SALES: (918) 707-2288

Blog

Office 365 Exchange Users Get Disposable Email Feature

During the 2019 Microsoft Ignite convention, the company announced a new feature they were planning to add to Exchange Online. The new feature, dubbed "plus addressing" would give Office 365 Exchange users ...

For Security, Windows 10 Update Removes Adobe Flash Player

In September of this year, Microsoft announced that they would soon be releasing an optional update designed to remove the Adobe Flash Player from any machine applying the update, and rendering it ...

Notification To Update Microsoft Word Could Be Hidden Malware

If you've spent any time at all surveying the threat landscape, then you're almost certainly familiar with the name Emotet. As one of the largest malware botnets on the planet, it's dangerous ...

Government Warns Increase In Cyber Attacks Targeting Hospitals

Is your business in any way affiliated with or connected to the healthcare industry? If so, be advised that recently, the FBI and the US Cybersecurity and Infrastructure Security Agency (CISA) have ...

Amazon Employee Responsible For User Data Breach

Recently, one or more Amazon employees disclosed customer email addresses to an unknown third party, prompting Amazon to send a notification email out to impacted customers which reads as follows: "We are ...

Some Popular Android Apps Found To Include Malware

Google does an admirable job of keeping its sprawling Play Store free of apps containing malware. Their verification system is world-class. That said, no system is perfect, and that includes Google's. In ...

This New Ransomware Can Infect A Network In Just Minutes

Not all ransomware strains are created equally. Some are designed as slow burns that will infect a target system, expanding its reach for days, or even weeks before striking and locking your ...

Photoshop Testing Security For Images To Prevent Theft And Fakes

Deep Fakes are becoming an increasingly large problem. If you're not familiar with the term, a Deep Fake is an advanced photo or video technique in which an existing person in a ...

Mac And Android Added To GravityRAT Malware’s Targets

Malware comes in all shapes and sizes. Some strains copy and encrypt files. Others serve annoying ads. Still others work quietly in the background, mining this or that cryptocurrency using your computer's ...

WordPress Loginizer Plugin Was Automatically Updated Due To Vulnerability

WordPress tends to take a light-handed approach when it comes to managing the legions of plugins that are compatible with the most popular blogging platform on the planet. This time, however, they're ...

Blog

New Graphene Technology May Increase Hard Drive Storage

New Graphene Technology May Increase Hard Drive Storage

HDDs are old, well understood technology. They haven't changed much in recent years. In fact, increasingly, people are writing them[...]
Some Amazon Device Features May Have Security Risks

Some Amazon Device Features May Have Security Risks

Have you heard of Amazon Sidewalk? If not, it's definitely something you should be aware of. Depending on your point of[...]
Email Unsubscribe Scam Can Easily Fool Any User

Email Unsubscribe Scam Can Easily Fool Any User

Scammers are increasingly relying on a tried and true bit of social engineering to fool unsuspecting users into unwittingly signing[...]

Locations

Broken Arrow (HQ)

1800 South Elm Place ,Suite 200
Broken Arrow, OK 74012
(918) 707-2288

Newsletter

Join our Newsletter to get the latest technology news and special offers.


Company

Since 2007, Integrated Business Technologies has been a leading provider of IT support and consulting, focusing on small and medium sized businesses in the Tulsa and Oklahoma City areas. We have helped hundreds of businesses increase productivity and profitability by making IT a streamlined part of operations. We equip our clients with customized technology solutions for greater operational value and to reduce risk.

Proud Member of

The 20 Elite