• Home
  • Services
  • About Us
    • Our Team
  • Blog
  • Contact Us
    • Careers
Is That Really a Text from Your CEO… or Is It a Scam?

Is That Really a Text from Your CEO… or Is It a Scam?

by zdnconsulting-admin | Mar 31, 2023 | Cybersecurity

Imagine you’re going about your day when suddenly you receive a text from the CEO. The head of the company is asking for your help. They’re out doing customer visits and someone else dropped the ball in providing gift cards. The CEO needs you to buy six $200 gift...
How Using the SLAM Method Can Improve Phishing Detection

How Using the SLAM Method Can Improve Phishing Detection

by zdnconsulting-admin | Sep 29, 2022 | Cybersecurity

There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade or two, it has been the main delivery method for all types of attacks. Ransomware, credential theft, database breaches, and more launch via a phishing...
How to Protect Your Online Accounts from Being Breached

How to Protect Your Online Accounts from Being Breached

by zdnconsulting-admin | Sep 15, 2022 | Cybersecurity

Stolen login credentials are a hot commodity on the Dark Web. There’s a price for every type of account from online banking to social media. For example, hacked social media accounts will go for between $30 to $80 each. The rise in reliance on cloud services has...
Did You Just Receive a Text from Yourself? Learn What Smishing Scams to Expect

Did You Just Receive a Text from Yourself? Learn What Smishing Scams to Expect

by zdnconsulting-admin | Sep 8, 2022 | Cybersecurity

How many text messages from companies do you receive today as compared to about two years ago? If you’re like many people, it’s quite a few more. This is because retailers have begun bypassing bloated email inboxes. They are urging consumers to sign up for SMS alerts...
6 Discontinued Technology Tools You Should Not Be Using Any Longer

6 Discontinued Technology Tools You Should Not Be Using Any Longer

by zdnconsulting-admin | Sep 1, 2022 | Cybersecurity, IT Management

One constant about technology is that it changes rapidly. Tools that were once staples, like Internet Explorer and Adobe Flash, age out. New tools replace those that are obsolete. Discontinued technology can leave computers and networks vulnerable to attacks. While...
Which Form of MFA Is the Most Secure? Which Is the Most Convenient?

Which Form of MFA Is the Most Secure? Which Is the Most Convenient?

by zdnconsulting-admin | Jun 13, 2022 | Cybersecurity

Credential theft is now at an all-time high and is responsible for more data breaches than any other type of attack. With data and business processes now largely cloud-based, a user’s password is the quickest and easiest way to conduct many different types of...
« Older Entries

Recent Posts

  • Why Downtime is Costing Your Business More Than You Think
  • wiseman
  • New Name, Same Team
  • Is That Really a Text from Your CEO… or Is It a Scam?
  • How Using the SLAM Method Can Improve Phishing Detection

Recent Comments

No comments to show.

Get in touch

Call us or send a message.  We look forward to working with you!

Call Us Now:

616-600-4300

Email:

[email protected]

Address:

4250 Airline Rd
Suite 1
Norton Shores, MI 49444

Send a Message

*We do not collect phone number for SMS contact

Copyright – Integrity Tech Partners – All Rights Reserved – Built by WP Harbor
SMS Privacy Policy | SMS Terms