About Us | Contact Us
View Cart
Archive for 'Compliance' Category

Considerations – Why you should choose infotex, Inc. as your next MSOC!
By Vigilize - Last updated: Friday, January 27, 2023

Reasons why we should be considered! infotex provides a number of services that can be checked out if you click over to offerings.infotex.com! We even made a movie with all the reasons why infotex should be your next MSOC!  


Adam Reads: The “Change Management” Guidance Summary
By Bryan Bonnell - Last updated: Monday, November 14, 2022

A new way of helping people “read” new guidance… Look for more in the future! To save you time, we are proud to present “Adam Reads” . . . recorded versions of our Guidance Summaries! Below you can find an embedded player for the audio file. If you are having issues with that working, you […]


What to Expect from an infotex Incident Response Tabletop Test Movie
By Vigilize - Last updated: Monday, October 3, 2022

A Webinar Movie This presentation is intended for those who are planning to participate in an infotex incident response test. Please let us know what questions you have, when we have our Plan Walkthrough and Test Plan Approval meeting!


Data Breach Laws: A State-by-State Framework
By Matt Jolley - Last updated: Monday, September 26, 2022

What you need to know for compliance coast-to-coast. Back in 2020 we posted an article containing links to data breach laws from each state, and it has proven to be one of our more popular posts.  Because laws surrounding the use (and abuse) of technology are always evolving, we thought it was worth taking another […]


The Importance of Pretext Calling
By Adam Reynolds - Last updated: Tuesday, September 13, 2022

It’s all about protecting Customer information . . . In 1999 the Gramm-Leach-Bliley Act (GLBA) directed the Federal Deposit Insurance Corporation (FDIC) and other federal banking agencies to ensure that financial institutions have policies, procedures, and controls in place to prevent the unauthorized disclosure of customer financial information.  The FDIC and other federal banking agencies […]


Adam Reads: “The AIO” Guidance Summary
By Vigilize - Last updated: Thursday, August 4, 2022

A new way of helping people “read” new guidance… Look for more in the future! To save you time, we are proud to present “Adam Reads” . . . recorded versions of our Guidance Summaries! Below you can find an embedded player for the audio file. If you are having issues with that working, you […]


Adam Reads: The “36 Hour Rule” Guidance Summary
By Bryan Bonnell - Last updated: Monday, May 2, 2022

A new way of helping people “read” new guidance… Look for more in the future! To save you time, we are proud to present “Adam Reads” . . . recorded versions of our Guidance Summaries! Below you can find an embedded player for the audio file. If you are having issues with that working, you […]


Cyberattack Reporting Comes To More Businesses
By Vigilize - Last updated: Monday, March 14, 2022

New legislation would require businesses in several new sectors to report cyberattacks within 72 hours… An article review. Following a number of recent high-profile incidents, and as fears of a Russian cyberattack grow, the Senate passed legislation that would require companies in more industries to report cyber incidents to federal regulators.  Among the businesses targeted […]


My Take on the 36 Hour Rule
By Dan Hadaway - Last updated: Wednesday, March 9, 2022

It doesn’t cover us. . . . . . but we’ll agree to it anyway. Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . I thought I’d write a quick DNL about the new 36 hour rule.  It’s due in May, so I am not […]


The Importance of Proper Multi-Factor Authentication (MFA) in 2022
By Steven Jakubin - Last updated: Monday, February 28, 2022

Not just because it is becoming an issue of compliance. . . We all know the plot of your typical heist movie – a group of robbers seeks out special bits of information, such as PIN numbers, keycards, FOBs, and even biometrics, all to relentlessly gain entry to a secured vault. These vaults use several […]


Categories