The Integris Blog

The Futility of Firewalls
A firewall for any growing organization is supposed to be the first step of many. A few organization leaders reading this may sigh in frustration, thinking about how this is a long journey ahead, and budget and time are against them. But if you want to succeed at keeping your company safe, I’d encourage you to get out of the “blue car” mentality, and start thinking of your digital assets as your company’s castle—a place where your business is both stored and defended.
Subscribe to our newsletter
Join us as we cover everything from your tech stack, to cybersecurity, to developing great company culture.
What the Colonial Pipeline Hack Can Teach Us About Cybersecurity
By Haley ClarkIt’s been a month since an employee at Colonial Pipeline saw a ransom note on a control-room computer. And it’s been almost three weeks since pipeline service resumed. Hack after hack — are there any lessons to be learned from these incidents? We think...
Three Mistakes Business Owners Make During Cybersecurity Incident Response
Imagine you’re facing a worst-case cybersecurity disaster. Your business has been hacked, and there’s ransomware holding your business hostage. What happens now? Hopefully, you have an IT team, and the first thing you do is reach out to your IT point of contact. If...
Breach vs. Incident: What’s the difference?
The words “breach” and “incident” seem synonymous to many. But for those in the world of cybersecurity and IT, there is a noticeably clear difference. For outsiders, using these terms as synonyms can cause confusion. If those outsiders are working on Incident...
Technology & Security
10 Best Practices from the Top Cybersecurity Training Companies
Why would an MSP publish an article sharing ten best practices from the top cybersecurity training companies? Because we partner with most of the...
Seven Ways Your MSP and WP Engine Improve Website Cybersecurity
To improve website cybersecurity, allow your MSP to manage WP Engine on your behalf. With a WP Engine holding a 62.38% share of the WordPress...
Security Threats to Mobile Devices and Countermeasures to Fix Them
Here's How to Keep Your Employee's Mobile Phones Safe In today's increasingly mobile work world, mobile phones have become a requirement. Most...
Life at Integris
Drew Hall, Infrastructure Administrator, DFW
Welcome back to our Team Highlight! Today, meet Drew from Integris' office in the DFW area. Could you describe your role/what you do in 2-3...
Antonio Coelho, Cybersecurity Technician, Maryland
Welcome back to our Team Highlight! Today, meet Antonio from Integris' Maryland office. Could you describe your role/what you do in 2-3 sentences? I...
Adam Haselwood, System Administrator, Wichita
Welcome back to our Team Highlight. Today, meet Adam from Integris' Wichita office. Could you describe your role/what you do in 2-3 sentences? I...
Podcast Episodes
Best Practices to Implement in IT
Anthony sits down with Jed to run through some best practices that, when properly implemented, can improve an organization's technology experience....
“See Technology as an Advantage and Powerful Tool”
Anthony sits down with Gene Dunn, Director of Support and Professional Services out of Integris' Atlanta office, for a chat about Gene's career, a...
Shields Up: Everything You Need to Know About Russian Cybersecurity Defense
Susan Gosselin, a Senior Writer at Integris, sits down with Nick McCourt, a vCISO at Integris, to take an in-depth look into Shields Up. With...