About Us | Contact Us
View Cart
Archive for 'Asset Management' Category

Autopsy of the SolarWinds Hack Update

By Tanvee Dhir - Last updated: Monday, February 22, 2021

 A Timeline Update as of 02/22/21 An update to our Newest Employee’s FIRST Technical Article Another interim post-mortem review . . . . A Note About Updates: We have decided to leave the original article as it was originally posted and to update this post with any changes that have been made. You can see […]


Autopsy of the SolarWinds Hack

By Tanvee Dhir - Last updated: Monday, February 1, 2021

A Timeline as of 01/24/2021 Our Newest Employee’s FIRST Technical Article Another interim post-mortem review . . . . A Note About Updates: We are leaving this article as is, but for any updates to the timeline, check the Autopsy of the SolarWinds Hack Timeline Update article!      – Vigilize Introduction: As the managing […]


SolarWinds Incident

By Vigilize - Last updated: Tuesday, December 15, 2020

infotex does not use SolarWinds… We are protecting our Clients! Another blog post meant to inspire thought about IT Governance . . . . To all infotex managed security service Clients: As recently reported by major news outlets there is currently an ongoing attack on SolarWinds Orion network monitoring software builds released between March and June […]


Zoom Security: No longer an Oxymoron

By Reynolds | Hadaway - Last updated: Tuesday, July 14, 2020

Lessons Learned from Zoom’s Rise… The only constant is change. An illustration of impermanence in information security. Zoom’s popularity is in a large part thanks to its ease of use and low cost. How can you go wrong with an application that is popular, cost effective, and easy to use? Good question, easy answer: security. […]


Security in a Cloud Computing Environment

By Adam Reynolds - Last updated: Tuesday, June 16, 2020

An Update to the FFIEC Outsourced Cloud Computing Document In April 2020, the FFIEC released their “Joint Statement on Risk Management for Cloud Computing Services” as an update to their 2012 statement “Outsourced Cloud Computing.” The 2012 statement was a short, four-page document that addressed the key elements of outsourced cloud computing as identified in […]


The Threat From Within

By Vigilize - Last updated: Monday, March 2, 2020

One of the biggest data security threats you face comes from inside… An article review. We spend a lot of time thinking about the threats to our network posed by hackers: from ransomware and phishing scams to data breaches, we often view the culprit as being some unknown person or organization… someone possibly not even […]


Printers Remain a Significant Network Threat

By Vigilize - Last updated: Monday, August 26, 2019

Nearly 50 vulnerabilities were found in printers from the top six brands… An article review. You’re aware of phishing scams, you don’t open e-mail attachments you weren’t expecting to receive, your virus definitions are updated regularly and you don’t connect to unsecured wifi networks…but when was the last time you thought about your printer? A […]


Many School Districts Are Still Vulnerable To WannaCry

By Vigilize - Last updated: Tuesday, May 28, 2019

Years after patches were released, many systems remain vulnerable… An article review. While it has been over two years since the WannaCry exploit was publicly announced, a new report submitted by our own Sean Waugh says that hundreds of thousands of internet-connected machines are still vulnerable…and many of those machines belong to government agencies and […]


Asus Malware Highlights The Risk of Supply Chain Attacks

By Vigilize - Last updated: Monday, April 8, 2019

The malware was distributed through Asus’ own tool, and was signed with a valid certificate… An article review. When it comes to avoiding malware and other internet attacks, most users know you should avoid downloading files from unknown sources—but a recent attack targeting Asus customers is a reminder that sometimes even that may not be […]


Bitlocker Attack Puts Data At Risk

By Vigilize - Last updated: Monday, April 1, 2019

A simple $30 part and publicly available code allowed access to keys… An article review. Researchers recently announced a new successful attack against Bitlocker, a full-disk encryption tool that has built into Windows since Vista, and the attack is surprisingly simple in its execution. The attack, detailed in an article submitted to us by our […]