About Us | Contact Us
View Cart
Archive for 'Technical Security Standards' Category

Object Access Limitations

By Matt Jolley - Last updated: Monday, March 5, 2018

Object Access Limitations. . . While offering some visibility, there are limitations to object access monitoring. If your organization has to comply with industry regulations such as GLBA, HIPAA, or Sarbanes Oxley, you know that maintaining data security and privacy are important, and one of the ways you can accomplish that is with object access […]


The Difference Between Patch and Vulnerability Management

By Vigilize - Last updated: Thursday, January 18, 2018

The first in our guest author series, this article by Eric Kroeger and Jason Mikolanis explains the difference between patch and vulnerability management.


Understanding Patch Management

By Jolley | Hadaway - Last updated: Wednesday, January 10, 2018

It’s like a recall on your car… A Jolley | Hadaway Article. If you like to stay current on technology news, you’ve probably found it hard to ignore the recent stories about a major security problem with Intel processors, and the rush from software and hardware companies to mitigate the issue.  Most of the solutions […]


Cybersanity in the Incident Response Age

By Jolley | Hadaway - Last updated: Friday, November 3, 2017

Infotex is finally ready to say something about the Equifax Breach, the Ultimate Educational Moment. This Jolley | Hadaway article will explain why we’ve been silent, ’til now!


Forgotten But Not Gone: The Ex-Employee Risk

By Vigilize - Last updated: Friday, August 25, 2017

Failure to deprovision former employees presents a real risk to businesses. An article review. When terminating an employee you probably make sure that they turn in keys, access cards, and any other physical access credentials, but how sure are you that their electronic credentials have been revoked? A new study being highlighted by CIO Insight […]


Small Business Resource Page

By Dan Hadaway - Last updated: Friday, August 25, 2017

Dan has whittled all the noise to five resources a Small Business Owner should investigate (and utilize).


When You Accidentally Go Open Source

By Vigilize - Last updated: Monday, July 24, 2017

32 TB of Windows 10-related source code is now available, for better or for worse… An article review. Releasing the source code for a project has been a common practice among some developers for decades now–proponents say allowing any interested parties to view the code makes for safer systems, preventing sneaky back doors and unintentional […]


Ten Must-Reads For Information Security Awareness

By Vigilize - Last updated: Thursday, April 20, 2017

These titles should be on every professional’s list. An article review. If there’s one thing you can take away from the most recent installment of our annual T7 article, it’s that the threats we face when securing IT assets are a diverse and constantly evolving lot. That’s why staying current is one of the most […]


Digital Security Standard Compliance: Is It Enough?

By Jolley | Hadaway - Last updated: Friday, February 24, 2017

While the credit card industry-backed program has good aspects, it should not replace the SOC-2. With the number of different security standards–and ways to test those standards–out there, it can be difficult to stay on top of just what is required, compliance wise, for a specific situation. Case in point, we recently had a client with […]


A Password Management Horror Story

By Vigilize - Last updated: Friday, February 24, 2017

Not having strong policies surrounding shared passwords could make your data a hostage An article review. Do you know who is in control of the various account credentials used by your organization’s employees? One Indianapolis company is, but only after a fired employee held a vital password hostage for $200,000 according to an article in […]