About Us | Contact Us
View Cart
Archive for 'Controls' Category

Strong Passwords

By Vigilize - Last updated: Monday, February 25, 2013

A quick explanation of what we mean by “strong passwords” meant to be used in security reminders.

Mobile Security White Paper: Non-technical Controls

By Dan Hadaway - Last updated: Tuesday, June 19, 2012

This white paper addresses the risks associated with the relatively new phenomena surrounding the introduction of corporate-owned data on Portable Devices, currently known by buzzwords such as mobile computing, mobile devices, mobile technology, etc.

By Vigilize - Last updated: Saturday, June 9, 2012

IT Governance documentation is both extremely important and extremely difficult to create for IT managers, Information Security Officers, and Compliance Officers alike. infotex has been maturing GLBA and HIPAA templates since before the regulations were law. Our first Acceptable Use Policy was written in 1989. Each time we audit a new client, we learn from […]

Coming Soon: The Branchless Banking Kit!

By Vigilize - Last updated: Thursday, April 12, 2012

It’s hard to believe almost a year ago Infotex set out on the path to create a new “branchless banking kit” which would include all the IT Policy and Procedure templates necessary to address a total re-write of the typical “E-banking Policy.” The decision to do this was accompanied by an article in Dan’s New Leaf entitled “Manifesto: Time to Revolutionize our E-banking Policies.”

Shredding: New and Old Risks

By Dan Hadaway - Last updated: Saturday, December 10, 2011

There is no such thing as Information Security, because controls that work today won’t always work. Why we need to repeat the risk management cycle annually, using the weakening of “shredding” as a control.

OCC Supports National Protect Your Identity Week

By Vigilize - Last updated: Friday, October 14, 2011

The Office of Comptroller of the Currency has joined the public-private coalition that supports the fourth annual Protect Your Identity Week (PYIW), an initiative of the National Foundation for Credit Counseling (NFCC) and the Council of Better Business Bureaus (BBB). The week-long initiative, October 16 – 22, 2011, brings focus to the PYIW national campaign’s Web site and community events aimed at identity theft protection and education.

Effectively Erasing Files

By Vigilize - Last updated: Monday, September 26, 2011

Before selling or discarding an old computer, or throwing away a CD or DVD, you naturally make sure that you’ve copied all of the files you need. You’ve probably also attempted to delete your personal files so that other people aren’t able to access them. However, unless you have taken the proper steps to make sure the hard drive, CD, or DVD is erased, people may still be able to resurrect those files.

Manifesto: Time to Revolutionize our E-banking Policies

By Dan Hadaway - Last updated: Tuesday, May 3, 2011

With the advent of Wireless Banking, don’t you think it’s time to restructure our E-banking policies?

Actions in Response to RSA Cyber Intrusion

By Vigilize - Last updated: Thursday, March 31, 2011

An Information Advisory has been issued by the National Security Agency concerning recommended actions for SecurID users in response to the RSA cyber intrusion.

Data Inventory

By Dan Hadaway - Last updated: Monday, August 30, 2010

Do you know where your data is? went? Where are the boundaries of what you used to call your “network?”   Though not the first priority in developing a sound IT Governance Program, you will eventually need to get around to making an inventory of your data.  This process, if done correctly, usually starts with […]