. . . a new name for a long-standing service.
The latest edition of Executive Vice President, Michael Hartke’s article series!
Two of Dan’s articles, What’s in a Name and Interagency Wisdom, have pointed out something that we fight with here at infotex.
We are re...
An option for increasing security for ALL organizations. . .
The threat landscape is evolving daily, and it is becoming increasingly difficult for even large organizations providing cyber defense services to keep up. As Brandao (2021) notes, it is important for organiza...
Threats are changing, EDR can help us adapt . . .
Today’s advanced persistent threat (APT) understands that the IT landscape has changed. In the post-COVID age, more and more organizations have adopted some form of work from home. While WFH offers many convenience...
Not just because it is becoming an issue of compliance. . .
We all know the plot of your typical heist movie – a group of robbers seeks out special bits of information, such as PIN numbers, keycards, FOBs, and even biometrics, all to relentlessly gain entry to a s...
infotex does not use Kaseya…
We are protecting our Clients!
Another blog post meant to inspire thought about IT Governance . . . .
To all infotex managed security service Clients:
As you may be aware there was a large ransomware attack recently that leveraged a r...
Implementing Protective DNS could help your organization avoid attack…
An article review.
Noting the risks still associated with the Domain Name System (DNS), the National Security Agency and the Cybersecurity and Infrastructure Security Agency (CISA) have recent...
A Timeline Update as of 02/22/21
An update to our Newest Employee’s FIRST Technical Article
Another interim post-mortem review . . . .
A Note About Updates:
We have decided to leave the original article as it was originally posted and to update this post with any...
A Timeline as of 01/24/2021
Our Newest Employee’s FIRST Technical Article
Another interim post-mortem review . . . .
A Note About Updates:
We are leaving this article as is, but for any updates to the timeline, check the Autopsy of the SolarWinds Hack Timeline U...
An Assist for Your Incident Response Team . . .
To be Used for Incidents!
Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . .
I want to circle back around to an article written by Matt Jolley CISA, our resident researc...
These tools will help you assess and improve your cybersecurity preparedness…
An article review.
If you’re a regular reader of our blog, you know that we think cybersecurity training and the tools that go along with it are vitally important to any organization th...