About Us | Contact Us
View Cart
Archive for 'Asset Management' Category

WPA2 Vulnerable To Attack

By Vigilize - Last updated: Friday, November 10, 2017

While Many Devices Have Already Been Patched, Many More May Never Be… An article review. When does exploit news cross the line into being a trend? How about when it impacts essentially every single wi-fi enabled device? That’s the takeaway from the recently announced vulnerability in the WPA2 wireless security standard, detailed in this TechCrunch […]


Cybersanity in the Incident Response Age

By Jolley | Hadaway - Last updated: Friday, November 3, 2017

Infotex is finally ready to say something about the Equifax Breach, the Ultimate Educational Moment. This Jolley | Hadaway article will explain why we’ve been silent, ’til now!


Small Business Resource Page

By Dan Hadaway - Last updated: Friday, August 25, 2017

Dan has whittled all the noise to five resources a Small Business Owner should investigate (and utilize).


Recently Discovered Mac Malware Has Long History

By Vigilize - Last updated: Friday, August 11, 2017

Researchers found evidence in the code that the exploit may have been in use for decades. An article review It’s a common belief that viruses and other types of malware don’t affect Apple products, but unfortunately, that isn’t always the case. A good example of this was brought to us by our friend Wes Pollard […]


Lack of Updates Cause Endpoint Security Concerns

By Vigilize - Last updated: Tuesday, June 20, 2017

Smartphones and tablets may receive infrequent updates and can be difficult to manage. An article review. Your desktop receives new virus definitions and other updates on what seems like an hourly basis, but when was the last time your smartphone received an OS update? Duo Security released their 2017 Trusted Access Report recently, and it […]


Legal Notice

By Vigilize - Last updated: Wednesday, February 22, 2017

Legal notices for the infotex domain.


The Thing About Speed Bumps

By Dan Hadaway - Last updated: Saturday, September 12, 2015

. . . they’re not required . . . But they do have a place! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . There is a myth out there that speed bumps are required for all weblinking relationships.  This is simply not true.  They are […]


Getting Started on Cybersecurity

By Dan Hadaway - Last updated: Thursday, July 9, 2015

Process Flow for Institutions . . . and why Dan loves the Cybersecurity Assessment Tool! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Real quick:  What should you do to get started on understanding the new Cybersecurity Assessment Tool (and its impact on future […]


10% of Android Apps Contain Malicious Code

By Dan Hadaway - Last updated: Monday, June 29, 2015

One more reason to stick with Apple? And I had just sworn off my iPhone! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Ever since I made fun of a friend for bending his iPhone 6, people have been asking me when I’m going […]


Cloud Priorities 2015

By Dan Hadaway - Last updated: Wednesday, April 8, 2015

A good question . . . But my answer might not be broad enough! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . The Cloud Computing Association (CCA) is “reaching out” to persons asking their “Top Three Cloud Priorities.”  I found that interesting.  The e-mail, which […]