Coronavirus Emails Being Used to Spread Malware

IT Security Word Cloud

As the Coronavirus continues to stir widespread fear of a global public health crisis, cyber criminals are using it as a means to spread a rather different sort of virus. Cyber security firms have found malicious emails, disguised as official notifications from health organisations, containing Word Documents, Video clips and PDF files, indicating they contain…


Is It Time To Rethink Your Password Policy?

Many people still make the mistake of trusting the same password to protect different online accounts, not realising that if one site suffers a data breach, that it may allow hackers to break in to other accounts elsewhere. It is more important than ever to ensure that all of your passwords are unique, as well…


Integrity IT Aim to Become the First Carbon Neutral IT Service Provider in Cumbria

Sustainable IT

While many environmental groups are focused on limiting emissions from the automotive and aviation industries, it is the communications industry that is on course to generate the most carbon emissions. Data centres already consume roughly 3% of all globally generated power and account for approximately 2% of greenhouse gas emissions – a carbon footprint equivalent…


RIP Windows 7

GCHQ and The National Cyber Security Centre have warned people not to use Windows 7 computers for internet banking from today, 14th January. NCSC stated that devices still using the operating system which is now unsupported, will be more prone to attacks as Cyber criminal’s take advantage of the fact that Microsoft will no longer…


Travelex Website still down following New Years Eve Cyber Attack

On New Year’s Eve foreign currency exchange service Travelex took its systems offline after discovering a virus. The company website is still offline, showing only a “Planned Maintenance” message in a number of languages. Travelex are keeping very quiet about the situation and customers have not been sent any communication about the cyber attack, but…


The internet is running out of IPv4 addresses, but why are we still not ready for IPv6?

IPv6 was officially launched in 2012 but had already been in existence for a number of years and had already been implemented on all major operating systems used by businesses including Microsoft Server 2008 and Windows Vista.  Long before that, it had been widely acknowledged that we were going to run out of IPv4 addresses.…


HPE Issues SSD Failure Warning

Hewlett Packard Enterprise (HPE) announced earlier this week that some of their Solid State Drives (SSDs) will fail after exactly 32,768 hours of operation time, which translates to 3 years, 270 days and 8 hours.  A lot less than the normal lifespan of these products. Some of which can carry a five year warranty. In…


An Introduction to “High Availability”

With an increased demand for reliable IT network infrastructures, the term High Availability (or HA) is becoming very popular. Why is HA Important? A 13 minute network outage for Amazon in June 2008 cost them close to $31,000 per minute, based on the previous quarter’s global revenue of $4.13 billion. Based on current figures, unexpected downtime would…


Protecting against vulnerabilities using HyperClear & Core Scheduler

In recent years, attackers have discovered sophisticated techniques which can exploit vulnerabilities in CPU hardware. Remember the “Meltdown” and “Spectre” bugs in January 2018? In very basic terms, these bugs exploited Hyper-Threading technology to allow a virtual machine running on a processor core to observe data in the CPU cache for other virtual machines running…


The Benefits of 802.1x Authentication for WiFi Networks

When a user logs onto a traditional WiFi network which uses WPA-PSK or WPA2-PSK network (PSK standing for ‘pre-shared key’), authentication occurs when the user enters the correct security key, they’re then able to connect to the wireless network.   This scenario becomes problematic for larger businesses. Knowing exactly who uses your network (or who…