Reminder: Siri Risk!
Voice assistants can be helpful, but their “always on” functionality can leave you vulnerable… A Jolley | Hadaway Short. By this point if you’re like us, you’re probably already a little tired of voice assistants like Siri being integrated into seemingly every new device–it sometimes feels as if we are going to get these “helpful” […]
Three Things About Insurance That Will Save You Time
If you’re in charge of reviewing insurance from an IT perspective, here are three helpful hints… A Jolley | Hadaway Short. Tell your critical vendors you want to have an “endorsement” on their cyber insurance policies. Note: this does not put you ahead of anybody in the “lawsuit line,” That is a myth. But what […]
Understanding Patch Management
It’s like a recall on your car… A Jolley | Hadaway Article. If you like to stay current on technology news, you’ve probably found it hard to ignore the recent stories about a major security problem with Intel processors, and the rush from software and hardware companies to mitigate the issue. Most of the solutions […]
Cybersanity in the Incident Response Age
Infotex is finally ready to say something about the Equifax Breach, the Ultimate Educational Moment. This Jolley | Hadaway article will explain why we’ve been silent, ’til now!
What’s New in Incident Response
As threats evolve, so must your plans to respond to them… A Jolley|Hadaway Article. There have been a number of changes to the threat landscape organizations face in recent years, and if your organization’s plans to respond to those threats haven’t changed with them you may be wondering how to get started. From ransomware to […]
Canaries in a Coal Mine
Recognizing early signs of trouble can save you from big issues later. A Jolley|Hadaway Article Maybe you’ve already seen some of the signs yourself. Your mouse cursor may move on its own, when you’re not touching it. Or you get notifications for a delivery, but the address isn’t yours. Those are some dead canaries: signs […]
When is a Firewall Not Enough?
Many new firewalls come with Intrusion Prevention Systems, but can’t replace the services of a MSSP. A Jolley | Hadaway Article Many Clients ask a great question related to network monitoring. The question goes like this: Firewalls now come with various services including Intrusion Prevention Systems, (IPS). Why pay a firm like infotex to provide […]
Ransomware: Should You Pay or Should You Go?
When it comes to paying a ransomware demand, there’s no one-size-fits-all policy…
Digital Security Standard Compliance: Is It Enough?
While the credit card industry-backed program has good aspects, it should not replace the SOC-2. With the number of different security standards–and ways to test those standards–out there, it can be difficult to stay on top of just what is required, compliance wise, for a specific situation. Case in point, we recently had a client with […]
The TSP: An Important Consideration
Something to look at when choosing your next service provider. . . A short Jolley | Hadaway article In our due diligence packet prospects and clients eventful tax will discover that we are proud to be part of a program that is called the FFIEC’s Technology Service Providers (TSP) examination program. In 2009 infotex volunteered […]