About Us | Contact Us
View Cart
Archive for 'Asset Management' Category

Lack of Updates Cause Endpoint Security Concerns

By Vigilize - Last updated: Tuesday, June 20, 2017

Smartphones and tablets may receive infrequent updates and can be difficult to manage. An article review. Your desktop receives new virus definitions and other updates on what seems like an hourly basis, but when was the last time your smartphone received an OS update? Duo Security released their 2017 Trusted Access Report recently, and it […]


Legal Notice

By Vigilize - Last updated: Wednesday, February 22, 2017

Legal notices for the infotex domain.


The Thing About Speed Bumps

By Dan Hadaway - Last updated: Saturday, September 12, 2015

. . . they’re not required . . . But they do have a place! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . There is a myth out there that speed bumps are required for all weblinking relationships.  This is simply not true.  They are […]


Getting Started on Cybersecurity

By Dan Hadaway - Last updated: Thursday, July 9, 2015

Process Flow for Institutions . . . and why Dan loves the Cybersecurity Assessment Tool! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Real quick:  What should you do to get started on understanding the new Cybersecurity Assessment Tool (and its impact on future […]


10% of Android Apps Contain Malicious Code

By Dan Hadaway - Last updated: Monday, June 29, 2015

One more reason to stick with Apple? And I had just sworn off my iPhone! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Ever since I made fun of a friend for bending his iPhone 6, people have been asking me when I’m going […]


Cloud Priorities 2015

By Dan Hadaway - Last updated: Wednesday, April 8, 2015

A good question . . . But my answer might not be broad enough! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . The Cloud Computing Association (CCA) is “reaching out” to persons asking their “Top Three Cloud Priorities.”  I found that interesting.  The e-mail, which […]


The American Monkey Trap

By Dan Hadaway - Last updated: Friday, March 6, 2015

Coming Soon To (or is it from) a Frustrated User Near You! An article about how we 21st Century Americans have been taught to tolerate technologies that do not work. And how that tolerance alone substantially increases risk. And about how we do NOT have to use technology if we can’t find the time to make it “sing.”


Would I love to interview Lenovo’s Incident Response Team!

By Dan Hadaway - Last updated: Friday, March 6, 2015

How much can failure be worth? Dan gets an idea while filling out a “customer satisfaction survey!” Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . So though I tried to comment on Lenovo’s site during the early days of their Superfish incident and they wouldn’t […]


The Internet of Things

By Vigilize - Last updated: Sunday, February 15, 2015

An article review. Vulnerabilities Found in Everything from Coffee Makers to Cars Generally, our article reviews relate to a single article, but we recently found two separate articles that highlight many of the same concerns. These concerns simply apply to different product categories, so we decided to review them together. The first article examined a […]


The Value of Information Debated!

By Dan Hadaway - Last updated: Saturday, February 7, 2015

One takeaway of the Anthem Breach . . . But not the main takeaway! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . I’m writing a different article about the main takeaway of the Anthem Breach (that what caused it was a false sense of security.) […]