About Us | Contact Us
View Cart
Archive for 'infotex team' Category

Trust, but Segregate!

By Dan Hadaway - Last updated: Wednesday, October 16, 2019

Show this article to your CFO the next time he or she asks for a budget. Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . It’s time . . . no wait, it’s WAY PAST TIME . . . that community banks spend the money […]


A Seven Step Process to Combat Insider Threats

By Dan Hadaway - Last updated: Monday, September 30, 2019

Incident response testing is the stone that kills many birds… Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Good morning.  It’s 5:00am on a weekend, and I’m preparing my talk for the Cybersecurity Conference this week. While the talk is only supposed to be […]


Four Risk Appetite Statements

By Dan Hadaway - Last updated: Thursday, June 6, 2019

Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . For all the same reasons a board of directors would want to establish a risk appetite statement on loan risk or other major risk categories, the 2015 Cybersecurity Assessment Tool gave us the ability to establish […]


Our Blog Policy

By Vigilize - Last updated: Monday, January 14, 2019

While we’re not a news service, we often use current events to comment on trends and our services. This blog is intended to get people thinking about topics and trends in Technology Risk Management, through our article reviews, as well as through original blog articles about current events and our MSSP services (such as our […]


R-7 – The Top Seven Risks – 2019

By Dan Hadaway - Last updated: Monday, January 7, 2019

Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . When Dan presents audit reports to boards of directors, he also talks to the board about the top risks the institution is facing. Since 2006, Dan has been compiling a list of the “top seven risks […]


P-7 The Top Seven Awareness Posters 2018

By Vigilize - Last updated: Monday, December 10, 2018

Some of them about passwords . . . By view count, here are the top seven posters as of 12/10/2018!Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Given what a hit the posters we did during the year were, we decided to run some reports to […]


The Magnificent Seven 2019

By Dan Hadaway - Last updated: Saturday, November 17, 2018

Seven trends impacting Information Security Officers of Small Institutions! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Welcome to the Magnificent Seven, my annual predictive article, affectionately dubbed “M7,” about the seven trends in bank technology that will impact the Information Security Officers of small banks […]


New Metrics for a New Round of SOC Reviews

By Matt Jolley - Last updated: Monday, October 1, 2018

Just in time for the next round of SOC reviews, we’ve reviewed and updated our metrics… Well it’s that time of year again: the days are growing shorter, the leaves are changing color and your compliance officer is gathering up SOC reports for this year’s round of reviews! Here at infotex we’ve long maintained a […]


The Pine Processionary

By Dan Hadaway - Last updated: Saturday, September 8, 2018

Battling Procedure Fatigue in Cybersecurity . . . Or . . . making sure we don’t just go through the motions! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . When it comes to the routine things in life, it can be easy to get […]


Reminder: Siri Risk!

By Jolley | Hadaway - Last updated: Sunday, June 17, 2018

Voice assistants can be helpful, but their “always on” functionality can leave you vulnerable… A Jolley | Hadaway Short. By this point if you’re like us, you’re probably already a little tired of voice assistants like Siri being integrated into seemingly every new device–it sometimes feels as if we are going to get these “helpful” […]