Access Management

How Well Do You Know Your Endpoints?

Many organizations spend time and money deploying endpoint protection, then think they can forget about it… An article review. Not too long ago when it came to endpoint security it was common practice to simply install an antivirus program, set it to automatically u...

Temporary Passwords: A Potential Weak Link

Some small organizations continue to use customer data to generate initial passwords, despite the risks. An article review. When rolling out a new online banking platform organizations are often faced with the task of issuing new usernames and passwords to existing users,...

Firewall Log Retention: Beyond The Guidance

In the absence of specific guidance, organizations are left to use their judgement in retaining logs… Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Not long ago a Client asked for my input on their firewall lo...

Object Access Limitations

Object Access Limitations. . . While offering some visibility, there are limitations to object access monitoring. If your organization has to comply with industry regulations such as GLBA, HIPAA, or Sarbanes Oxley, you know that maintaining data security and privacy are im...

The Top 3 Articles of 2018

The Top 3 Articles of 2018 2018 has now come to an end, but what a year it was for articles on the infotex blog! Not only did the “infotex writing team” published twenty-two article reviews, (thanks in large part to our Clients for sending them to us), but we a...

Cybersanity in the Incident Response Age

Their unprecedented breach presents an opportunity to learn. A Jolley | Hadaway Article. The recent data breach at Equifax has shocked many of us, even the ones who have become desensitized to the “breach parade,” the regular stream of news regarding major orga...

Forgotten But Not Gone: The Ex-Employee Risk

Failure to deprovision former employees presents a real risk to businesses. An article review. When terminating an employee you probably make sure that they turn in keys, access cards, and any other physical access credentials, but how sure are you that their electronic cr...

Small Business Resource Page

Small Business Technology Risk Management Starting Points Remember, these are merely generic starting points! They may not be all-inclusive for your unique business! The infotex Small Business Technology Risk Assessment A starting point to determine tactics. For a movie on...

Former NIST Official Regrets Issuing Password Guidance

Bill Burr admits security advice actually created more vulnerable passwords. An article review. If you’ve ever angrily questioned some seemingly arbitrary rule when creating a new password, there is some vindication for you: the former government official whose passw...

Nine Years Later, NIST Agrees With Dan!

For the sake of user comfort, new draft document calls for an end to mandatory password changes, and other requirements. An article review. Long-time readers may remember Dan’s Password Manifesto, originally published in the Hoosier Banker Magazine in 2008, where he ...