Technical Support: 412-349-6678 | Incident Response

Blog & Latest News

Secure internal infrastructure - women working on computers

Why COVID-19 Has Made Outsourcing Necessary

As the Covid-19 pandemic continues, the economic strain falls hardest upon the Small-to-Medium Business (SMB) category – businesses with annual revenues less than $500m. Economic uncertainty adds additional strain to the everyday struggle and is forcing many SMB entities to consider outsourcing.Outsourcing provides many benefits, but it's not without risk. ...
Botnets - what are botnets and how to counter them - Ideal Integrations

What Are Botnets and How to Address Them

Botnet hackers obtain access to computers, servers, and/or IoT devices, then install software to perform command and control (C2) functions. These infected devices become slave devices, or robots, for the hacker who uses them to form a network (roBOT + NETwork = BOTNET). Historically, botnets used a client-server model to...
Security Updates for July 2021

Vulnerabilities to DNS, Citrix, and F5

Customers with monitoring contracts already know that Ideal Integrations is actively patching a series of critical vulnerabilities. For everyone else, please ensure your IT team already is addressing these issues or contact us immediately for us to review your network and patching. Windows DNS Server Vulnerability Vulnerability CVE-2020-1350 (aka: SIGRed) takes advantage...
SLL - HTTPS guide

A Guide to HTTPS Changes

In February 2020, Apple unilaterally declared that it would no longer recognize TLS certificates that were older than 398 days old. This decision drove industry adoption of the new limitation, which will cause some headaches for IT teams. This guide quickly explains why the changes were made, and how they will...
Remote Computer Setup - 3 common cloud backup mistakes

Avoid These 3 Common Cloud Backup Mistakes

If you're new to cloud computing, you might tend to rely heavily on cloud service providers (i.e. Amazon Web Services, Microsoft Azure, or VMWare).While these companies provide excellent cloud solutions, you still need someone in place to actively manage your backups. Otherwise, they can become vulnerable in the cloud.There are...