About Us | Contact Us
View Cart
Archive for 'Tools' Category

Consumer Breach Resources

By Vigilize - Last updated: Sunday, April 12, 2015

Think you’ve been hacked? These are sites to start your breach investigation.


Enterprise Risk Management Committee Charter

By Vigilize - Last updated: Friday, February 13, 2015

Quick and Easy ERM Committee Boilerplate! This is a starting point for those wanting to establish an Enterprise Risk Management Committee. (It can also be used as the structure for an ISO Committee Charter, as well as a Audit Committee Charter.) The boilerplate charter is meant to establish the Enterprise Risk Management Committee, its membership, […]


Turn Lemons into Lemonade with Proactive Incident Responses!

By Vigilize - Last updated: Saturday, August 23, 2014

Incident Response is a key to IT Governance. A good Incident Response Program will have a high-level policy, and a plan that enforces that policy by establishing goals, priorities, training, and tools.


Security Takes Cooperation

By Vigilize - Last updated: Friday, August 22, 2014

Security Takes Cooperation! To help you remind your employees that security requires cooperation, here’s a security awareness reminder poster that you may print and post in conspicuous locations:  security_takes_cooperation_082414 !  


Vendor Management 2014

By Dan Hadaway - Last updated: Tuesday, July 8, 2014

Mark your calendars! Dan Hadaway will be delivering a workshop with the Indiana Bankers Association to outline what makes an effective vendor management program. The workshop will be on August 21st starting at 9:00 AM and ending at 4:00 PM. For information on how to register, visit the IBA’s website. Sharpening Your Vendor Management Tools Because financial […]


The Bitcoin Protocol Explained

By Vigilize - Last updated: Tuesday, December 10, 2013

You may have read articles around the web claiming to know the future of the controversial digital currency known as Bitcoin.


Vendor Risk, The TSP Booklet, and the ROE

By Dan Hadaway - Last updated: Friday, November 2, 2012

This article attempts to concisely describe the important points of the TSP Booklet, and makes the case that you should add the Report of Examination to your vendor due diligence tools!


Using SDelete

By Vigilize - Last updated: Tuesday, July 10, 2012

SDelete allows you to delete one or more files and/or directories, or to cleanse the free space on a logical disk. It is a command line utility that takes a number of options. SDelete accepts wild card characters as part of the directory or file specifier. Instructions on how to use SDelete.


Third Party Patch Management

By Sean Waugh - Last updated: Wednesday, May 2, 2012

Vulnerabilities come in all shapes and sizes and while operating system patch management has largely been simplified with tools like WSUS, there is still a high degree of risk due to many popular third party applications and the lack of any centralized patching mechanism for maintaining those installations.  Vendors such as Adobe and Mozilla regularly release updates for their software packages, but managing those updates has been an arduous task for many system administrators.  Until recently, the only centralized option was to create your own MSI packages and deploy them via group policy or SCCM.


The Customer Awareness Control

By Dan Hadaway - Last updated: Tuesday, November 15, 2011

Infotex has released a White Paper in response to the customer awareness training requirements of the June 28th Supplement to the 2005 Authentication Guidance released by the FFIEC. The goal was to pull everything we know about customer awareness training into one place. Thank you to Gary Kern and John Mickle of MutualBank for granting permission to release this white paper to our friends!