Blog

Two-Factor Authentication and Why You Should Use It

Posted by Paul Schulz on April 20, 2016 at 9:37 AM

Almost all online accounts in use today are secured by usernames and passwords. Common passwords can easily be cracked through brute force methods, giving hackers full access to your personal accounts. As the use of this form of authentication in the near future will likely remain the same, there are other security measures that consumers can take advantage of to protect their private information.

Read More

Support Scams Can Happen to Anyone

Posted by Chad Geiser on April 13, 2016 at 4:06 PM

Late last week, one of our Integrity support engineers received an outside call from "Windows Support Desk". The caller said that our engineer’s computer has reported a virus or malicious software, and must be fixed immediately. The “technician” asked for remote access to the computer so that he could install software that would allow the “Windows Support Desk” to assist…

Read More

Ransomware - Tips to protect yourself

Posted by Steve Eckhardt on March 28, 2016 at 8:43 AM

Ransomware has been gaining popularity since around 2013, when CryptoLocker first appeared. Ransomware is a special type of malware that restricts access to files on an infected computer system and demands that the user pay a ransom to unlock these restricted files.

Read More

2016 Trends in Technology

Posted by Ben Fraley on January 6, 2016 at 4:15 PM

 

The largest technology tradeshow of the year, the 2016 Consumer Electronics Show in Las Vegas, is happening this week. Since it is right at the beginning of 2016, CES is where we get our first look at some of the technology trends you’ll hear about for the rest of the year. Here are some that I am looking forward to:

Read More