About Us | Contact Us
View Cart
Archive for 'infotex team' Category

Reminder: Siri Risk!

By Jolley | Hadaway - Last updated: Sunday, June 17, 2018

Voice assistants can be helpful, but their “always on” functionality can leave you vulnerable… A Jolley | Hadaway Short. By this point if you’re like us, you’re probably already a little tired of voice assistants like Siri being integrated into seemingly every new device–it sometimes feels as if we are going to get these “helpful” […]


Unless You Are Based in Europe

By Dan Hadaway - Last updated: Sunday, May 27, 2018

Some businesses are attempting to capitalize on confusion over just who the GDPR applies to… Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Several Clients have emailed a question to me this week (one even picked up that thing called a telephone, and called […]


Risk Versus Severity When In A Panic

By Dan Hadaway - Last updated: Monday, April 9, 2018

Risk isn’t the only thing to consider when planning a decision tree. Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . During tuning, we’re sometimes asked, as we help our MSSP Clients establish a detailed decision tree (modify our default to their own situation), “are […]


Our Blog Policy

By Vigilize - Last updated: Monday, April 2, 2018

While we’re not a news service, we often use current events to comment on trends and our services. This blog is intended to get people thinking about topics and trends in Technology Risk Management, through our article reviews, as well as through original blog articles about current events and our MSSP services (such as our […]


Firewall Log Retention: Beyond The Guidance

By Dan Hadaway - Last updated: Monday, March 26, 2018

In the absence of specific guidance, organizations are left to use their judgement in retaining logs… Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Not long ago a Client asked for my input on their firewall log policy, as they were collecting logs but […]


Merchandising as an Information Security Concept

By Dan Hadaway - Last updated: Monday, March 19, 2018

Haven’t rotated your posters in a while? Your customers may not be seeing them anymore. Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . One of the things I recently realized: some bankers I interact with do not have the same  understanding of merchandising that I […]


Our Compliance with #4040

By Dan Hadaway - Last updated: Monday, February 26, 2018

Dan’s decided to declare “in compliance” on a CAT Statement, and wants your opinion! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . How would you like to experience a little excerpt from an infotex risk assessment?  (Yes, we had to run this by our […]


Three Things About Insurance That Will Save You Time

By Jolley | Hadaway - Last updated: Monday, February 5, 2018

If you’re in charge of reviewing insurance from an IT perspective, here are three helpful hints… A Jolley | Hadaway Short. Tell your critical vendors you want to have an “endorsement” on  their cyber insurance policies.  Note:  this does not put you ahead of anybody in the “lawsuit line,”  That is a myth.  But what […]


The Difference Between Patch and Vulnerability Management

By Vigilize - Last updated: Thursday, January 18, 2018

The first in our guest author series, this article by Eric Kroeger and Jason Mikolanis explains the difference between patch and vulnerability management.


Understanding Patch Management

By Jolley | Hadaway - Last updated: Wednesday, January 10, 2018

It’s like a recall on your car… A Jolley | Hadaway Article. If you like to stay current on technology news, you’ve probably found it hard to ignore the recent stories about a major security problem with Intel processors, and the rush from software and hardware companies to mitigate the issue.  Most of the solutions […]