About Us | Contact Us
View Cart
Archive for 'Compliance' Category

Microsoft Discontinues Support For SHA-1

By Vigilize - Last updated: Monday, March 4, 2019

Known to be vulnerable since 2005, the algorithm will be phased out over the next several months… An article review. Things can move slowly in the world of cryptography, and for evidence of that one needs to look no further than SHA-1–the hash algorithm introduced in 1995, found to be vulnerable to attack in 2005 […]


Incident Response Boilerplate Update

By Adam Reynolds - Last updated: Monday, October 15, 2018

We have recently made a significant change to our Incident Response Policy regarding Disclosure Incidents. At infotex we are always revising and updating our boilerplates. We have recently made a significant change to our Incident Response Policy regarding Disclosure Incidents. It is of course very important to comply with all applicable laws and regulations, but […]


New Metrics for a New Round of SOC Reviews

By Matt Jolley - Last updated: Monday, October 1, 2018

Just in time for the next round of SOC reviews, we’ve reviewed and updated our metrics… Well it’s that time of year again: the days are growing shorter, the leaves are changing color and your compliance officer is gathering up SOC reports for this year’s round of reviews! Here at infotex we’ve long maintained a […]


Succession Planning Governance

By Adam Reynolds - Last updated: Monday, August 27, 2018

What the FFIEC has to say about succession planning for members of the IT Governance process… We have been hearing about examination findings requiring Clients to create a succession plan for key members of the IT Governance process.  Dan asked me to update our research on this issue and, as a byproduct, I have produced […]


Unless You Are Based in Europe

By Dan Hadaway - Last updated: Sunday, May 27, 2018

Some businesses are attempting to capitalize on confusion over just who the GDPR applies to… Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Several Clients have emailed a question to me this week (one even picked up that thing called a telephone, and called […]


OBL Technology Conference 2019

By Vigilize - Last updated: Wednesday, April 11, 2018

Free Tools For OBL Technology Conference Attendees Thank you for watching our talk at the 2019 OBL Technology Conference. We hope you find these free tools useful in taking your Technology Risk Monitoring processes to the next level. Please click here to download a .zip file containing our free technology risk monitoring tools!  


Firewall Log Retention: Beyond The Guidance

By Dan Hadaway - Last updated: Monday, March 26, 2018

In the absence of specific guidance, organizations are left to use their judgement in retaining logs… Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Not long ago a Client asked for my input on their firewall log policy, as they were collecting logs but […]


The Top 3 Articles of 2018

By Sofia Tafoya - Last updated: Monday, December 18, 2017

The Top 3 Articles of 2018 2018 has now come to an end, but what a year it was for articles on the infotex blog! Not only did the “infotex writing team” published twenty-two article reviews, (thanks in large part to our Clients for sending them to us), but we also published ten Dan’s New […]


FERPA Does Not Require…*

By Vigilize - Last updated: Monday, December 18, 2017

Notification is not explicitly required following a breach, but… Recently we published a short piece on the Family Educational Rights and Privacy Act (FERPA) and how it factors in to your incident response program. While we were working on that piece, though, we came across something we thought was odd: notification isn’t explicitly required by […]


Imagine Having Your Audit Reports Published For All The World To See…

By Vigilize - Last updated: Friday, October 20, 2017

Following multiple security incidents, the FDIC has made their audit reports available to the public. An article review. Here in the private sector, we can sometimes take for granted the confidentiality agreements that restrict access to our audit reports and other compliance related information–but what if they were available to any interested parties? That’s exactly […]