Blog

When Was Your Last Cybersecurity Assessment?

Posted by Integrity Staff on September 20, 2018 at 10:00 AM

Can you recall the last time you changed your passwords, updated your privacy policy, or changed information on one of your private accounts? Or, to put it simply, when was the last time you had someone make sure your online data was safe?

If the answer to any of those questions is, “No,” then it would be wise to schedule a cybersecurity assessment as soon as possible. This can go for companies or for individuals, but companies carry the larger burden. Having so much information stored in one place makes businesses an easy target.

Read More

How Technology Consulting Can Help Your Business Avoid Disaster

Posted by Integrity Staff on September 13, 2018 at 10:00 AM

It can be difficult to manage and run a large business, especially if you’re doing it mostly alone. Even if you have a partner, there’s no guarantee that you will be able to protect your business from everything. With the recent rise of phishing scams, security breaches, and account hacking, who is to say your business is not the next target?

Read More

4 Reasons to Hire a Technology Consultant Before 2019

Posted by Integrity Staff on September 6, 2018 at 10:00 AM

In the 21st century, technology can make or break a company when it comes to how they use it for their staff and clients. It also matters how they present themselves online and whether they have a strong knowledge of the rules and regulations that keep their company ethically above the water. Not everyone on your staff will have the same level of knowledge when it comes to using technology or what clients (or potential ones) would like to see from the company.

Read More

6 Security Awareness Training Topics to Review with Your Team

Posted by Integrity Staff on September 4, 2018 at 10:00 AM

Being aware of one’s surroundings is the greatest form of self-defense.

Read More

Social Engineering: Is Your Company at Risk?

Posted by Koffi Koudite on August 27, 2018 at 9:00 AM

Social Engineering is a tactic used by cyber criminals to manipulate individuals to gain confidential information such as social security number, credit card number, passwords, etc.

In the cyber security world, the weakest link in the security chain are the users, which is why people are the target when it comes to social engineering. It doesn’t matter how many security measures you have in place. You can have locks on your doors, an alarm system, the latest firewalls, and network or security monitoring tools; all it takes to hack into your network is to trick a user into clicking on a malicious link they think came from a social media site.

Read More

The 6 Critical Tenets of Tech Support

Posted by Integrity Staff on August 23, 2018 at 10:00 AM

The phrase “tech support” has many connotations attached to it.

Read More

Fax Machines Provide Attackers Easy Access to Infect Servers and PC’s

Posted by Integrity Staff on August 17, 2018 at 10:00 AM

Did you know that a security vulnerability in your fax machine could allow an attacker to bypass your firewall and access your confidential network resources?   Fax machines use 1980’s technology and are relied upon heavily in the healthcare industry to help transmit patient information between providers.  We often don’t give them a second thought after plugging them in, but they can represent a real risk to your organization’s data.

Read More

4 Infamous Tech Security Mistakes

Posted by Integrity Staff on August 16, 2018 at 10:00 AM

For much of the past decade, the biggest security mistakes have boiled down to fumbling some basic tech security practices.

Read More

Why Security Awareness in Healthcare is Critical

Posted by Integrity Staff on August 13, 2018 at 10:00 AM

Security Awareness training and programming is important for every industry. Security Awareness in healthcare is especially critical. The healthcare industry is responsible for the safekeeping of highly sensitive medical data. HIPAA tries to ensure that security is tight and materials are handled correctly, but that only goes so far. Any breach of a medical organization's network or data can be highly damaging to the practice in question. HIPAA violations come at a steep cost and a lost reputation is something that may never be recovered. Every organization in the healthcare industry needs Security Awareness training. This is why:

Read More

Security Awareness Training: 5 Tips to Get Started

Posted by Integrity Staff on August 9, 2018 at 10:00 AM

You may have been thinking recently that your company needs to implement security awareness training. Maybe you’ve experienced a scare where a few employees have accidentally clicked on a phishing link in their Facebook inbox. You decide that behavior is risky for the person, but also for the organization.

Read More