Voice assistants can be helpful, but their “always on” functionality can leave you vulnerable… A Jolley | Hadaway Short. By this point if you’re like us, you’re probably already a little tired of voice assistants like Siri being integrated into seemingly every new device–it sometimes feels as if we are going to get these “helpful” […]
If you’re in charge of reviewing insurance from an IT perspective, here are three helpful hints… A Jolley | Hadaway Short. Tell your critical vendors you want to have an “endorsement” on their cyber insurance policies. Note: this does not put you ahead of anybody in the “lawsuit line,” That is a myth. But what […]
It’s like a recall on your car… A Jolley | Hadaway Article. If you like to stay current on technology news, you’ve probably found it hard to ignore the recent stories about a major security problem with Intel processors, and the rush from software and hardware companies to mitigate the issue. Most of the solutions […]
Infotex is finally ready to say something about the Equifax Breach, the Ultimate Educational Moment. This Jolley | Hadaway article will explain why we’ve been silent, ’til now!
As threats evolve, so must your plans to respond to them… A Jolley|Hadaway Article. There have been a number of changes to the threat landscape organizations face in recent years, and if your organization’s plans to respond to those threats haven’t changed with them you may be wondering how to get started. From ransomware to […]
Recognizing early signs of trouble can save you from big issues later. A Jolley|Hadaway Article Maybe you’ve already seen some of the signs yourself. Your mouse cursor may move on its own, when you’re not touching it. Or you get notifications for a delivery, but the address isn’t yours. Those are some dead canaries: signs […]
Many new firewalls come with Intrusion Prevention Systems, but can’t replace the services of a MSSP. A Jolley | Hadaway Article Many Clients ask a great question related to network monitoring. The question goes like this: Firewalls now come with various services including Intrusion Prevention Systems, (IPS). Why pay a firm like infotex to provide […]
When it comes to paying a ransomware demand, there’s no one-size-fits-all policy…
While the credit card industry-backed program has good aspects, it should not replace the SOC-2. With the number of different security standards–and ways to test those standards–out there, it can be difficult to stay on top of just what is required, compliance wise, for a specific situation. Case in point, we recently had a client with […]
Better think twice . . . or spring for the enterprise edition . . . before you use Windows Hello as a “stronger” authentication method.