Archive for 'infotex team' Category
If you’re in charge of reviewing insurance from an IT perspective, here are three helpful hints… A Jolley | Hadaway Short. Tell your critical vendors you want to have an “endorsement” on their cyber insurance policies. Note: this does not put you ahead of anybody in the “lawsuit line,” That is a myth. But what […]
The first in our guest author series, this article by Eric Kroeger and Jason Mikolanis explains the difference between patch and vulnerability management.
It’s like a recall on your car… A Jolley | Hadaway Article. If you like to stay current on technology news, you’ve probably found it hard to ignore the recent stories about a major security problem with Intel processors, and the rush from software and hardware companies to mitigate the issue. Most of the solutions […]
R-7 – The Top Seven Risks – 2018: Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . When Dan presents audit reports to boards of directors, he also talks to the board about the top risks the institution is facing. Since 2006, Dan has been […]
Seven trends impacting Information Security Officers of Small Institutions! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Seven trends impacting Information Security Officers of Small Institutions! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance Welcome to the Magnificent Seven, my annual […]
Infotex is finally ready to say something about the Equifax Breach, the Ultimate Educational Moment. This Jolley | Hadaway article will explain why we’ve been silent, ’til now!
Steps One and Two . . . How to Substantially Decrease (and Streamline) Response Time Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Given that we have been watching networks since 2000, we have seen a LOT of incident responses. There is a small, […]
Dan has whittled all the noise to five resources a Small Business Owner should investigate (and utilize).
As threats evolve, so must your plans to respond to them… A Jolley|Hadaway Article. There have been a number of changes to the threat landscape organizations face in recent years, and if your organization’s plans to respond to those threats haven’t changed with them you may be wondering how to get started. From ransomware to […]
We can’t predict where the bad guys will strike next . . . Or how they can use technology to hurt us! A Vigilize Post! Sometimes you might think, “well . . . okay, I buy in this strong password thing, but I am not going to use strong passwords in all my applications and websites […]