Archive for 'Asset Management' Category
The first in our guest author series, this article by Eric Kroeger and Jason Mikolanis explains the difference between patch and vulnerability management.
It’s like a recall on your car… A Jolley | Hadaway Article. If you like to stay current on technology news, you’ve probably found it hard to ignore the recent stories about a major security problem with Intel processors, and the rush from software and hardware companies to mitigate the issue. Most of the solutions […]
While Many Devices Have Already Been Patched, Many More May Never Be… An article review. When does exploit news cross the line into being a trend? How about when it impacts essentially every single wi-fi enabled device? That’s the takeaway from the recently announced vulnerability in the WPA2 wireless security standard, detailed in this TechCrunch […]
Infotex is finally ready to say something about the Equifax Breach, the Ultimate Educational Moment. This Jolley | Hadaway article will explain why we’ve been silent, ’til now!
Dan has whittled all the noise to five resources a Small Business Owner should investigate (and utilize).
Researchers found evidence in the code that the exploit may have been in use for decades. An article review It’s a common belief that viruses and other types of malware don’t affect Apple products, but unfortunately, that isn’t always the case. A good example of this was brought to us by our friend Wes Pollard […]
Smartphones and tablets may receive infrequent updates and can be difficult to manage. An article review. Your desktop receives new virus definitions and other updates on what seems like an hourly basis, but when was the last time your smartphone received an OS update? Duo Security released their 2017 Trusted Access Report recently, and it […]
Legal notices for the infotex domain.
. . . they’re not required . . . But they do have a place! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . There is a myth out there that speed bumps are required for all weblinking relationships. This is simply not true. They are […]
Process Flow for Institutions . . . and why Dan loves the Cybersecurity Assessment Tool! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Real quick: What should you do to get started on understanding the new Cybersecurity Assessment Tool (and its impact on future […]