Blog

How The Capital One Data Breach Affects You And What You Should Do About It

Posted by Integrity Staff on August 2, 2019 at 10:00 AM

One of the largest banks in the United States announced this week that a data breach impacted more than 100 million people and businesses throughout North America.

Read More

7 Points Your Acceptable Use Policy Must Address

Posted by Integrity Staff on August 1, 2019 at 10:00 AM

Have you ever participated in an office lottery pool using a mobile device? 

Did you know that such a pool is technically illegal? 

You might not have, given the lack of comprehensive acceptable use policies. 

In fact, only 19% of businesses reported having a comprehensive AUP, according to the Verizon Mobile Security Index 2019—less than half (45%) have one at all.

Read More

Don't Let Your Cybersecurity Guard Down Through Social Media

Posted by Integrity Staff on July 25, 2019 at 10:00 AM

Social media is great for watching highlights from last night’s TV show everyone is raving about and sharing pictures of your family from the weekend party.

But, can it really be a threat to your business?

Read More

Protect Yourself and Your Business From These Common Cyber Scams

Posted by Integrity Staff on July 18, 2019 at 10:00 AM

The Internet can be a wonderful place, a portal for how we get things done today. For personal or business reasons, the web is crucial to making things happen.

However, the Internet offers no shortage of ways to be scammed, hacked, and robbed.

Read More

9 Stunning Facts From Verizon's Mobile Security Index 2019

Posted by Integrity Staff on July 11, 2019 at 10:00 AM

Security risks from mobile devices have increased since last year, according to Verizon’s Mobile Security Index 2019. 

In this article, you’ll learn how mobile can be an effective way for bad actors to infiltrate your organization.

Read More

4 Types Of Data Migrations

Posted by Integrity Staff on July 4, 2019 at 10:00 AM

Have you ever switched CRM platforms in your business? Or, have you dealt with new regulation in your industry? Maybe you’ve acquired another firm.

If your SMB has experienced any of those scenarios—or expects to in the near future— chances are that may be familiar with a data migration.

Read More

What is Madware?

Posted by Integrity Staff on June 27, 2019 at 10:00 AM

Roughly 1 out of 3 companies rely on a BYOD policy, according to Samsung.

The “bring your own device” strategy (in which employees bring their personal devices into the workplace and use them for business purposes) is used by 31% of enterprises.

This trend could allow a variety of cybersecurity risks to pop up, including madware.

Read More

What You Need to Know About The Latest Cyberthreat Index

Posted by Integrity Staff on June 20, 2019 at 10:00 AM

Cyberthreats are top of mind for SMBs lately, according to the latest Cyberthreat Index for Business from AppRiver.

The Q2 2019 survey has found that SMBs are not optimistic about their chances against a cyberthreat.

Read More

What BYOD Means For The Healthcare Industry

Posted by Integrity Staff on June 13, 2019 at 10:00 AM

Mobile security in healthcare is more important now than it ever has been.

With the proliferation of smartphones, tablets, and the Internet of Things in the workplace, the number of ways an attacker could harvest personal health information has skyrocketed.

Read More

4 Famous API Breaches & What The Fallout Means For Your SMB

Posted by Integrity Staff on June 6, 2019 at 10:00 AM

Have you ever logged into a website or an app with your Facebook login information?

You were able to do this because that site or app used a Facebook API.

While APIs are convenient, small coding errors can mean enormous risks.

Read More