About Us | Contact Us
View Cart
Archive for 'infotex team' Category

What’s New in Incident Response

By Jolley | Hadaway - Last updated: Tuesday, July 11, 2017

As threats evolve, so must your plans to respond to them… A Jolley|Hadaway Article. There have been a number of changes to the threat landscape organizations face in recent years, and if your organization’s plans to respond to those threats haven’t changed with them you may be wondering how to get started. From ransomware to […]


Why you should ALWAYS use strong passwords!

By Dan Hadaway - Last updated: Thursday, June 22, 2017

We can’t predict where the bad guys will strike next . . . Or how they can use technology to hurt us! A Vigilize Post!  Sometimes you might think, “well . . .  okay, I buy in this strong password thing, but I am not going to use strong passwords in all my applications and websites […]


Canaries in a Coal Mine

By Jolley | Hadaway - Last updated: Tuesday, June 6, 2017

Recognizing early signs of trouble can save you from big issues later. A Jolley|Hadaway Article Maybe you’ve already seen some of the signs yourself. Your mouse cursor may move on its own, when you’re not touching it. Or you get notifications for a delivery, but the address isn’t yours. Those are some dead canaries: signs […]


When is a Firewall Not Enough?

By Jolley | Hadaway - Last updated: Wednesday, May 31, 2017

Many new firewalls come with Intrusion Prevention Systems, but can’t replace the services of a MSSP. A Jolley | Hadaway Article Many Clients ask a great question related to network monitoring.  The question goes like this:  Firewalls now come with various services including Intrusion Prevention Systems, (IPS). Why pay a firm like infotex to provide […]


Goldilocks and the Three Posters

By Dan Hadaway - Last updated: Thursday, May 25, 2017

An Electronic Fairy Tale . . . The search for a poster that was “just right!” Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . WARNING: If you’re short on time, this article is rather silly. . . Once upon a time, there was an […]


Ransomware: Should You Pay or Should You Go?

By Jolley | Hadaway - Last updated: Wednesday, May 3, 2017

When it comes to paying a ransomware demand, there’s no one-size-fits-all policy…


Four and Four – Questions to Simplify Vendor Management

By Dan Hadaway - Last updated: Thursday, April 6, 2017

Two sets of questions that can help start your vendor due diligence adventure. A quick Dan’s New Leaf Post, meant to inspire thought about IT Governance . . . . When you’re just starting to address the issue of vendor management, it can seem like a daunting task.  And how do you explain to your vendor […]


T7 – The Trend of Trends 2017

By Vigilize - Last updated: Thursday, March 23, 2017

We’ve identified a whole new set of trend articles in Information Security that those in the field should know about, and while our take on this year’s installment is coming a little late we think you’ll agree that there have been plenty of new developments since last year!


Financial Statement Review in Vendor Management

By Dan Hadaway - Last updated: Monday, March 13, 2017

What are the expectations for Financial Statement Review? For banks and credit unions. Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . I’m often asked, “what should we be doing when it comes to financial statement review during vendor management.” Let me start off by […]


A Password Management Horror Story

By Vigilize - Last updated: Friday, February 24, 2017

Not having strong policies surrounding shared passwords could make your data a hostage An article review. Do you know who is in control of the various account credentials used by your organization’s employees? One Indianapolis company is, but only after a fired employee held a vital password hostage for $200,000 according to an article in […]