology Risk Management, through our article reviews, as well as through original blog articles about current events and our MSSP services (such as our […]


Firewall Log Retention: Beyond The Guidance

By Dan Hadaway - Last updated: Monday, March 26, 2018

In the absence of specific guidance, organizations are left to use their judgement in retaining logs… Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Not long ago a Client asked for my input on their firewall log policy, as they were collecting logs but […]


Merchandising as an Information Security Concept

By Dan Hadaway - Last updated: Monday, March 19, 2018

Haven’t rotated your posters in a while? Your customers may not be seeing them anymore. Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . One of the things I recently realized: some bankers I interact with do not have the same  understanding of merchandising that I […]


Our Compliance with #4040

By Dan Hadaway - Last updated: Monday, February 26, 2018

Dan’s decided to declare “in compliance” on a CAT Statement, and wants your opinion! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . How would you like to experience a little excerpt from an infotex risk assessment?  (Yes, we had to run this by our […]


Three Things About Insurance That Will Save You Time

By Jolley | Hadaway - Last updated: Monday, February 5, 2018

If you’re in charge of reviewing insurance from an IT perspective, here are three helpful hints… A Jolley | Hadaway Short. Tell your critical vendors you want to have an “endorsement” on  their cyber insurance policies.  Note:  this does not put you ahead of anybody in the “lawsuit line,”  That is a myth.  But what […]


The Difference Between Patch and Vulnerability Management

By Vigilize - Last updated: Thursday, January 18, 2018

The first in our guest author series, this article by Eric Kroeger and Jason Mikolanis explains the difference between patch and vulnerability management.


Understanding Patch Management

By Jolley | Hadaway - Last updated: Wednesday, January 10, 2018

It’s like a recall on your car… A Jolley | Hadaway Article. If you like to stay current on technology news, you’ve probably found it hard to ignore the recent stories about a major security problem with Intel processors, and the rush from software and hardware companies to mitigate the issue.  Most of the solutions […]


R-7 – The Top Seven Risks – 2018

By Vigilize - Last updated: Tuesday, January 9, 2018

R-7 – The Top Seven Risks – 2018: Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . When Dan presents audit reports to boards of directors, he also talks to the board about the top risks the institution is facing. Since 2006, Dan has been […]


The Magnificent Seven 2018

By Dan Hadaway - Last updated: Wednesday, November 22, 2017

Seven trends impacting Information Security Officers of Small Institutions! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Seven trends impacting Information Security Officers of Small Institutions! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance Welcome to the Magnificent Seven, my annual […]