Resources

Access our latest resources and blogs about managed technology, cybersecurity, and compliance.

Intech Hawaii Receives Cyber Verify “A” Risk Assurance Rating

Intech Hawaii Receives Cyber Verify “A” Risk Assurance Rating

The MSPAlliance Cyber Verify rating gives customers of cloud & managed services the assurance their provider is using the most current cyber security practices HONOLULU, HAWAII JUNE 15TH 2020 – Integration Technologies (“Intech”) today announced that it has received the MSPAlliance® Cyber Verify™ Risk Assurance Rating for Managed Services and ...
Intech Hawaii Recognized on CRN’s 2020 MSP 500 List

Intech Hawaii Recognized on CRN’s 2020 MSP 500 List

Honolulu, Hawaii, February 18, 2020 – Integration Technologies aka Intech Hawaii, announced today that CRN®, a brand of The Channel Company has named Intech Hawaii to its 2020 Managed Service Provider (MSP) 500 list in the Pioneer 250 category. This popular list identifies North American solution providers that deliver operational efficiencies, IT system improvements, and ...
Log4j and the Actions that the FTC Is Taking

Log4j and the Actions that the FTC Is Taking

In a recent CNBC interview, Jen Easterly, the director of the U.S. Cybersecurity and Infrastructure Security Agency, said that “the Log4jvulnerability is the most serious vulnerability I have seen in my decades-long career.” To fully understand why Log4j is such a critical issue and why the Federal Trade Commission (FTC), ...
CMMC 2.0 Announced

CMMC 2.0 Announced

On November 4th, 2021, the Department of Defense (DoD) announced CMMC 2.0, which includes major changes to the CMMC program. Here is a summary of the key changes: CMMC 2.0 has only 3 Maturity Levels, compared to 5. For Maturity Level 2 in CMMC 2.0, there are now only 110 ...
Windows 11 and Why Not to Upgrade Yet

Windows 11 and Why Not to Upgrade (Yet)

Windows 11 started its highly anticipated rollout on October 5th. Two months later, Windows devices have been regularly reminding their users that a free upgrade is available. Windows 11 is the company’s first notable rollout in the last six years and includes a litany of new features. The advanced OS ...
The Importance of Multi-Factor Authentication

The Importance of Multi-Factor Authentication

Why Your Business Needs Multi-Factor Authentication All businesses have sensitive systems, networks, and data. Certain information like financials and customer records require the utmost protection. There is no better way for a business to achieve security than to set up an authentication system. Most websites have them already in the ...
The Enclave CUI Management Model A Necessity for CMMC Compliance

The Enclave CUI Management Model A Necessity for CMMC Compliance

The Enclave CUI Management Model: A Necessity for CMMC Compliance Since the United States Department of Defense (DoD) published the first iteration of the Cybersecurity Maturity Model Certification (CMMC) in early 2020, affected organizations have been reevaluating their cybersecurity strategies in order to ensure compliance. Failing to obtain and maintain ...
FTC Finalizes Safeguard Rules

FTC Finalizes Safeguard Rules

FTC Finalizes Safeguard Rules In October of 2021, the Federal Trade Commission (FTC) amended their Safeguard Rule after first announcing intentions to do so in 2019. While this provided relevant companies with some warning, many are overwhelmed with the new set of regulations outlined. Despite this, it is crucial to ...
FBI Warning Scammers Mailing USB Drives to Unsuspecting Victims

FBI Warning Scammers Mailing USB Drives to Unsuspecting Victims

FBI Warning: Scammers Mailing USB Drives to Unsuspecting Victims Traditional advice regarding scams has been to watch for suspicious emails, texts, websites, and other threats that arrive via electronic means. Computers, tablets, and phones have been the primary gateways that hackers use to gain access to sensitive information and financial ...