4 Reasons to Partner with a Managed Security Services Provider

Posted by Integrity Staff on May 25, 2017 at 10:00 AM

You have options for IT support and you have options for choosing a partner to help you manage and leverage your business technology. But one option stands above the rest: it's time to partner with a Managed Security Services Provider. An MSSP will have experience in and the skills necessary to help you keep your business technology (and data) secure. Tech security is by far the biggest issue of the day for businesses. With a rise in technology in business, has come a rise in cyber criminals seeking to exploit it. Any IT support company will be able to keep your technology in working order. But few IT companies can offer the deep security strategy and complex execution that will keep your business safe and your sensitive data secure. That's why partering with an MSSP makes the most sense.

Read More

6 Benefits of Adding Third Party IT Support to Your Team

Posted by Integrity Staff on May 18, 2017 at 10:00 AM

If you have somebody (or a few somebodies) on staff 'in charge of IT,' it can be easy to dismiss your IT support as 'covered.' But, that's rarely the full story. Most in-building IT teams are understaffed and overworked. IT has turned from a niche office role (keep those computer running and printers un-jammed!) into a position of increasing importance. As technology is now central to how most businesses operate, your IT support is critical. Is your company's IT team truly prepared to handle massive responsibilities that sit on its shoulders? If not, it's not because they're not capable. It's that their role has shifted underneath their feet. IT is no longer about light maintenance of a computer network. It is about strategy, growth, hardware, software, training, security, and more. It's a wise idea to start considering adding third party IT support to your team to share in those roles. 

Read More

WannaCry Ransomware Info and Tips

Posted by Scott Stevens on May 15, 2017 at 11:10 AM


On Friday, May 12, 2017, cyber criminals released what has been the most malicious ransomware attack in history.  The ransomware named WannaCry has infected over 10,000 organizations in over 150 countries so far.  Several European health systems and major manufacturers were forced to shut down by the initial wave on Friday.  To compound matters, at least two new strains of WannaCry have been released since Friday as the cyber criminals continue to leverage this latest threat.

Read More

Keep Your Business Safe: Download an IT Disaster Recovery Plan Template

Posted by Integrity Staff on May 11, 2017 at 10:00 AM

"What's the worst that could happen?" That's actually not a bad question to put to yourself regarding your business operations. It's not pleasant to think about, but considering it now can save your business later. For most businesses, the biggest disaster would be technology failing spectacularly and simultaneously, resulting in data loss and grinding operations to a halt. Because most businesses rely heavily on functioning technology and data storage, those systems going down suddenly is unthinkable. Unfortunately, it happens all too often. From grand theft to natural disasters, data can be stolen or destroyed and reliable systems can come crashing down. The best defense is a good plan, in this case. That's where it's helpful to find and use an IT Disaster Recovery Plan Template. 

Read More

What's New in Office 365 - Microsoft Teams

Posted by Ben Fraley on May 8, 2017 at 1:00 PM

The first half of this year, Microsoft has been rolling out a new application for its Office 365 platform, Microsoft Teams.

Read More

Communicate These 4 Tech Security Tips to Your Team Today

Posted by Integrity Staff on May 4, 2017 at 10:00 AM

Tech security remains the top topic of conversation for modern businesses. Business and technology are now inseparable and the ramifications of that evolution are still being parsed. One thing has become clear: security strategy in the majority of businesses is sorely lacking. A sharp spike in cyber crime and hacking demonstrates that the bad guys have figured out that businesses aren't prepared to adequately defend sensitive data. Fortunately, there is plenty of hope, but it starts with communicating the right things to your team. Start with the 4 tech security tips below:

Read More

What to Do If You Fell Victim to the Google Docs Phishing Scam

Posted by Scott Stevens on May 3, 2017 at 1:00 PM


If you received a message today with the subject, “A document on Google Docs has been shared with you,” it is very likely that your email address is on the contact list of someone’s account that was hacked.  This ploy was meant to convince you that someone you know sent you a document, and by entering your Google email address and password, you would be able to open the attachment.  In reality, entering your credentials would provide a hacker access to your Gmail mailbox from which they could harvest your mailbox and attack your contacts.

Google has reported that they have taken down the offending accounts and system updates are underway to prevent future attacks.  Google is also encouraging users to report the email as a Phishing attempt within Gmail.

If you received one of these messages, your account would have been compromised at the point of entering your email address and password.  Opening the message, or even clicking on the link that opens the login page would NOT compromise your account.

If you clicked on the link and entered your credentials, immediately complete the following steps:

  • Go to your Gmail account’s permissions settings at
  • Remove permissions for “Google Docs,” the name of the phishing scam (if the page says, “You haven’t granted any apps or websites access to your Google Account,” your documents were not compromised).
  • Change your Gmail password

When setting passwords, consider using a passPHRASE made up of three or more common words, and add a number or special character to increase complexity.  Even the longest dictionary word is easily hacked, but passPHRASES are much more difficult to pick.  Try something like “I-Like-Tomatoes22” or “I-Dr1ve-A-Boat” rather than using a common word or pet’s name.  The length and use of multiple words provide added protection.

This is only the latest of several new email attacks.  Always pay attention to the TO, FROM, and SUBJECT LINE before clicking on a link or opening an attachment.  The “TO” line on this Google Docs message says,  It is also important to be very suspicious anytime you are asked to enter your password from an email request. Credential phishing is big business for cybercriminals. 

Read More