SALES: (918) 707-2288

Blog

Cyber Attack Found At Gaming Company Capcom

Are you a gamer? Are you a fan of Resident Evil, Devil May Cry, Mega Man, Monster Hunter or Street Fighter? All of those games have something in common. All were developed ...

Office 365 Exchange Users Get Disposable Email Feature

During the 2019 Microsoft Ignite convention, the company announced a new feature they were planning to add to Exchange Online. The new feature, dubbed "plus addressing" would give Office 365 Exchange users ...

For Security, Windows 10 Update Removes Adobe Flash Player

In September of this year, Microsoft announced that they would soon be releasing an optional update designed to remove the Adobe Flash Player from any machine applying the update, and rendering it ...

Notification To Update Microsoft Word Could Be Hidden Malware

If you've spent any time at all surveying the threat landscape, then you're almost certainly familiar with the name Emotet. As one of the largest malware botnets on the planet, it's dangerous ...

Government Warns Increase In Cyber Attacks Targeting Hospitals

Is your business in any way affiliated with or connected to the healthcare industry? If so, be advised that recently, the FBI and the US Cybersecurity and Infrastructure Security Agency (CISA) have ...

Amazon Employee Responsible For User Data Breach

Recently, one or more Amazon employees disclosed customer email addresses to an unknown third party, prompting Amazon to send a notification email out to impacted customers which reads as follows: "We are ...

Some Popular Android Apps Found To Include Malware

Google does an admirable job of keeping its sprawling Play Store free of apps containing malware. Their verification system is world-class. That said, no system is perfect, and that includes Google's. In ...

This New Ransomware Can Infect A Network In Just Minutes

Not all ransomware strains are created equally. Some are designed as slow burns that will infect a target system, expanding its reach for days, or even weeks before striking and locking your ...

Photoshop Testing Security For Images To Prevent Theft And Fakes

Deep Fakes are becoming an increasingly large problem. If you're not familiar with the term, a Deep Fake is an advanced photo or video technique in which an existing person in a ...

Mac And Android Added To GravityRAT Malware’s Targets

Malware comes in all shapes and sizes. Some strains copy and encrypt files. Others serve annoying ads. Still others work quietly in the background, mining this or that cryptocurrency using your computer's ...

Blog

Ficker Malware Tricks People To Get Their Passwords

Ficker Malware Tricks People To Get Their Passwords

Jiri Kropac, the head of ESET's Threat Detection Labs, recently reported a new malware campaign to be aware of. This one[...]
New Devices May Not Use Default Passwords

New Devices May Not Use Default Passwords

You know how, when you buy a new router to set up a home network, it comes with a default[...]
Hackers Might Guess Your Passwords Easier Than You Thought

Hackers Might Guess Your Passwords Easier Than You Thought

Password security has long been a thorn in the side of IT Security Professionals. It's easy enough to understand why.[...]

Locations

Broken Arrow (HQ)

1800 South Elm Place ,Suite 200
Broken Arrow, OK 74012
(918) 707-2288

Newsletter

Join our Newsletter to get the latest technology news and special offers.


Company

Since 2007, Integrated Business Technologies has been a leading provider of IT support and consulting, focusing on small and medium sized businesses in the Tulsa and Oklahoma City areas. We have helped hundreds of businesses increase productivity and profitability by making IT a streamlined part of operations. We equip our clients with customized technology solutions for greater operational value and to reduce risk.

Proud Member of

The 20 Elite