Archive for 'Services' Category
Our Blog Policy
While we’re not a news service, we often use current events to comment on trends and our services. This blog is intended to get people thinking about topics and trends in Technology Risk Management, through our article reviews, as well as through original blog articles about current events and our MSSP services (such as our […]
infotex SIEM Data Flow Movie
In this short video, Mike, our “Envoy from the SIEM”, walks us through how data flows through the current infotex SIEM.
Incident Response Testing – What to Expect
A short. This presentation is intended for those who are planning to participate in an infotex incident response test. Please let us know what questions you have, when we have our Plan Walkthrough and Test Plan Approval meeting!
Our Blog Policy
While we’re not a news service, we often use current events to comment on trends and our services. This blog is intended to get people thinking about topics and trends in Technology Risk Management, through our article reviews, as well as through original blog articles about current events and our MSSP services (such as our […]
Can We Trust Our Technology?
A new exploit involving Apple’s FaceTime is a reminder that our gadgets can be turned against us… An article review. Our regular readers know that we usually try to avoid reporting on current events, but this latest exploit really caught our attention! In short, it is possible to activate the microphone or camera on an […]
Object Access Limitations
Object Access Limitations. . . While offering some visibility, there are limitations to object access monitoring. If your organization has to comply with industry regulations such as GLBA, HIPAA, or Sarbanes Oxley, you know that maintaining data security and privacy are important, and one of the ways you can accomplish that is with object access […]
When is a Firewall Not Enough?
Many new firewalls come with Intrusion Prevention Systems, but can’t replace the services of a MSSP. A Jolley | Hadaway Article Many Clients ask a great question related to network monitoring. The question goes like this: Firewalls now come with various services including Intrusion Prevention Systems, (IPS). Why pay a firm like infotex to provide […]
By The Way
We’ve got a birthday coming up . . . and part of the Wave is Gratitude! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . BY THE WAY It is occurring to us that coming up on July 24th, 2015, we will be celebrating our 15th […]
Malware Alerts Cost Companies Big
An article review. Not If You Use Us… A newly released study highlights the rising costs associated with preventing and responding to malware threats. The study was based on a survey of “630 IT and IT security practitioners in the U.S. who are familiar with their organization’s practices for containing malware infections.” The study is […]
VendorBlog
And now let’s pause to reflect upon vendor risk . . . . “20% of our vendors have malware infections” A recent study reminds us to recognize that even if anti-malware is the least of our worries, that doesn’t mean our partners or customers are controlling it. With almost 20% of your customers’ computers infected with malware, according […]