Blog

Integrity Staff

Recent Posts

4 Steps You Can Take To Improve Mobile Security In Your Business

Posted by Integrity Staff on May 9, 2019 at 10:00 AM

Most people—83%—think their organization is at risk from mobile threats, according to Verizon’s Mobile Security Index 2019 report.

Mobile threats are growing more quickly than other threats—especially in financial services, which is the least confident about mobile security, as well as the most likely industry to cut corners.

Read More

Top 5 Vulnerabilities Of Financial Mobile Apps

Posted by Integrity Staff on May 2, 2019 at 10:00 AM

With smartphone adoption and usage soaring, it’s no wonder that financial institutions are developing mobile apps to better serve their customers.

However, security is still a big concern in this area.

“The quantity and severity of the vulnerabilities discovered across [mobile apps in the financial services industry] clearly identify a systemic problem,” according to a new report. That problem is “a widespread absence of application security controls and secure coding.”

Read More

2019’s Top Mobile Security Threats

Posted by Integrity Staff on April 25, 2019 at 10:00 AM

You probably have a smartphone.

You’re probably taking calls, instant messaging with colleagues, checking email and social media, and letting your significant other when you’ll be home from work.

All of these activities sound inherently harmless, but your mobile device is a key gateway for cybercriminals to access critical information about you and your business.

Read More

Shadow IoT: The Effect Of Non-Business Devices On Your Network

Posted by Integrity Staff on April 18, 2019 at 10:00 AM

The number of connected devices is expected to balloon to more than 75 billion by 2025, a fivefold increase from 2015.

This explosion, which has been called BYOD on steroids, will have a significant impact on enterprise networks in the form of what’s being called shadow IoT.

Read More

How To Optimize Cloud Costs

Posted by Integrity Staff on April 11, 2019 at 10:00 AM

The top cloud initiative in 2019 for businesses is optimizing cloud costs, according to a RightScale / Flexera survey.

Sixty-four percent of organizations said they wanted to optimize their existing cloud usage this year, an increase from 58% in 2018.

Read More

What Is A Supply Chain Attack?

Posted by Integrity Staff on April 4, 2019 at 10:00 AM

A routine software update recently turned into what Kaspersky Labs is calling “one of the biggest supply chain incidents ever.”

More than a million people automatically downloaded an update from ASUS that allowed hackers to infiltrate their systems and encrypted data.

Read More

Formjacking: What SMBs Need To Know About This Cyber Threat

Posted by Integrity Staff on March 28, 2019 at 10:00 AM

More than 4,800 websites were compromised each month by the emerging cybersecurity threat known as formjacking.

That’s according to Symantec’s latest update to its Internet Security Threat Report.

Formjacking in itself isn’t a new strategy to steal sensitive data, but its prevalence has increased.

Read More

What Is Malware?

Posted by Integrity Staff on March 21, 2019 at 10:00 AM

Next time you download a Microsoft Office attachment sent through email, take an extra second to think about it.

Is it coming from someone you know? Were you expecting this attachment? Have you scanned it?

Turns out that Office users were the most at risk of falling victim to email-based malware, according to the 2019 Internet Security Threat Report.

Read More

The Difference Between The Deep Web and The Dark Web

Posted by Integrity Staff on March 14, 2019 at 10:00 AM

You’ve probably heard about the deep web.

You may have even thought, “That sounds pretty spooky, so I’ll stick to my normal web and stay away from that deep web thing.”

It turns out that most of us probably access the deep web every day and we didn’t even know it.

Read More

Update Your Google Chrome Browser NOW

Posted by Integrity Staff on March 7, 2019 at 1:57 PM

Last night, Google announced a new vulnerability had been found in the Chrome browser.

Google is aware of reports that an exploit for CVE-2019-5786 exists in the wild.

Their news release indicated that hackers have already figured out how to exploit the bug.

Read More