Archive for 'Services' Category
A new exploit involving Apple’s FaceTime is a reminder that our gadgets can be turned against us… An article review. Our regular readers know that we usually try to avoid reporting on current events, but this latest exploit really caught our attention! In short, it is possible to activate the microphone or camera on an […]
While we’re not a news service, we often use current events to comment on trends and our services. This blog is intended to get people thinking about topics and trends in Technology Risk Management, through our article reviews, as well as through original blog articles about current events and our MSSP services (such as our […]
Object Access Limitations. . . While offering some visibility, there are limitations to object access monitoring. If your organization has to comply with industry regulations such as GLBA, HIPAA, or Sarbanes Oxley, you know that maintaining data security and privacy are important, and one of the ways you can accomplish that is with object access […]
Many new firewalls come with Intrusion Prevention Systems, but can’t replace the services of a MSSP. A Jolley | Hadaway Article Many Clients ask a great question related to network monitoring. The question goes like this: Firewalls now come with various services including Intrusion Prevention Systems, (IPS). Why pay a firm like infotex to provide […]
We’ve got a birthday coming up . . . and part of the Wave is Gratitude! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . BY THE WAY It is occurring to us that coming up on July 24th, 2015, we will be celebrating our 15th […]
An article review. Not If You Use Us… A newly released study highlights the rising costs associated with preventing and responding to malware threats. The study was based on a survey of “630 IT and IT security practitioners in the U.S. who are familiar with their organization’s practices for containing malware infections.” The study is […]
And now let’s pause to reflect upon vendor risk . . . . “20% of our vendors have malware infections” A recent study reminds us to recognize that even if anti-malware is the least of our worries, that doesn’t mean our partners or customers are controlling it. With almost 20% of your customers’ computers infected with malware, according […]
We take great pride in our attempt to help you become aware of what you need to know via this portal and e-mail announcement system. Just a quick briefing of how we go about filtering the vulnerability news down for our readership.
IT Governance documentation is both extremely important and extremely difficult to create for IT managers, Information Security Officers, and Compliance Officers alike. infotex has been maturing GLBA and HIPAA templates since before the regulations were law. Our first Acceptable Use Policy was written in 1989. Each time we audit a new client, we learn from […]
Cookie-cutter approaches do not work in Information Security.