Blog

A Brief Overview of Unified Endpoint Management

Posted by Integrity Staff on May 16, 2019 at 10:00 AM

As more devices connect to your network, the more your organization opens itself up for an attack through one of its many endpoints.

One way to solve that is through implementing a unified endpoint management strategy.

Read More

Beware of Emails From Wolters Kluwer

Posted by Integrity Staff on May 15, 2019 at 2:11 PM
 
Wolters Kluwer, the global provider of software and services for the finance, accounting, legal, medical and compliance industries announced on May 6 that their systems were taken offline in response to a cyber threat.
Read More

4 Steps You Can Take To Improve Mobile Security In Your Business

Posted by Integrity Staff on May 9, 2019 at 10:00 AM

Most people—83%—think their organization is at risk from mobile threats, according to Verizon’s Mobile Security Index 2019 report.

Mobile threats are growing more quickly than other threats—especially in financial services, which is the least confident about mobile security, as well as the most likely industry to cut corners.

Read More

Top 5 Vulnerabilities Of Financial Mobile Apps

Posted by Integrity Staff on May 2, 2019 at 10:00 AM

With smartphone adoption and usage soaring, it’s no wonder that financial institutions are developing mobile apps to better serve their customers.

However, security is still a big concern in this area.

“The quantity and severity of the vulnerabilities discovered across [mobile apps in the financial services industry] clearly identify a systemic problem,” according to a new report. That problem is “a widespread absence of application security controls and secure coding.”

Read More

2019’s Top Mobile Security Threats

Posted by Integrity Staff on April 25, 2019 at 10:00 AM

You probably have a smartphone.

You’re probably taking calls, instant messaging with colleagues, checking email and social media, and letting your significant other when you’ll be home from work.

All of these activities sound inherently harmless, but your mobile device is a key gateway for cybercriminals to access critical information about you and your business.

Read More

Shadow IoT: The Effect Of Non-Business Devices On Your Network

Posted by Integrity Staff on April 18, 2019 at 10:00 AM

The number of connected devices is expected to balloon to more than 75 billion by 2025, a fivefold increase from 2015.

This explosion, which has been called BYOD on steroids, will have a significant impact on enterprise networks in the form of what’s being called shadow IoT.

Read More

How To Optimize Cloud Costs

Posted by Integrity Staff on April 11, 2019 at 10:00 AM

The top cloud initiative in 2019 for businesses is optimizing cloud costs, according to a RightScale / Flexera survey.

Sixty-four percent of organizations said they wanted to optimize their existing cloud usage this year, an increase from 58% in 2018.

Read More

What Is A Supply Chain Attack?

Posted by Integrity Staff on April 4, 2019 at 10:00 AM

A routine software update recently turned into what Kaspersky Labs is calling “one of the biggest supply chain incidents ever.”

More than a million people automatically downloaded an update from ASUS that allowed hackers to infiltrate their systems and encrypted data.

Read More

Formjacking: What SMBs Need To Know About This Cyber Threat

Posted by Integrity Staff on March 28, 2019 at 10:00 AM

More than 4,800 websites were compromised each month by the emerging cybersecurity threat known as formjacking.

That’s according to Symantec’s latest update to its Internet Security Threat Report.

Formjacking in itself isn’t a new strategy to steal sensitive data, but its prevalence has increased.

Read More

What Is Malware?

Posted by Integrity Staff on March 21, 2019 at 10:00 AM

Next time you download a Microsoft Office attachment sent through email, take an extra second to think about it.

Is it coming from someone you know? Were you expecting this attachment? Have you scanned it?

Turns out that Office users were the most at risk of falling victim to email-based malware, according to the 2019 Internet Security Threat Report.

Read More