SALES: (918) 707-2288

Blog

Update Adobe Acrobat Reader To Patch Security Issue

A lot of people have a complicated relationship with Adobe Acrobat reader. On the one hand, it's an undeniably useful piece of software and one of the most widely installed and used ...

Cyber Attack Found At Gaming Company Capcom

Are you a gamer? Are you a fan of Resident Evil, Devil May Cry, Mega Man, Monster Hunter or Street Fighter? All of those games have something in common. All were developed ...

Office 365 Exchange Users Get Disposable Email Feature

During the 2019 Microsoft Ignite convention, the company announced a new feature they were planning to add to Exchange Online. The new feature, dubbed "plus addressing" would give Office 365 Exchange users ...

For Security, Windows 10 Update Removes Adobe Flash Player

In September of this year, Microsoft announced that they would soon be releasing an optional update designed to remove the Adobe Flash Player from any machine applying the update, and rendering it ...

Notification To Update Microsoft Word Could Be Hidden Malware

If you've spent any time at all surveying the threat landscape, then you're almost certainly familiar with the name Emotet. As one of the largest malware botnets on the planet, it's dangerous ...

Government Warns Increase In Cyber Attacks Targeting Hospitals

Is your business in any way affiliated with or connected to the healthcare industry? If so, be advised that recently, the FBI and the US Cybersecurity and Infrastructure Security Agency (CISA) have ...

Amazon Employee Responsible For User Data Breach

Recently, one or more Amazon employees disclosed customer email addresses to an unknown third party, prompting Amazon to send a notification email out to impacted customers which reads as follows: "We are ...

Some Popular Android Apps Found To Include Malware

Google does an admirable job of keeping its sprawling Play Store free of apps containing malware. Their verification system is world-class. That said, no system is perfect, and that includes Google's. In ...

This New Ransomware Can Infect A Network In Just Minutes

Not all ransomware strains are created equally. Some are designed as slow burns that will infect a target system, expanding its reach for days, or even weeks before striking and locking your ...

Mac And Android Added To GravityRAT Malware’s Targets

Malware comes in all shapes and sizes. Some strains copy and encrypt files. Others serve annoying ads. Still others work quietly in the background, mining this or that cryptocurrency using your computer's ...

Blog

Identity Thefts Had Huge Surge in 2020

Identity Thefts Had Huge Surge in 2020

Trends come and go in the hacking world. A few years ago, stealing credit card numbers was the crime of[...]
Healthcare Under Attack By Blast From The Past Ransomware

Healthcare Under Attack By Blast From The Past Ransomware

The year 2017 was an eternity ago in internet time, but back in those ancient days, there was one name[...]
Why So Many Facebook Users Were Recently Logged Out

Why So Many Facebook Users Were Recently Logged Out

If you're a regular Facebook user, you probably just stay logged in so you can quickly get updates about what's[...]

Locations

Broken Arrow (HQ)

1800 South Elm Place ,Suite 200
Broken Arrow, OK 74012
(918) 707-2288

Company

Since 2007, Integrated Business Technologies has been a leading provider of IT support and consulting, focusing on small and medium sized businesses in the Tulsa and Oklahoma City areas. We have helped hundreds of businesses increase productivity and profitability by making IT a streamlined part of operations. We equip our clients with customized technology solutions for greater operational value and to reduce risk.

Proud Member of

The 20 Elite