Intech Hawaii Receives Cyber Verify “A” Risk Assurance Rating

The MSPAlliance Cyber Verify rating gives customers of cloud & managed services the assurance their provider is using the most current cyber security practices HONOLULU, HAWAII JUNE 15TH 2020 – Integration Technologies (“Intech”) today announced that it has received the MSPAlliance® Cyber Verify™ Risk Assurance Rating for Managed Services and Cloud Providers. Cyber Verify is […]

Intech Hawaii Recognized on CRN’s 2020 MSP500 List

Honolulu, Hawaii, February 18, 2020 – Integration Technologies aka Intech Hawaii, announced today that CRN®, a brand of The Channel Company has named Intech Hawaii to its 2020 Managed Service Provider (MSP) 500 list in the Pioneer 250 category. This popular list identifies North American solution providers that deliver operational efficiencies, IT system improvements, and a higher rate of return […]

Log4j and the Actions that the FTC Is Taking

In a recent CNBC interview, Jen Easterly, the director of the U.S. Cybersecurity and Infrastructure Security Agency, said that “the Log4jvulnerability is the most serious vulnerability I have seen in my decades-long career.” To fully understand why Log4j is such a critical issue and why the Federal Trade Commission (FTC), in particular, is handling investigations […]

CMMC 2.0 Announced

On November 4th, 2021, the Department of Defense (DoD) announced CMMC 2.0, which includes major changes to the CMMC program. Here is a summary of the key changes: CMMC 2.0 has only 3 Maturity Levels, compared to 5. For Maturity Level 2 in CMMC 2.0, there are now only 110 controls, which are completely based […]

Windows 11 and Why Not to Upgrade (Yet)

Windows 11 started its highly anticipated rollout on October 5th. Two months later, Windows devices have been regularly reminding their users that a free upgrade is available. Windows 11 is the company’s first notable rollout in the last six years and includes a litany of new features. The advanced OS comes with strict system requirements. […]

The Importance of Multi-Factor Authentication

Why Your Business Needs Multi-Factor Authentication All businesses have sensitive systems, networks, and data. Certain information like financials and customer records require the utmost protection. There is no better way for a business to achieve security than to set up an authentication system. Most websites have them already in the form of username or email […]

The Enclave CUI Management Model A Necessity for CMMC Compliance

The Enclave CUI Management Model: A Necessity for CMMC Compliance Since the United States Department of Defense (DoD) published the first iteration of the Cybersecurity Maturity Model Certification (CMMC) in early 2020, affected organizations have been reevaluating their cybersecurity strategies in order to ensure compliance. Failing to obtain and maintain a CMMC certification will prohibit […]

FTC Finalizes Safeguard Rules

FTC Finalizes Safeguard Rules In October of 2021, the Federal Trade Commission (FTC) amended their Safeguard Rule after first announcing intentions to do so in 2019. While this provided relevant companies with some warning, many are overwhelmed with the new set of regulations outlined. Despite this, it is crucial to remember that these measures are […]

FBI Warning Scammers Mailing USB Drives to Unsuspecting Victims

FBI Warning: Scammers Mailing USB Drives to Unsuspecting Victims Traditional advice regarding scams has been to watch for suspicious emails, texts, websites, and other threats that arrive via electronic means. Computers, tablets, and phones have been the primary gateways that hackers use to gain access to sensitive information and financial data. New techniques are regularly […]

False Claims Act and CMMC

The False Claims Act and CMMC Since the Department of Defense (DoD) became aware of some data breaches in 2019 that involved leaks of unclassified information, they’ve sought to establish new standards of data safety with their contractors. The Cybersecurity Maturity Model Certification (CMMC) outlines 5 levels of cybersecurity protocols, each pertaining to different levels […]