Think Before You Scan

The Rise of Quishing An Article Review Over the last several years you’ve probably noticed QR Codes popping up more and more: from restaurant menus to gas pumps, those camera-scannable blocks can quickly link you to websites, payment methods, and more. Unfortunately, the bad guys have been noticing this trend as well and have started […]
Security vs. Stability: The Patch Management Conundrum
An age-old problem… An article review. In a perfect world, security patches would be rolled out as soon as they are made available to the public, and those patches would never disrupt an organization’s operations. Unfortunately the latter has been known to happen, and because of that many IT departments are hesitant to apply updates […]
Adam Reads: The “Third Party Risk Management” Guidance Summary

A new way of helping people “read” new guidance… Look for more in the future! To save you time, we are proud to present “Adam Reads” . . . recorded versions of our Guidance Summaries! Below you can find an embedded player for the audio file. If you are having issues with that working, you […]
“Cybersecurity Terms” – Awareness Poster
Another awareness poster for YOUR customers (and users). Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your […]
“Threat Hunting” – Awareness Poster
Another awareness poster for YOUR customers (and users). Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your […]
New Attack Highlights the Importance of Logging
The incident may lead to Microsoft offering more logging options to customers without an additional fee… An article review. While the importance of maintaining and reviewing event logs has been common knowledge for some time, some vendors still require customers to pay additional fees for what they call “premium” logging–however a recent cyber attack may […]
“Report Suspicious Activity” – Awareness Poster
Another awareness poster for YOUR customers (and users). Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your […]
NIST Proposes Changes to Outdated Guidance
An evolving threat landscape means the original 2015 guidance is in need of an update… An Article Review. The National Institute of Standards and Technology (NIST) is considering an update to its 2015 Special Publication 800-171, which contains cybersecurity controls that have been widely adopted across both the public and private sectors. SP 800-171, also […]
Adam Reads: The “Succession Planning” Guidance Summary
A new way of helping people “read” new guidance… Look for more in the future! To save you time, we are proud to present “Adam Reads” . . . recorded versions of our Guidance Summaries! Below you can find an embedded player for the audio file. If you are having issues with that working, you […]
R7: 2023’s Top Seven Technology Risks Video
R7: 2023’s Top Seven Technology Risks Webinar-Video What are the top seven risks your board should know about in 2023? Since 2006, Dan has been compiling a list of the “top seven risks small institutions are facing,” in preparation for his board presentations. This webinar will present the 2023 list in a manner that you […]