About Us | Contact Us
View Cart
Archive for 'Management Awareness' Category

Can We Trust Our Technology?

By Vigilize - Last updated: Monday, February 4, 2019

A new exploit involving Apple’s FaceTime is a reminder that our gadgets can be turned against us… An article review. Our regular readers know that we usually try to avoid reporting on current events, but this latest exploit really caught our attention! In short, it is possible to activate the microphone or camera on an […]


“Reply-All” Email Incident Hits Microsoft

By Vigilize - Last updated: Monday, January 28, 2019

At its peak over 11,500 employees were ensnared in the email chain… An article review. When it comes to email awareness we usually focus on threats coming into our mailboxes from the outside world, like phishing scams. A recent incident at Microsoft, however, serves as a reminder that there’s more than phishing to be aware […]


R-7 – The Top Seven Risks – 2019

By Dan Hadaway - Last updated: Monday, January 7, 2019

Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . When Dan presents audit reports to boards of directors, he also talks to the board about the top risks the institution is facing. Since 2006, Dan has been compiling a list of the “top seven risks […]


P-7 The Top Seven Awareness Posters 2018

By Vigilize - Last updated: Monday, December 10, 2018

Some of them about passwords . . . By view count, here are the top seven posters as of 12/10/2018!Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Given what a hit the posters we did during the year were, we decided to run some reports to […]


Legacy Devices Pose A Security Risk

By Vigilize - Last updated: Monday, November 19, 2018

Devices like fax machines and copiers are often classified as office supplies and slip past IT scrutiny… An article review. Despite all the advances in technology, most offices still generate large volumes of printed documents, and the devices used to produce and process those documents could expose you to more risk than you’d think. A […]


FTC Releases New Cybersecurity Guide

By Vigilize - Last updated: Monday, November 5, 2018

Focused on small businesses, the guide covers twelve topics you need to know to be secure… An article review. While there are many resources concerning cybersecurity out there, it can sometimes be difficult to find information tailored for smaller organizations instead of consumers or large enterprises. Luckily the FTC realizes that the bad guys aren’t […]


Incident Response Boilerplate Update

By Adam Reynolds - Last updated: Monday, October 15, 2018

We have recently made a significant change to our Incident Response Policy regarding Disclosure Incidents. At infotex we are always revising and updating our boilerplates. We have recently made a significant change to our Incident Response Policy regarding Disclosure Incidents. It is of course very important to comply with all applicable laws and regulations, but […]


National Cybersecurity Awareness Month Themes Announced

By Vigilize - Last updated: Monday, September 3, 2018

Weekly themes for the annual event have been announced… An article review. October is National Cybersecurity Awareness Month, and the weekly themes for this year’s event have been released: Oct. 1­–5: Make Your Home a Haven for Online Safety Oct. 8–12: Millions of Rewarding Jobs: Educating for a Career in Cybersecurity Oct. 15–19: It’s Everyone’s […]


Succession Planning Governance

By Adam Reynolds - Last updated: Monday, August 27, 2018

What the FFIEC has to say about succession planning for members of the IT Governance process… We have been hearing about examination findings requiring Clients to create a succession plan for key members of the IT Governance process.  Dan asked me to update our research on this issue and, as a byproduct, I have produced […]


Alert Fatigue: A Problem With Few Easy Solutions

By Vigilize - Last updated: Sunday, June 3, 2018

Getting a message to the user is one thing, having them see it is another… An article review. In IT we often focus on identifying and communicating risk: to our users, to our superiors and to others in the field. Over the years, we’ve even developed new tools and methods to identify issues and notify […]