Blog

Social Engineering: Is Your Company at Risk?

Posted by Koffi Koudite on August 27, 2018 at 9:00 AM

Social Engineering is a tactic used by cyber criminals to manipulate individuals to gain confidential information such as social security number, credit card number, passwords, etc.

In the cyber security world, the weakest link in the security chain are the users, which is why people are the target when it comes to social engineering. It doesn’t matter how many security measures you have in place. You can have locks on your doors, an alarm system, the latest firewalls, and network or security monitoring tools; all it takes to hack into your network is to trick a user into clicking on a malicious link they think came from a social media site.

Read More

The 6 Critical Tenets of Tech Support

Posted by Integrity Staff on August 23, 2018 at 10:00 AM

The phrase “tech support” has many connotations attached to it.

Read More

Fax Machines Provide Attackers Easy Access to Infect Servers and PC’s

Posted by Integrity Staff on August 17, 2018 at 10:00 AM

Did you know that a security vulnerability in your fax machine could allow an attacker to bypass your firewall and access your confidential network resources?   Fax machines use 1980’s technology and are relied upon heavily in the healthcare industry to help transmit patient information between providers.  We often don’t give them a second thought after plugging them in, but they can represent a real risk to your organization’s data.

Read More

4 Infamous Tech Security Mistakes

Posted by Integrity Staff on August 16, 2018 at 10:00 AM

For much of the past decade, the biggest security mistakes have boiled down to fumbling some basic tech security practices.

Read More

Security Awareness Training: 5 Tips to Get Started

Posted by Integrity Staff on August 9, 2018 at 10:00 AM

You may have been thinking recently that your company needs to implement security awareness training. Maybe you’ve experienced a scare where a few employees have accidentally clicked on a phishing link in their Facebook inbox. You decide that behavior is risky for the person, but also for the organization.

Read More

5 Benefits Of Security Awareness Training

Posted by Integrity Staff on August 9, 2018 at 9:00 AM

When a new hire comes aboard, all great businesses have this in common: comprehensive training. It's the mark of a great business because it shows the attention and care that goes into equipping employees with the tools they need to succeed at the company.

Read More

6 Questions You Should Ask About Cybersecurity for Medical Practices

Posted by Integrity Staff on August 8, 2018 at 10:00 AM

Cybersecurity for medical practices is serious business. Granted, every business needs to take cybersecurity seriously. Cybercrime has been on the rise for a while and shows no signs of slowing down. For hospitals and other medical facilities, that's a terrifying reality. Healthcare organizations are subject to HIPAA and are tasked with keeping ultra private information secure. They're prime targets for cybercriminals looking to leverage the sensitive nature of the data against organizations. If you're a part of or you lead a medical practice, you need to keep cybersecurity in mind. Ask yourself the six questions below to help you vet your current cybersecurity solution:

Read More

10 Overlooked Smartphone Vulnerabilities

Posted by Integrity Staff on August 2, 2018 at 10:00 AM

About 1 in 5 people care more about protecting their smartphone than their laptop, according to a survey from AlertSec.

Read More

10 Timeless Team Building Ideas

Posted by Integrity Staff on July 26, 2018 at 10:00 AM

Businesses with employees should consider regular team-building exercises.

Read More

Leaders Are Developed: 6 Tips for Improvement

Posted by Integrity Staff on July 19, 2018 at 10:00 AM

When you think of a role model in your industry or your life, chances are high that person is a leader.

Read More