Author Archive
Reminder: Siri Risk!
By Jolley | Hadaway - Last updated: Sunday, June 17, 2018
Voice assistants can be helpful, but their “always on” functionality can leave you vulnerable… A Jolley | Hadaway Short. By this point if you’re like us, you’re probably already a little tired of voice assistants like Siri being integrated into seemingly every new device–it sometimes feels as if we are going to get these “helpful” […]
Three Things About Insurance That Will Save You Time
By Jolley | Hadaway - Last updated: Monday, February 5, 2018
If you’re in charge of reviewing insurance from an IT perspective, here are three helpful hints… A Jolley | Hadaway Short. Tell your critical vendors you want to have an “endorsement” on their cyber insurance policies. Note: this does not put you ahead of anybody in the “lawsuit line,” That is a myth. But what […]
Understanding Patch Management
By Jolley | Hadaway - Last updated: Wednesday, January 10, 2018
It’s like a recall on your car… A Jolley | Hadaway Article. If you like to stay current on technology news, you’ve probably found it hard to ignore the recent stories about a major security problem with Intel processors, and the rush from software and hardware companies to mitigate the issue. Most of the solutions […]
Cybersanity in the Incident Response Age
By Jolley | Hadaway - Last updated: Friday, November 3, 2017
Infotex is finally ready to say something about the Equifax Breach, the Ultimate Educational Moment. This Jolley | Hadaway article will explain why we’ve been silent, ’til now!
What’s New in Incident Response
By Jolley | Hadaway - Last updated: Tuesday, July 11, 2017
As threats evolve, so must your plans to respond to them… A Jolley|Hadaway Article. There have been a number of changes to the threat landscape organizations face in recent years, and if your organization’s plans to respond to those threats haven’t changed with them you may be wondering how to get started. From ransomware to […]
Canaries in a Coal Mine
By Jolley | Hadaway - Last updated: Tuesday, June 6, 2017
Recognizing early signs of trouble can save you from big issues later. A Jolley|Hadaway Article Maybe you’ve already seen some of the signs yourself. Your mouse cursor may move on its own, when you’re not touching it. Or you get notifications for a delivery, but the address isn’t yours. Those are some dead canaries: signs […]
When is a Firewall Not Enough?
By Jolley | Hadaway - Last updated: Wednesday, May 31, 2017
Many new firewalls come with Intrusion Prevention Systems, but can’t replace the services of a MSSP. A Jolley | Hadaway Article Many Clients ask a great question related to network monitoring. The question goes like this: Firewalls now come with various services including Intrusion Prevention Systems, (IPS). Why pay a firm like infotex to provide […]
Ransomware: Should You Pay or Should You Go?
By Jolley | Hadaway - Last updated: Wednesday, May 3, 2017
When it comes to paying a ransomware demand, there’s no one-size-fits-all policy…
Digital Security Standard Compliance: Is It Enough?
By Jolley | Hadaway - Last updated: Friday, February 24, 2017
While the credit card industry-backed program has good aspects, it should not replace the SOC-2. With the number of different security standards–and ways to test those standards–out there, it can be difficult to stay on top of just what is required, compliance wise, for a specific situation. Case in point, we recently had a client with […]
The TSP: An Important Consideration
By Jolley | Hadaway - Last updated: Thursday, December 22, 2016
Something to look at when choosing your next service provider. . . A short Jolley | Hadaway article In our due diligence packet prospects and clients eventful tax will discover that we are proud to be part of a program that is called the FFIEC’s Technology Service Providers (TSP) examination program. In 2009 infotex volunteered […]
Voice assistants can be helpful, but their “always on” functionality can leave you vulnerable… A Jolley | Hadaway Short. By this point if you’re like us, you’re probably already a little tired of voice assistants like Siri being integrated into seemingly every new device–it sometimes feels as if we are going to get these “helpful” […]
If you’re in charge of reviewing insurance from an IT perspective, here are three helpful hints… A Jolley | Hadaway Short. Tell your critical vendors you want to have an “endorsement” on their cyber insurance policies. Note: this does not put you ahead of anybody in the “lawsuit line,” That is a myth. But what […]
Understanding Patch Management
By Jolley | Hadaway - Last updated: Wednesday, January 10, 2018
It’s like a recall on your car… A Jolley | Hadaway Article. If you like to stay current on technology news, you’ve probably found it hard to ignore the recent stories about a major security problem with Intel processors, and the rush from software and hardware companies to mitigate the issue. Most of the solutions […]
Cybersanity in the Incident Response Age
By Jolley | Hadaway - Last updated: Friday, November 3, 2017
Infotex is finally ready to say something about the Equifax Breach, the Ultimate Educational Moment. This Jolley | Hadaway article will explain why we’ve been silent, ’til now!
What’s New in Incident Response
By Jolley | Hadaway - Last updated: Tuesday, July 11, 2017
As threats evolve, so must your plans to respond to them… A Jolley|Hadaway Article. There have been a number of changes to the threat landscape organizations face in recent years, and if your organization’s plans to respond to those threats haven’t changed with them you may be wondering how to get started. From ransomware to […]
Canaries in a Coal Mine
By Jolley | Hadaway - Last updated: Tuesday, June 6, 2017
Recognizing early signs of trouble can save you from big issues later. A Jolley|Hadaway Article Maybe you’ve already seen some of the signs yourself. Your mouse cursor may move on its own, when you’re not touching it. Or you get notifications for a delivery, but the address isn’t yours. Those are some dead canaries: signs […]
When is a Firewall Not Enough?
By Jolley | Hadaway - Last updated: Wednesday, May 31, 2017
Many new firewalls come with Intrusion Prevention Systems, but can’t replace the services of a MSSP. A Jolley | Hadaway Article Many Clients ask a great question related to network monitoring. The question goes like this: Firewalls now come with various services including Intrusion Prevention Systems, (IPS). Why pay a firm like infotex to provide […]
Ransomware: Should You Pay or Should You Go?
By Jolley | Hadaway - Last updated: Wednesday, May 3, 2017
When it comes to paying a ransomware demand, there’s no one-size-fits-all policy…
Digital Security Standard Compliance: Is It Enough?
By Jolley | Hadaway - Last updated: Friday, February 24, 2017
While the credit card industry-backed program has good aspects, it should not replace the SOC-2. With the number of different security standards–and ways to test those standards–out there, it can be difficult to stay on top of just what is required, compliance wise, for a specific situation. Case in point, we recently had a client with […]
The TSP: An Important Consideration
By Jolley | Hadaway - Last updated: Thursday, December 22, 2016
Something to look at when choosing your next service provider. . . A short Jolley | Hadaway article In our due diligence packet prospects and clients eventful tax will discover that we are proud to be part of a program that is called the FFIEC’s Technology Service Providers (TSP) examination program. In 2009 infotex volunteered […]
It’s like a recall on your car… A Jolley | Hadaway Article. If you like to stay current on technology news, you’ve probably found it hard to ignore the recent stories about a major security problem with Intel processors, and the rush from software and hardware companies to mitigate the issue. Most of the solutions […]
Infotex is finally ready to say something about the Equifax Breach, the Ultimate Educational Moment. This Jolley | Hadaway article will explain why we’ve been silent, ’til now!
What’s New in Incident Response
By Jolley | Hadaway - Last updated: Tuesday, July 11, 2017
As threats evolve, so must your plans to respond to them… A Jolley|Hadaway Article. There have been a number of changes to the threat landscape organizations face in recent years, and if your organization’s plans to respond to those threats haven’t changed with them you may be wondering how to get started. From ransomware to […]
Canaries in a Coal Mine
By Jolley | Hadaway - Last updated: Tuesday, June 6, 2017
Recognizing early signs of trouble can save you from big issues later. A Jolley|Hadaway Article Maybe you’ve already seen some of the signs yourself. Your mouse cursor may move on its own, when you’re not touching it. Or you get notifications for a delivery, but the address isn’t yours. Those are some dead canaries: signs […]
When is a Firewall Not Enough?
By Jolley | Hadaway - Last updated: Wednesday, May 31, 2017
Many new firewalls come with Intrusion Prevention Systems, but can’t replace the services of a MSSP. A Jolley | Hadaway Article Many Clients ask a great question related to network monitoring. The question goes like this: Firewalls now come with various services including Intrusion Prevention Systems, (IPS). Why pay a firm like infotex to provide […]
Ransomware: Should You Pay or Should You Go?
By Jolley | Hadaway - Last updated: Wednesday, May 3, 2017
When it comes to paying a ransomware demand, there’s no one-size-fits-all policy…
Digital Security Standard Compliance: Is It Enough?
By Jolley | Hadaway - Last updated: Friday, February 24, 2017
While the credit card industry-backed program has good aspects, it should not replace the SOC-2. With the number of different security standards–and ways to test those standards–out there, it can be difficult to stay on top of just what is required, compliance wise, for a specific situation. Case in point, we recently had a client with […]
The TSP: An Important Consideration
By Jolley | Hadaway - Last updated: Thursday, December 22, 2016
Something to look at when choosing your next service provider. . . A short Jolley | Hadaway article In our due diligence packet prospects and clients eventful tax will discover that we are proud to be part of a program that is called the FFIEC’s Technology Service Providers (TSP) examination program. In 2009 infotex volunteered […]
As threats evolve, so must your plans to respond to them… A Jolley|Hadaway Article. There have been a number of changes to the threat landscape organizations face in recent years, and if your organization’s plans to respond to those threats haven’t changed with them you may be wondering how to get started. From ransomware to […]
Recognizing early signs of trouble can save you from big issues later. A Jolley|Hadaway Article Maybe you’ve already seen some of the signs yourself. Your mouse cursor may move on its own, when you’re not touching it. Or you get notifications for a delivery, but the address isn’t yours. Those are some dead canaries: signs […]
When is a Firewall Not Enough?
By Jolley | Hadaway - Last updated: Wednesday, May 31, 2017
Many new firewalls come with Intrusion Prevention Systems, but can’t replace the services of a MSSP. A Jolley | Hadaway Article Many Clients ask a great question related to network monitoring. The question goes like this: Firewalls now come with various services including Intrusion Prevention Systems, (IPS). Why pay a firm like infotex to provide […]
Ransomware: Should You Pay or Should You Go?
By Jolley | Hadaway - Last updated: Wednesday, May 3, 2017
When it comes to paying a ransomware demand, there’s no one-size-fits-all policy…
Digital Security Standard Compliance: Is It Enough?
By Jolley | Hadaway - Last updated: Friday, February 24, 2017
While the credit card industry-backed program has good aspects, it should not replace the SOC-2. With the number of different security standards–and ways to test those standards–out there, it can be difficult to stay on top of just what is required, compliance wise, for a specific situation. Case in point, we recently had a client with […]
The TSP: An Important Consideration
By Jolley | Hadaway - Last updated: Thursday, December 22, 2016
Something to look at when choosing your next service provider. . . A short Jolley | Hadaway article In our due diligence packet prospects and clients eventful tax will discover that we are proud to be part of a program that is called the FFIEC’s Technology Service Providers (TSP) examination program. In 2009 infotex volunteered […]
Many new firewalls come with Intrusion Prevention Systems, but can’t replace the services of a MSSP. A Jolley | Hadaway Article Many Clients ask a great question related to network monitoring. The question goes like this: Firewalls now come with various services including Intrusion Prevention Systems, (IPS). Why pay a firm like infotex to provide […]
When it comes to paying a ransomware demand, there’s no one-size-fits-all policy…
Digital Security Standard Compliance: Is It Enough?
By Jolley | Hadaway - Last updated: Friday, February 24, 2017
While the credit card industry-backed program has good aspects, it should not replace the SOC-2. With the number of different security standards–and ways to test those standards–out there, it can be difficult to stay on top of just what is required, compliance wise, for a specific situation. Case in point, we recently had a client with […]
The TSP: An Important Consideration
By Jolley | Hadaway - Last updated: Thursday, December 22, 2016
Something to look at when choosing your next service provider. . . A short Jolley | Hadaway article In our due diligence packet prospects and clients eventful tax will discover that we are proud to be part of a program that is called the FFIEC’s Technology Service Providers (TSP) examination program. In 2009 infotex volunteered […]
While the credit card industry-backed program has good aspects, it should not replace the SOC-2. With the number of different security standards–and ways to test those standards–out there, it can be difficult to stay on top of just what is required, compliance wise, for a specific situation. Case in point, we recently had a client with […]
Something to look at when choosing your next service provider. . . A short Jolley | Hadaway article In our due diligence packet prospects and clients eventful tax will discover that we are proud to be part of a program that is called the FFIEC’s Technology Service Providers (TSP) examination program. In 2009 infotex volunteered […]