News
Stay up-to-date with key insights and tips from Integra Networks related to cyber security, cloud computing, end user computing, and IT infrastructure solutions for government and private sector organizations.
Plurilock’s Integra Networks Wins Tenable’s Top Canadian Regional Partner Award
VANCOUVER, BRITISH COLUMBIA—Plurilock Security Inc. (TSXV: PLUR) (OTCQB: PLCKF) and related subsidiaries (“Plurilock” or the “Company”), an identity-centric cybersecurity solutions provider for workforces, announced today that its wholly-owned subsidiary, Integra...
Why Cyber Security and Business Continuity is Connected
For years, the practice of disaster recovery was a driving force in business. It represented due diligence and a host of plans and exercises that ensured that the company would remain operational in a catastrophe. For most, catastrophe meant something...
Is Your Active Directory Secure? Are You Sure?
As digital infrastructure continues to evolve, Active Directory remains a severe and ever-present security risk that can present cybercriminals with a clear attack patch to the inner workings of any organization. Furthermore, regardless of how good one's Active...
Government Advisories Warn of APT Activity Resulting from Russian Invasion of Ukraine
Government agencies publish warnings and guidance for organizations to defend themselves against advanced persistent threat groups. Update February 25: The Identifying affected systems section has been updated to announce the availability of scan templates for the...
Finding the Hidden Gold at a Device’s End of Life
When a new laptop or other electronic device arrives on an employee’s desk, where does the previous equipment end up? This short documentary explores how Lenovo’s Asset Recovery Services help find new lives for older devices, while still maintaining data security and privacy. The lives of devices taken out of service are extended by reusing, refurbishing, reclaiming, and recycling of products and parts, ultimately meaning that less than 1% of the device will go to the landfill.
What Is IaC and Why Does It Matter to the CISO?
Many vendors and security companies are buying or building Infrastructure as Code (IaC) security into their portfolios, and this trend is only expected to continue. Here’s what you need to know.
What It Takes to Harness the Potential of Hybrid Cloud
For an energy facility that serves tens of millions, a high magnitude earthquake or strong flood can trigger a catastrophic power failure with rippling consequences. The estimated loss for just an hour of downtime can rack up losses of up to millions of dollars....
Defending Users’ NAS Devices From Evolving Threats
Threats to the internet of things (IoT) continue to evolve as users and businesses grow increasingly reliant on these tools for constant connectivity, access to information and data, and workflow continuity. Cybercriminals have taken notice of this dependence and...
Cyber Security Bulletin: Apache Log4j
We are sure you are aware of the recent discovery of the very damaging Log4j Vulnerability with Apache. Below you will find free resources created by Tenable—our cyber security partner—that will help you detect the Log4j vulnerability. Tenable Plugins & Optimal...
CVE-2021-44228: Proof-of-Concept for Critical Apache Log4j Remote Code Execution Vulnerability Available (Log4Shell)
Critical vulnerability in the popular logging library, Log4j 2, impacts a number of services and applications, including Minecraft, Steam and Apple iCloud. Attackers have begun actively scanning for and attempting to exploit the flaw. Update December 11: The...