Security Tools

Third-Party Monitoring and Reporting

. . . a new name for a long-standing service. The latest edition of Executive Vice President, Michael Hartke’s article series! Two of Dan’s articles, What’s in a Name and Interagency Wisdom, have pointed out something that we fight with here at infotex. We are re...

Integrating XDR into your Organization

An option for increasing security for ALL organizations. . . The threat landscape is evolving daily, and it is becoming increasingly difficult for even large organizations providing cyber defense services to keep up. As Brandao (2021) notes, it is important for organiza...

The Changing IT Landscape and Endpoint Detection and Response (EDR)

Threats are changing, EDR can help us adapt . . . Today’s advanced persistent threat (APT) understands that the IT landscape has changed. In the post-COVID age, more and more organizations have adopted some form of work from home.  While WFH offers many convenience...

The Importance of Proper Multi-Factor Authentication (MFA) in 2022

Not just because it is becoming an issue of compliance. . . We all know the plot of your typical heist movie – a group of robbers seeks out special bits of information, such as PIN numbers, keycards, FOBs, and even biometrics, all to relentlessly gain entry to a s...

Kaseya Incident

infotex does not use Kaseya… We are protecting our Clients! Another blog post meant to inspire thought about IT Governance . . . . To all infotex managed security service Clients: As you may be aware there was a large ransomware attack recently that leveraged a r...

NSA and CISA Issue New Guidance on DNS

Implementing Protective DNS could help your organization avoid attack… An article review. Noting the risks still associated with the Domain Name System (DNS), the National Security Agency and the Cybersecurity and Infrastructure Security Agency (CISA) have recent...

Autopsy of the SolarWinds Hack Update

 A Timeline Update as of 02/22/21 An update to our Newest Employee’s FIRST Technical Article Another interim post-mortem review . . . . A Note About Updates: We have decided to leave the original article as it was originally posted and to update this post with any...

Autopsy of the SolarWinds Hack

A Timeline as of 01/24/2021 Our Newest Employee’s FIRST Technical Article Another interim post-mortem review . . . . A Note About Updates: We are leaving this article as is, but for any updates to the timeline, check the Autopsy of the SolarWinds Hack Timeline U...

State Law Inventory

An Assist for Your Incident Response Team . . . To be Used for Incidents! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . I want to circle back around to an article written by Matt Jolley CISA, our resident researc...

FFIEC Emphasizes The Importance of Standardized Cybersecurity Assessments

These tools will help you assess and improve your cybersecurity preparedness… An article review. If you’re a regular reader of our blog, you know that we think cybersecurity training and the tools that go along with it are vitally important to any organization th...