About Us | Contact Us
View Cart
Archive for 'Asset Management' Category

Small Business Resource Page

By Dan Hadaway - Last updated: Friday, August 25, 2017

Dan has whittled all the noise to five resources a Small Business Owner should investigate (and utilize).


Recently Discovered Mac Malware Has Long History

By Vigilize - Last updated: Friday, August 11, 2017

Researchers found evidence in the code that the exploit may have been in use for decades. An article review It’s a common belief that viruses and other types of malware don’t affect Apple products, but unfortunately, that isn’t always the case. A good example of this was brought to us by our friend Wes Pollard […]


Lack of Updates Cause Endpoint Security Concerns

By Vigilize - Last updated: Tuesday, June 20, 2017

Smartphones and tablets may receive infrequent updates and can be difficult to manage. An article review. Your desktop receives new virus definitions and other updates on what seems like an hourly basis, but when was the last time your smartphone received an OS update? Duo Security released their 2017 Trusted Access Report recently, and it […]


Legal Notice

By Vigilize - Last updated: Wednesday, February 22, 2017

Legal notices for the infotex domain.


The Thing About Speed Bumps

By Dan Hadaway - Last updated: Saturday, September 12, 2015

. . . they’re not required . . . But they do have a place! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . There is a myth out there that speed bumps are required for all weblinking relationships.  This is simply not true.  They are […]


Getting Started on Cybersecurity

By Dan Hadaway - Last updated: Thursday, July 9, 2015

Process Flow for Institutions . . . and why Dan loves the Cybersecurity Assessment Tool! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Real quick:  What should you do to get started on understanding the new Cybersecurity Assessment Tool (and its impact on future […]


10% of Android Apps Contain Malicious Code

By Dan Hadaway - Last updated: Monday, June 29, 2015

One more reason to stick with Apple? And I had just sworn off my iPhone! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Ever since I made fun of a friend for bending his iPhone 6, people have been asking me when I’m going […]


Cloud Priorities 2015

By Dan Hadaway - Last updated: Wednesday, April 8, 2015

A good question . . . But my answer might not be broad enough! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . The Cloud Computing Association (CCA) is “reaching out” to persons asking their “Top Three Cloud Priorities.”  I found that interesting.  The e-mail, which […]


The American Monkey Trap

By Dan Hadaway - Last updated: Friday, March 6, 2015

Coming Soon To (or is it from) a Frustrated User Near You! An article about how we 21st Century Americans have been taught to tolerate technologies that do not work. And how that tolerance alone substantially increases risk. And about how we do NOT have to use technology if we can’t find the time to make it “sing.”


Would I love to interview Lenovo’s Incident Response Team!

By Dan Hadaway - Last updated: Friday, March 6, 2015

How much can failure be worth? Dan gets an idea while filling out a “customer satisfaction survey!” Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . So though I tried to comment on Lenovo’s site during the early days of their Superfish incident and they wouldn’t […]