What is CMMC & NIST Compliance?

There isn’t a more convenient place to store sensitive, important information than on your technological devices. However, the networks and systems that we trust to keep this information safe are increasingly vulnerable to cyberattacks. These cyberattacks can take many forms, but they are most commonly used to access and/or modify sensitive data, interrupt business processes […]

Integration Technologies Receives Cyber Verify “A” Risk Assurance Rating

The MSPAlliance Cyber Verify rating gives customers of cloud & managed services the assurance their provider is using the most current cyber security practices HONOLULU, HAWAII JUNE 15TH 2020 – Integration Technologies (“Intech”) today announced that it has received the MSPAlliance® Cyber Verify™ Risk Assurance Rating for Managed Services and Cloud Providers. Cyber Verify is […]

Integration Technologies Recognized on CRN’s 2020 MSP500 List

Honolulu, Hawaii, February 18, 2020 – Integration Technologies (Intech), announced today that CRN®, a brand of The Channel Company has named Intech to its 2020 Managed Service Provider (MSP) 500 list in the Pioneer 250 category. This popular list identifies North American solution providers that deliver operational efficiencies, IT system improvements, and a higher rate of return on […]

Log4j and the Actions that the FTC Is Taking

In a recent CNBC interview, Jen Easterly, the director of the U.S. Cybersecurity and Infrastructure Security Agency, said that “the log4j vulnerability is the most serious vulnerability I have seen in my decades-long career.” To fully understand why log4j is such a critical issue and why the FTC, in particular, is handling investigations and punishments […]

CMMC 2.0 Announced

On November 4th, 2021, the Department of Defense (DoD) announced CMMC 2.0, which includes major changes to the CMMC program. Here is a summary of the key changes: CMMC 2.0 has only 3 Maturity Levels, compared to 5. For Maturity Level 2 in CMMC 2.0, there are now only 110 controls, which are completely based […]

Windows 11 and Why Not to Upgrade (Yet)

Windows 11 started its highly anticipated rollout on October 5th. Two months later, Windows devices have been regularly reminding their users that a free upgrade is available. Windows 11 is the company’s first notable rollout in the last six years and includes a litany of new features. The advanced OS comes with strict system requirements. […]

The Importance of Multi-Factor Authentication

Why Your Business Needs Multi-Factor Authentication All businesses have sensitive systems, networks, and data. Certain information like financials and customer records require the utmost protection. There is no better way for a business to achieve security than to set up an authentication system. Most websites have them already in the form of username or email […]

The Enclave CUI Management Model A Necessity for CMMC Compliance

The Enclave CUI Management Model: A Necessity for CMMC Compliance Since the United States Department of Defense (DoD) published the first iteration of the Cybersecurity Maturity Model Certification (CMMC) in early 2020, affected organizations have been reevaluating their cybersecurity strategies in order to ensure compliance. Failing to obtain and maintain a CMMC certification will prohibit […]

FTC Finalizes Safeguard Rules

FTC Finalizes Safeguard Rules In October of 2021, the Federal Trade Commission (FTC) amended their Safeguard Rule after first announcing intentions to do so in 2019. While this provided relevant companies with some warning, many are overwhelmed with the new set of regulations outlined. Despite this, it is crucial to remember that these measures are […]

FBI Warning Scammers Mailing USB Drives to Unsuspecting Victims

FBI Warning: Scammers Mailing USB Drives to Unsuspecting Victims Traditional advice regarding scams has been to watch for suspicious emails, texts, websites, and other threats that arrive via electronic means. Computers, tablets, and phones have been the primary gateways that hackers use to gain access to sensitive information and financial data. New techniques are regularly […]