Why Software Updates Need to Be Part of Your Tech Security Strategy

Posted by Integrity Staff on September 28, 2017 at 10:00 AM

Your tech security strategy is going to primarily focus on the big issues. Preventing cyber crime. Disaster Recovery and business continuity. Data storage. The less glamorous, 'housekeeping' tasks often get passed over. But, that's a mistake. Your security strategy has to account for the day to day upkeep that secures your business. For example: software updates. Those annoying alerts that pop up on your computer may seem minor, but they can have a big-time security impact. If your company uses software to do business, it needs to be updated on schedule. Don't leave it to chance - make it a part of your security strategy. Why are software updates so important? Find out below.

Read More

4 Critical Skills You Can Acquire Through Community Education Classes

Posted by Integrity Staff on September 21, 2017 at 10:00 AM

When's the last time you added a skill to your repertoire? If your mind immediately drifted to college courses, it's time to go back to class. No, you don't have to enroll for a full semester. There are community education classes that are available near you! As you navigate your career (and life) it's important to always be learning. There are resources near you that promote learning and collaboration year-round. Seek those resources out and see what types of courses are being offered. Adding a new skill may be easier than you think and if you feel it's overdue, now is the time to jump on it. 

Read More

Security Breach: What Should I Do Now?

Posted by Scott Stevens on September 14, 2017 at 10:54 AM

Equifax, one of the three major credit reporting agencies, disclosed a data breach on September 7 that affects 143 million people in the US.  The stolen data included the consumer’s name, address, date of birth, and social security number.  In addition, credit card numbers and other personally identifiable information was also stolen for about 200,000 of the 143 million individuals.  The “unauthorized access” was reported to have occurred on July 29, and the investigation is ongoing.

Read More

Is Your Business Growing? You Need Outsourced Tech Support

Posted by Integrity Staff on September 14, 2017 at 10:00 AM

When your business is growing, it's exciting! It can be enough of a whirlwind, that some considerations get overlooked. If your business is set to scale, don't forget to examine your IT support. As your business grows, your business technology and data will grow in importance. Does your company have the necessary IT infrastructure in place in support growth? If you're unsure, consider the items below. With outsourced tech support, you'll have the resources you need to scale successfully. Without the help of a partner, your might find that your current IT solution is an impediment. 

Read More

What Driver's Ed Taught Me About Lifelong Learning

Posted by Mark Schaefer on September 12, 2017 at 10:00 AM

It’s about an effective learning program, not isolated events.

I remember my excitement as I sat in the driver seat of the red, 1996, Dodge Neon appropriately labeled Student Driver. It was time to translate theory into practice as I went through my mental checklist; seat belt, check. mirrors, check. adjust seat, check. start car, check. Mr. Linder, my driver education instructor next to me, check.

Read More

Use Integrity's IT Disaster Recovery Plan Template to Protect Your Business

Posted by Integrity Staff on September 7, 2017 at 10:00 AM

Every business needs a comprehensive IT Disaster Recovery plan. That includes yours. Whether you identify your business as 'small,' 'midsize,' or 'massive,' having a Disaster Recovery plan in place is as important as having a payroll process. It may not seem like it, at a brush, but having a Disaster Recovery plan can be the difference between surviving an emergency or closing your doors. It's paramount. With the growing digitization of business, your most important assets are tied to your business technology. From private customer data to sensitive company financials to everyday operations, a disaster that strikes your technology, strikes at the heart of your business.

Read More

Rethink Your Password Creation Strategy

Posted by Ben Fraley on September 5, 2017 at 1:55 PM

  • Must be at least 6 characters
  • Must contain upper and lowercase letters, a number, and a symbol
  • Must change every 60 days

Sound familiar? These have been standard rules for password creation for decades. The National Institute of Standards and Technology (NIST) is the government organization behind these familiar password rules, and just earlier this year they annouced that their official standards and recommendations are going to be undergoing a major re-write. They've sought advice from cybersecurity experts and have been open with their development of a new standard for passwords. While not yet official, here is a look at the major cybersecurity themes in the drafts of the new regulation:

Read More