Automate your phone: Discover the world of IFTTT

Posted by Ben Fraley on August 26, 2014 at 9:13 AM

Do you ever stop to think how often you use your phone in a day? If you are like me, it’s more important than my laptop! There are hundreds of ways to make your mobile devices more efficient, and that is what I’ll be blogging about on our website. I’ll post tips and tricks for using smartphones and tablets, reviews of new devices, and even post about some useful apps.

Read More

Upcoming Office 365 Plan Changes

Posted by Integrity Staff on August 19, 2014 at 8:36 PM


In June, Microsoft announced new Office 365 plans for small and midsize businesses. The plans are set to roll out October 1, 2014 and include a variety of new options for businesses of 1 to 250 employees. The new plans are: 

Read More

How to Remember All Your Passwords

Posted by Integrity Staff on August 18, 2014 at 11:27 PM

Remember a time when we had two or three passwords to remember?  Life was simple.  How many passwords do you have now?  10?  20? 50? 100? 

Read More

Don't Install Security Updates Yet!

Posted by Integrity Staff on August 18, 2014 at 4:36 AM
It may seem contrary to everything you have read about keeping your computer secure and up to date, but this month, it is true. You need to wait for a while before installing the latest round of Microsoft Security Updates. Normally Integrity recommends applying security updates in a timely fashion, but in this case,  the August updates are causing other serious computer crashes.
Read More

Your Password was Stolen

Posted by Integrity Staff on August 11, 2014 at 11:14 PM

Did you know that your password was stolen?  Chances are, you are among the millions of people that have had their email address, password, credit card, or other information stolen by online attackers.  Is this newsworthy?  Not anymore.

Read More

Uninstall Java Now!

Posted by Integrity Staff on August 4, 2014 at 9:31 AM

Java is the #1 security threat on most PC’s today. Java is the top software used by online criminals to gain unauthorized access to systems and data.

Read More