Blueborne Allows Attackers to Control Your Bluetooth-Enabled Devices

Posted by Nick Fulfer on October 26, 2017 at 10:00 AM

In April 2017, The Automated Reporting Management Information System (ARMIS) contacted Microsoft, Apple, Samsung, and Linux to report eight zero-day vulnerabilities related to connections via Bluetooth, designated as Blueborne.

Blueborne endangers millions of unpatched devices by spreading through the air, across a wide variety of platforms: mobile, desktop, and IoT operating systems which includes Android, iOS, Windows, Linux; and all related devices that use these operating systems.

What is Blueborne?

Blueborne is a vulnerability by which attackers take advantage of Bluetooth connections to remotely control a device. The attack itself does not require the attacker's device to be paired with the target device, or require it to be in a discoverable state. It does, however, require the attacker to be within proximity of the device for the initial connection.

Read More

Protect Email Logins with Multi-Factor Authentication

Posted by Scott Stevens on October 24, 2017 at 1:00 PM

Cyber criminals are continually developing effective new phishing campaigns to steal login credentials. With the increased business adoption of hosted email solutions, such as Microsoft Office 365 and Google Gmail for Business, phishing for login credentials has become a significant threat. Email messages that prompt you to login to your email account are common ploys used by hackers, whether prompting to access a secured document, change your password, or verify your license. Clicking on the authentic-looking link in the email message will conveniently bring up a familiar login screen that looks EXACTLY like what you expect, but is HOSTED BY THE HACKER.

Read More

Monitoring The Security Pulse of Your Network

Posted by Scott Stevens on October 19, 2017 at 10:00 AM

Whether as proactive protection against cyber threats or in response to external requirements, businesses of every size and kind are finding the need to monitor the security health of their networks.  Those who accept credit card payments need security monitoring to address payment card industry requirements (PCI-DSS), while financial institutions and healthcare are required to protect sensitive data.  Manufacturers who use restricted chemicals or accept Department of Defense contracts need to implement security controls to meet the requirements of DFARS, NIST, and CVI.  Regardless the reason, security monitoring will detect and enlighten you to vulnerabilities and activities so they can be FIXED!

Read More

4 Benefits of Finding Third Party IT Support in Decatur

Posted by Integrity Staff on October 12, 2017 at 1:00 PM

Why should you opt for third party IT support in Decatur? There are plenty of reasons to look outside of your company's walls for help with your business technology and data security needs. If you run a business in Decatur, IL and you can feel your handle on your business technology slipping away, search for alternatives to your internal team. Partnering with an IT company (like an MSP or MSSP) can either fully replace or successfully supplement your internal resources. No matter how you choose construct your IT support, bringing in outside help is a positive. 

Read More

What to Consider When Choosing an IT Company in Bloomington

Posted by Integrity Staff on October 5, 2017 at 1:00 PM

When choosing an IT company in Bloomington, there's plenty to consider. Every business can benefit from finding an experienced business and technology partner to help them meet their goals. But, it has to be the right partner. How can you identify the right fit for your business? There are a few things that your partner has to have in order to be effective. Those include things like experience and expertise, quick response time and resources, plus a competitive price and high value. Your partner should be a trusted part of the Bloomington-Normal business community. 

Read More