"Your Information Technology Leader"

InTegriLogic Blog

InTegriLogic Blog

InTegriLogic has been serving the Tucson area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Bruce Groen is the CEO and co-founder of InTegriLogic Corp.

The Week in Breach News: 06/26/24 – 07/02/24

Breach-1

This week: The Snowflake fallout continues to land on companies; 1 million users have their data exposed in a hospital data breach

Continue reading

Have You Ever Considered What a Ransomware Attack Actually Does to Your Business?

Have You Ever Considered What a Ransomware Attack Actually Does to Your Business?

Last week, we discussed the many impacts your business suffering from ransomware has on “second-order harm,” downstream businesses, and average, ordinary people. This time, we wanted to return to “first-order harms”… those the impacted business has to deal with itself.

Continue reading

Is Your Internal IT Buckling Under Pressure? We'll Lighten the Load

Is Your Internal IT Buckling Under Pressure? We'll Lighten the Load

There's a lot of pressure on (often understaffed and overworked) internal IT teams to manage and maintain increasingly complex systems. For businesses noticing signs of strain on their IT staff, seeking assistance from managed services providers (MSPs) could be the remedy. Here's how an MSP like us can alleviate the pressure and contribute to workplace wellness for all.

Continue reading

The Week in Breach News: 06/19/24 – 06/25/24

Breach-6

This week: Take a look at the cyberattack that has crippled thousands of car dealers around the world and a big data leak for Accenture.

Continue reading

What’s Backup and Disaster Recovery, and Do I Need to Worry About It?

What’s Backup and Disaster Recovery, and Do I Need to Worry About It?

Nowadays, businesses need to be prepared for almost every circumstance. You may have heard the term “BDR” used to describe a method of attaining this level of preparation. We wanted to discuss this term in more depth, covering what it refers to and what you need to do to protect your business should BDR be right for you.

Spoiler alert: it very much is.

Continue reading

Some of the Best Practices for Internal File Sharing

Some of the Best Practices for Internal File Sharing

Ensuring that your organization's file-sharing policies and procedures are built to enhance security can significantly impact collaboration, distinguishing between efficient, streamlined processes and time-purging, wasteful practices. Navigating this terrain can be a challenge. Let’s explore several best practices your organization can adopt to optimize file-sharing.

Continue reading

The Week in Breach News: 06/12/24 – 06/18/24

Breach-5

This week: A hack at a pathology lab causes a massive snarl for the UK’s National Health Service and the Snowflake cloud data platform saga continues.

Continue reading

Prevent the Majority of Threats with Endpoint Security

Prevent the Majority of Threats with Endpoint Security

There are many parts of running a business where you cannot be too careful, one of which is the realm of cybersecurity. Many of the preventative measures you can implement aim to keep issues from making their way to your infrastructure in the first place, which makes sense from an operational standpoint. With an endpoint detection and response solution—or EDR—you’ll take an important step toward keeping most threats off your infrastructure.

Continue reading

With a Massive Botnet Recently Disrupted, Let’s Review What a Botnet Is

With a Massive Botnet Recently Disrupted, Let’s Review What a Botnet Is

It was very recently revealed that a global law enforcement effort took down a massive botnet that was in action for almost a decade. In light of this, we wanted to review what a botnet is and how it works, drawing from these events for some context.

Continue reading

The Week in Breach News: 06/05/24 – 06/11/24

Breach-4

This week: Another big data breach has something in common with other recent large breaches and nation-state hacking in Germany.

Continue reading

The Impact Ransomware Has on All of Us

The Impact Ransomware Has on All of Us

We’ve spent the last few weeks discussing ransomware's impacts on different subsets. First, we discussed how a ransomware attack impacts the customers of the infected business, and then we touched on the infected business itself. To end, we want to touch on ransomware's impacts on society, specifically regarding economic health and geopolitical security, known as third-order harms.

Continue reading

A Man-in-the-Middle Attack is Not to Be Underestimated

A Man-in-the-Middle Attack is Not to Be Underestimated

Have you ever heard of the “man-in-the-middle” attack or MitM? It’s a situation where your data is stolen by an onlooker who situates themselves in the right place at the right time. Data interception is a very real thing that your business should be prepared to fight against. Let’s discuss some strategies you can use to counter these sneaky attacks.

Continue reading

The Week in Breach News: 05/29/24 – 06/04/24

Breach-3

This week: LiveNation/TicketMaster hits a sour note with a major data breach and ransomware at a metal producer rocks the global supply chain.

Continue reading

You May Not Think You’re Popular, but Your Data Certainly Is

You May Not Think You’re Popular, but Your Data Certainly Is

Data is extremely important in the way that most businesses conduct themselves. This results in other people wanting that information, too. Today’s blog will look at how seemingly everyone online is out for your data. 

Continue reading

The Week in Breach News: 05/22/24 – 05/28/24

Breach-2

This week: Hacking at a big pharma services provider leads to a data breach for 11 major drug companies

Continue reading

The Week in Breach News: 05/16/24 – 05/21/24

Breach-1

This week: Hundreds of thousands of records were exposed in three medical breaches, customer data was exposed at a Spanish bank, and  an employee data breach at Nissan.

Continue reading

The Week in Breach News: 05/08/24 – 05/15/24

Breach-6

This week: A fire department loses $250K to hackers, Dell hardware data was stolen, and big trouble for Christie’s as systems go down before a major event.

Continue reading

Professional Services IT Has Come a Long Way

Professional Services IT Has Come a Long Way

Professional services make up a significant portion of the business landscape. They can be broadly defined as any organization with trained professionals at the center offering a service of note. The most common professionals under this umbrella term are lawyers, agents, consultants, and others who help businesses in their day-to-day operations. Let’s explore some of the technology that fuels professional service providers.

Continue reading

The Week in Breach News: 05/01/24 – 05/07/24

Breach-5

This week: Dive into big breaches at Kaiser Permanente and JP Morgan, and see two hacktivist attacks in Belarus.

Continue reading

Opportunity Cost, Return on Investment, and Saving Money with Technology

Opportunity Cost, Return on Investment, and Saving Money with Technology

Part of doing business is understanding certain types of trade-offs related to the decisions you make. Specifically, we want to highlight opportunity cost as it relates to technology. What is the opportunity cost of technology, and why is it an important concept for a business owner to grasp?

Continue reading

News & Updates

InTegriLogic is proud to announce the launch of our new website at www.integrilogic.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact Us

Learn more about what InTegriLogic can do for your business.

InTegriLogic
1931 W Grant Road Suite 310
Tucson, Arizona 85745