SALES: (918) 707-2288

Blog

Office 365 Exchange Users Get Disposable Email Feature

During the 2019 Microsoft Ignite convention, the company announced a new feature they were planning to add to Exchange Online. The new feature, dubbed "plus addressing" would give Office 365 Exchange users ...

For Security, Windows 10 Update Removes Adobe Flash Player

In September of this year, Microsoft announced that they would soon be releasing an optional update designed to remove the Adobe Flash Player from any machine applying the update, and rendering it ...

Notification To Update Microsoft Word Could Be Hidden Malware

If you've spent any time at all surveying the threat landscape, then you're almost certainly familiar with the name Emotet. As one of the largest malware botnets on the planet, it's dangerous ...

Government Warns Increase In Cyber Attacks Targeting Hospitals

Is your business in any way affiliated with or connected to the healthcare industry? If so, be advised that recently, the FBI and the US Cybersecurity and Infrastructure Security Agency (CISA) have ...

Amazon Employee Responsible For User Data Breach

Recently, one or more Amazon employees disclosed customer email addresses to an unknown third party, prompting Amazon to send a notification email out to impacted customers which reads as follows: "We are ...

Some Popular Android Apps Found To Include Malware

Google does an admirable job of keeping its sprawling Play Store free of apps containing malware. Their verification system is world-class. That said, no system is perfect, and that includes Google's. In ...

This New Ransomware Can Infect A Network In Just Minutes

Not all ransomware strains are created equally. Some are designed as slow burns that will infect a target system, expanding its reach for days, or even weeks before striking and locking your ...

Photoshop Testing Security For Images To Prevent Theft And Fakes

Deep Fakes are becoming an increasingly large problem. If you're not familiar with the term, a Deep Fake is an advanced photo or video technique in which an existing person in a ...

Mac And Android Added To GravityRAT Malware’s Targets

Malware comes in all shapes and sizes. Some strains copy and encrypt files. Others serve annoying ads. Still others work quietly in the background, mining this or that cryptocurrency using your computer's ...

WordPress Loginizer Plugin Was Automatically Updated Due To Vulnerability

WordPress tends to take a light-handed approach when it comes to managing the legions of plugins that are compatible with the most popular blogging platform on the planet. This time, however, they're ...

Blog

Even Big Companies Like Nissan Get Hacked

Even Big Companies Like Nissan Get Hacked

Even the largest companies in the world can't claim immunity to hacking, data breaches and momentary lapses in judgment. Nissan is[...]
Adobe Flash Is Done And Flash Content Is Being Blocked

Adobe Flash Is Done And Flash Content Is Being Blocked

Adobe has finally done it, as promised. For more than a year, the company has been slow-walking their iconic Adobe[...]
This New Malware Has A Unique Email Offer

This New Malware Has A Unique Email Offer

The Quaverse Remote Access Trojan--affectionately dubbed QRat--has been with us since at least 2015. It's a good piece of malware because[...]

Locations

Broken Arrow (HQ)

1800 South Elm Place ,Suite 200
Broken Arrow, OK 74012
(918) 707-2288

Company

Since 2007, Integrated Business Technologies has been a leading provider of IT support and consulting, focusing on small and medium sized businesses in the Tulsa and Oklahoma City areas. We have helped hundreds of businesses increase productivity and profitability by making IT a streamlined part of operations. We equip our clients with customized technology solutions for greater operational value and to reduce risk.

Proud Member of

The 20 Elite