About Us | Contact Us
View Cart
Archive for 'Vendor Management' Category

Google Nest Highlights IoT Risk

By Vigilize - Last updated: Monday, May 13, 2019

Product longevity and data privacy have been called into question… An article review. When Google announced it was absorbing smart thermostat maker Nest in 2018, many customers were concerned about the future of their internet-connected devices and the privacy of their data. Those fears were realized during Google’s I/O 2019 event, where several changes to […]


Fiserv Sued Over Alleged Security Lapses

By Vigilize - Last updated: Monday, May 6, 2019

The nation’s largest core processor has been accused of multiple security lapses… An article review. For smaller banks and credit unions the resources needed to create and maintain their own online banking presence can be daunting. Even after the website is running and customers have a smartphone application they can use, maintaining those platforms and […]


T7: The Trend of Trends 2019

By Vigilize - Last updated: Monday, February 11, 2019

The seven best trend articles in 2019 . . . For ISOs of small financial institutions. While it may not feel like it yet for some of us, we’re well on our way into 2019, and that means it’s time for the last of our annual articles looking at predictions and trends in information technology. Previously, […]


R-7 – The Top Seven Risks – 2019

By Dan Hadaway - Last updated: Monday, January 7, 2019

Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . When Dan presents audit reports to boards of directors, he also talks to the board about the top risks the institution is facing. Since 2006, Dan has been compiling a list of the “top seven risks […]


Temporary Passwords: A Potential Weak Link

By Vigilize - Last updated: Monday, April 16, 2018

Some small organizations continue to use customer data to generate initial passwords, despite the risks. An article review. When rolling out a new online banking platform organizations are often faced with the task of issuing new usernames and passwords to existing users, but how they choose to do that can have a big impact on […]


Cybersanity in the Incident Response Age

By Jolley | Hadaway - Last updated: Friday, November 3, 2017

Infotex is finally ready to say something about the Equifax Breach, the Ultimate Educational Moment. This Jolley | Hadaway article will explain why we’ve been silent, ’til now!


Small Business Resource Page

By Dan Hadaway - Last updated: Friday, August 25, 2017

Dan has whittled all the noise to five resources a Small Business Owner should investigate (and utilize).


The SSAE-18 Excerpt

By Sofia Tafoya - Last updated: Wednesday, August 23, 2017

Canaries in a Coal Mine

By Jolley | Hadaway - Last updated: Tuesday, June 6, 2017

Recognizing early signs of trouble can save you from big issues later. A Jolley|Hadaway Article Maybe you’ve already seen some of the signs yourself. Your mouse cursor may move on its own, when you’re not touching it. Or you get notifications for a delivery, but the address isn’t yours. Those are some dead canaries: signs […]


Four and Four – Questions to Simplify Vendor Management

By Dan Hadaway - Last updated: Thursday, April 6, 2017

Two sets of questions that can help start your vendor due diligence adventure. A quick Dan’s New Leaf Post, meant to inspire thought about IT Governance . . . . When you’re just starting to address the issue of vendor management, it can seem like a daunting task.  And how do you explain to your vendor […]