Archive for 'Kits' Category
Devices like fax machines and copiers are often classified as office supplies and slip past IT scrutiny… An article review. Despite all the advances in technology, most offices still generate large volumes of printed documents, and the devices used to produce and process those documents could expose you to more risk than you’d think. A […]
Focused on small businesses, the guide covers twelve topics you need to know to be secure… An article review. While there are many resources concerning cybersecurity out there, it can sometimes be difficult to find information tailored for smaller organizations instead of consumers or large enterprises. Luckily the FTC realizes that the bad guys aren’t […]
Even if you haven’t ever used Facebook, your friends and family may have already let them build a profile on you… An article review. For this week’s review we had initially planned on using this interesting piece from Brian Krebs, about the dangers of resold personal information ending up in the cloud (and the dark […]
Consolidating passwords and other account information can save time, but expose you to risk… An article review. Given the amount of account related information that the average person is expected to keep track of–such as account numbers, passwords, PINs and secret questions–it’s no wonder that a convenience like the Fuze Card was such a success […]
Great Resources For User Awareness An article review. We at infotex take great pride in our awareness materials that we make available at posters.infotex.com. But we also wanted you to know that there are many other free poster sites out there, like this site found by our own “Sender of Signs,” Sofia Tafoya! Keep your […]
Dan has whittled all the noise to five resources a Small Business Owner should investigate (and utilize).
Smartphones and tablets may receive infrequent updates and can be difficult to manage. An article review. Your desktop receives new virus definitions and other updates on what seems like an hourly basis, but when was the last time your smartphone received an OS update? Duo Security released their 2017 Trusted Access Report recently, and it […]
The case for customer education . . . The fact is, when two customers walk into your establishment, one is probably being attacked RIGHT NOW! The results of a Microsoft study revealed in this article by Warwick Ashford of Computer Weekly, is very timely, as they come during an ongoing debate about the legal risk exposure versus the […]
Have you checked out the itinerary? Another great lineup of speakers! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Yesterday my Client said summed it up pretty well: “I can’t afford not to go!” On 11/19 and 11/20/2014 Information Security Officers from organizations all […]
Incident Response is a key to IT Governance. A good Incident Response Program will have a high-level policy, and a plan that enforces that policy by establishing goals, priorities, training, and tools.