Blog

Shadow IoT: The Effect Of Non-Business Devices On Your Network

Posted by Integrity Staff on April 18, 2019 at 10:00 AM

The number of connected devices is expected to balloon to more than 75 billion by 2025, a fivefold increase from 2015.

This explosion, which has been called BYOD on steroids, will have a significant impact on enterprise networks in the form of what’s being called shadow IoT.

Read More

How To Optimize Cloud Costs

Posted by Integrity Staff on April 11, 2019 at 10:00 AM

The top cloud initiative in 2019 for businesses is optimizing cloud costs, according to a RightScale / Flexera survey.

Sixty-four percent of organizations said they wanted to optimize their existing cloud usage this year, an increase from 58% in 2018.

Read More

What Is A Supply Chain Attack?

Posted by Integrity Staff on April 4, 2019 at 10:00 AM

A routine software update recently turned into what Kaspersky Labs is calling “one of the biggest supply chain incidents ever.”

More than a million people automatically downloaded an update from ASUS that allowed hackers to infiltrate their systems and encrypted data.

Read More

Formjacking: What SMBs Need To Know About This Cyber Threat

Posted by Integrity Staff on March 28, 2019 at 10:00 AM

More than 4,800 websites were compromised each month by the emerging cybersecurity threat known as formjacking.

That’s according to Symantec’s latest update to its Internet Security Threat Report.

Formjacking in itself isn’t a new strategy to steal sensitive data, but its prevalence has increased.

Read More

What Is Malware?

Posted by Integrity Staff on March 21, 2019 at 10:00 AM

Next time you download a Microsoft Office attachment sent through email, take an extra second to think about it.

Is it coming from someone you know? Were you expecting this attachment? Have you scanned it?

Turns out that Office users were the most at risk of falling victim to email-based malware, according to the 2019 Internet Security Threat Report.

Read More

The Difference Between The Deep Web and The Dark Web

Posted by Integrity Staff on March 14, 2019 at 10:00 AM

You’ve probably heard about the deep web.

You may have even thought, “That sounds pretty spooky, so I’ll stick to my normal web and stay away from that deep web thing.”

It turns out that most of us probably access the deep web every day and we didn’t even know it.

Read More

Update Your Google Chrome Browser NOW

Posted by Integrity Staff on March 7, 2019 at 1:57 PM

Last night, Google announced a new vulnerability had been found in the Chrome browser.

Google is aware of reports that an exploit for CVE-2019-5786 exists in the wild.

Their news release indicated that hackers have already figured out how to exploit the bug.

Read More

Top 5 Benefits Of Outsourcing IT Services

Posted by Integrity Staff on March 7, 2019 at 10:00 AM

At some point in running your business, it may make sense to outsource certain business functions rather than keep them in house.

The IT department is one of those areas. Here’s why.  

Read More

What's Required For An Annual HIPAA Assessment?

Posted by Integrity Staff on February 28, 2019 at 10:00 AM

The average cost of a stolen record sells on the dark web for $148, according to Ponemon’s 2018 Cost Of A Data Breach Study.

Compare that to records snatched from the healthcare industry, which fetch higher than any other sector at $408 per record.

However, penalties for violating HIPAA reach into the hundreds of thousands and even the millions, dwarfing these numbers.

Ensure your organization is compliant by completing your annual HIPAA assessment.

Read More

Top 3 Most Common Cybersecurity Breaches Impacting SMBs

Posted by Integrity Staff on February 21, 2019 at 10:00 AM

The most common cybersecurity breaches impacting small- and medium-sized businesses may seem fairly simple to avoid, but they’re costing people and companies billions of dollars.

Learn more about each of these types of breaches and what you can do to protect yourself and your company.

Read More