Blog
The Integris Blog
Featured
The National Public Data Breach of 2024: How to Shield Your Data from Dark Web Hackers
Every day, there's another screaming headline about "the biggest data breach in history." This time, however, it really may be "the big one." In August 2024, a dark web hacker dumped 2.7 billion data records—including Social Security numbers—on a dark web forum. This...
The Future of Work Is AI-Driven. Are Your Systems Ready for the Ride?
The AI-enabled future of business is already here. AI chatbots interact with our customers....
Top Microsoft Teams Integrations: What They Can Do for Your Productivity
If you’ve worked in Microsoft 365 for any length of time, you know the powerful chat and...
Hot New Ways to Customize Microsoft Teams for Your Industry in 2024
Nearly everyone with Microsoft Teams knows what a tremendous tool it is for chat, document...
Hot Topics for Cybersecurity in 2024
As we go into 2024, Cybercrime now accounts for $8 Trillion US dollars—enough to make it the third...
Technology & Cybersecurity
Third Party Vendor Risk Management: A Guide for Law Firms
You've bought the cybersecurity tools your MSP recommended to manage your cybersecurity. You use a permission-based platform to transfer client...
Data Compliance for Law Firms: How to Know When Your Client Information is Bound by Data Handling Regulations—and What to Do about It
Most lawyers understand that the American Bar Association expects their firm to protect a client's information correctly. But when industry-specific...
Law Firm Cybersecurity Audits: How to Prepare for Your Client Questionnaire
If you run a law firm, chances are you know the drill. You're about to get a new corporate client, and soon after you've signed your agreement, you...
Current Events & News
Microsoft’s PrintNightmare: Patching can be flawed. You need to do it anyway.
Researchers at security firm Sangfor recently found a Windows vulnerability that could allow hackers to remotely gain access to the operating...
What the Colonial Pipeline Hack Can Teach Us About Cybersecurity
It’s been a month since an employee at Colonial Pipeline saw a ransom note on a control-room computer. And it’s been almost three weeks since...
The ParkMobile Hack: What You Need to Know…
If you live in a city with parking meters, there's a good chance you've at least encountered the ParkMobile system. The city I live in uses the...
Life at Integris
IT Managed Service Provider, Integris, Announces Plans to Establish Legal Practice
This week, national IT Service Provider, Integris, announced plans to establish a legal practice dedicated to servicing law firms nationwide. The...
How to Launch an AI Acceptable Use Policy at Your Company
Are you considering launching an AI tool like Microsoft Copilot for M365 or authorizing your employees to use third-party AI tools like video...
Integris Ranked on Tech Industry’s Most Prestigious List of Managed Service Providers Worldwide
IT Managed Service Provider, Integris, has been named one of the world’s top-performing managed service providers in the prestigious 2024 Channel...
Podcast Episodes
Cybersecurity Policies: What Businesses Miss
Susan sits down with Nick McCourt, Lead vCISO at Integris, to discuss all things cybersecurity policy: what they are, why they're important, and...
Helping Small Businesses Now and in the Future
Sylvia Brookshire, Account Executive at Integris, sits down with Anthony to talk about how her background as an immigrant and experience with small...
Microsoft 365 Defender: A Good XDR Solution?
Susan and Nick talk through Microsoft 365 Defender, Microsoft's take on an Extended Detection & Response (XDR) solution. Check out the...