Blog

Integrity Staff

Recent Posts

4 Types Of Data Migrations

Posted by Integrity Staff on July 4, 2019 at 10:00 AM

Have you ever switched CRM platforms in your business? Or, have you dealt with new regulation in your industry? Maybe you’ve acquired another firm.

If your SMB has experienced any of those scenarios—or expects to in the near future— chances are that may be familiar with a data migration.

Read More

What is Madware?

Posted by Integrity Staff on June 27, 2019 at 10:00 AM

Roughly 1 out of 3 companies rely on a BYOD policy, according to Samsung.

The “bring your own device” strategy (in which employees bring their personal devices into the workplace and use them for business purposes) is used by 31% of enterprises.

This trend could allow a variety of cybersecurity risks to pop up, including madware.

Read More

What You Need to Know About The Latest Cyberthreat Index

Posted by Integrity Staff on June 20, 2019 at 10:00 AM

Cyberthreats are top of mind for SMBs lately, according to the latest Cyberthreat Index for Business from AppRiver.

The Q2 2019 survey has found that SMBs are not optimistic about their chances against a cyberthreat.

Read More

What BYOD Means For The Healthcare Industry

Posted by Integrity Staff on June 13, 2019 at 10:00 AM

Mobile security in healthcare is more important now than it ever has been.

With the proliferation of smartphones, tablets, and the Internet of Things in the workplace, the number of ways an attacker could harvest personal health information has skyrocketed.

Read More

4 Famous API Breaches & What The Fallout Means For Your SMB

Posted by Integrity Staff on June 6, 2019 at 10:00 AM

Have you ever logged into a website or an app with your Facebook login information?

You were able to do this because that site or app used a Facebook API.

While APIs are convenient, small coding errors can mean enormous risks.

Read More

Data Loss Prevention: How Your Employees Leak Critical Information

Posted by Integrity Staff on May 23, 2019 at 10:00 AM

Email.

Instant messaging.

Website forms.

File transfers.

What do all of these digital communications have in common?

They’re all ways that your business data can get into the wrong hands.

Read More

A Brief Overview of Unified Endpoint Management

Posted by Integrity Staff on May 16, 2019 at 10:00 AM

As more devices connect to your network, the more your organization opens itself up for an attack through one of its many endpoints.

One way to solve that is through implementing a unified endpoint management strategy.

Read More

Beware of Emails From Wolters Kluwer

Posted by Integrity Staff on May 15, 2019 at 2:11 PM
 
Wolters Kluwer, the global provider of software and services for the finance, accounting, legal, medical and compliance industries announced on May 6 that their systems were taken offline in response to a cyber threat.
Read More

4 Steps You Can Take To Improve Mobile Security In Your Business

Posted by Integrity Staff on May 9, 2019 at 10:00 AM

Most people—83%—think their organization is at risk from mobile threats, according to Verizon’s Mobile Security Index 2019 report.

Mobile threats are growing more quickly than other threats—especially in financial services, which is the least confident about mobile security, as well as the most likely industry to cut corners.

Read More

Top 5 Vulnerabilities Of Financial Mobile Apps

Posted by Integrity Staff on May 2, 2019 at 10:00 AM

With smartphone adoption and usage soaring, it’s no wonder that financial institutions are developing mobile apps to better serve their customers.

However, security is still a big concern in this area.

“The quantity and severity of the vulnerabilities discovered across [mobile apps in the financial services industry] clearly identify a systemic problem,” according to a new report. That problem is “a widespread absence of application security controls and secure coding.”

Read More