About Us | Contact Us
View Cart
Archive for 'infotex team' Category

Broadcast Awareness

By Dan Hadaway - Last updated: Monday, September 18, 2017

Steps One and Two . . . How to Substantially Decrease (and Streamline) Response Time Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Given that we have been watching networks since 2000, we have seen a LOT of incident responses.  There is a small, […]


Small Business Resource Page

By Dan Hadaway - Last updated: Friday, August 25, 2017

Dan has whittled all the noise to five resources a Small Business Owner should investigate (and utilize).


What’s New in Incident Response

By Jolley | Hadaway - Last updated: Tuesday, July 11, 2017

As threats evolve, so must your plans to respond to them… A Jolley|Hadaway Article. There have been a number of changes to the threat landscape organizations face in recent years, and if your organization’s plans to respond to those threats haven’t changed with them you may be wondering how to get started. From ransomware to […]


Why you should ALWAYS use strong passwords!

By Dan Hadaway - Last updated: Thursday, June 22, 2017

We can’t predict where the bad guys will strike next . . . Or how they can use technology to hurt us! A Vigilize Post!  Sometimes you might think, “well . . .  okay, I buy in this strong password thing, but I am not going to use strong passwords in all my applications and websites […]


Canaries in a Coal Mine

By Jolley | Hadaway - Last updated: Tuesday, June 6, 2017

Recognizing early signs of trouble can save you from big issues later. A Jolley|Hadaway Article Maybe you’ve already seen some of the signs yourself. Your mouse cursor may move on its own, when you’re not touching it. Or you get notifications for a delivery, but the address isn’t yours. Those are some dead canaries: signs […]


When is a Firewall Not Enough?

By Jolley | Hadaway - Last updated: Wednesday, May 31, 2017

Many new firewalls come with Intrusion Prevention Systems, but can’t replace the services of a MSSP. A Jolley | Hadaway Article Many Clients ask a great question related to network monitoring.  The question goes like this:  Firewalls now come with various services including Intrusion Prevention Systems, (IPS). Why pay a firm like infotex to provide […]


Goldilocks and the Three Posters

By Dan Hadaway - Last updated: Thursday, May 25, 2017

An Electronic Fairy Tale . . . The search for a poster that was “just right!” Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . WARNING: If you’re short on time, this article is rather silly. . . Once upon a time, there was an […]


Ransomware: Should You Pay or Should You Go?

By Jolley | Hadaway - Last updated: Wednesday, May 3, 2017

When it comes to paying a ransomware demand, there’s no one-size-fits-all policy…


Four and Four – Questions to Simplify Vendor Management

By Dan Hadaway - Last updated: Thursday, April 6, 2017

Two sets of questions that can help start your vendor due diligence adventure. A quick Dan’s New Leaf Post, meant to inspire thought about IT Governance . . . . When you’re just starting to address the issue of vendor management, it can seem like a daunting task.  And how do you explain to your vendor […]


T7 – The Trend of Trends 2017

By Vigilize - Last updated: Thursday, March 23, 2017

We’ve identified a whole new set of trend articles in Information Security that those in the field should know about, and while our take on this year’s installment is coming a little late we think you’ll agree that there have been plenty of new developments since last year!