Technical Support: 412-349-6678 | Incident Response

Blog & Latest News

Botnets - what are botnets and how to counter them - Ideal Integrations

What Are Botnets and How to Address Them

Botnet hackers obtain access to computers, servers, and/or IoT devices, then install software to perform command and control (C2) functions. These infected devices become slave devices, or robots, for the hacker who uses them to form a network (roBOT + NETwork = BOTNET). Historically, botnets used a client-server model to...
Vulnerabilities in Citrix, DNS, and F5

Vulnerabilities to DNS, Citrix, and F5

Customers with monitoring contracts already know that Ideal Integration is actively patching a series of critical vulnerabilities. For everyone else, please ensure your IT team already is addressing these issues or contact us immediately for us to review your network and patching. Windows DNS Server Vulnerability Vulnerability CVE-2020-1350 (aka: SIGRed) takes...
SLL - HTTPS guide

A Guide to HTTPS Changes

In February 2020, Apple unilaterally declared that it would no longer recognize TLS certificates that were older than 398 days old. This decision drove industry adoption of the new limitation, which will cause some headaches for IT teams. This guide quickly explains why the changes were made, and how they will...
Remote Computer Setup - 3 common cloud backup mistakes

Avoid These 3 Common Cloud Backup Mistakes

If you're new to cloud computing, you might tend to rely heavily on cloud service providers (i.e. Amazon Web Services, Microsoft Azure, or VMWare).While these companies provide excellent cloud solutions, you still need someone in place to actively manage your backups. Otherwise, they can become vulnerable in the cloud.There are...
It gaps and adjustments after covid-19

Post-Pandemic IT Gaps & Adjustments

First we were quarantined, then we tried to come back to the office. Now, we may need to quarantine again? For those managing these endless transitions, stress levels continue to rise thanks to changing roles, the vulnerable expanding attack surface, and unforeseen gaps in our security. Changing Requirements for CISOs...