Have a Question?
Click the tabs below to find information about our company, security, and online safety for children
Integrity is based in Des Moines, Iowa which is centrally located between Chicago, Minneapolis, Kansas City and Omaha. Our primary focus is on the Midwest however we do have clients across the country.
Because of our location in the Midwest, Integrity is able to keep our rates extremely competitive. Some of our clients in larger cities have found it less expensive to utilize our services even though we have to travel to their location. Regardless of cost however, Integrity is a partner you can trust and the value in that is immeasurable.
Web Site Terms and Conditions of Use:
By accessing this web site, you are agreeing to be bound by these web site Terms and Conditions of Use, all applicable laws and regulations, and agree that you are responsible for compliance with any applicable local laws. If you do not agree with any of these terms, you are prohibited from using or accessing this site. The materials contained in this web site are protected by applicable copyright and trade mark law.
2. USE LICENSE
a. Permission is granted to temporarily download one copy of the materials (information or software) on Integrity Technology Systems, Inc.'s web site for personal, non-commercial transitory viewing only. This is the grant of a license, not a transfer of title, and under this license you may not:
i. modify or copy the materials;
ii. use the materials for any commercial purpose, or for any public display (commercial or non-commercial);
iii. attempt to decompile or reverse engineer any software contained on Integrity Technology Systems, Inc.'s web site;
iv. remove any copyright or other proprietary notations from the materials; or
v. transfer the materials to another person or "mirror" the materials on any other server.
b. This license shall automatically terminate if you violate any of these restrictions and may be terminated by Integrity Technology Systems, Inc. at any time. Upon terminating your viewing of these materials or upon the termination of this license, you must destroy any downloaded materials in your possession whether in electronic or printed format.
The materials on Integrity Technology Systems, Inc.'s web site are provided "as is". Integrity Technology Systems, Inc. makes no warranties, expressed or implied, and hereby disclaims and negates all other warranties, including without limitation, implied warranties or conditions of merchantability, fitness for a particular purpose, or non-infringement of intellectual property or other violation of rights. Further, Integrity Technology Systems, Inc. does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on its Internet web site or otherwise relating to such materials or on any sites linked to this site.
In no event shall Integrity Technology Systems, Inc. or its suppliers be liable for any damages (including, without limitation, damages for loss of data or profit, or due to business interruption,) arising out of the use or inability to use the materials on Integrity Technology Systems, Inc.'s Internet site, even if Integrity Technology Systems, Inc. or a Integrity Technology Systems, Inc. authorized representative has been notified orally or in writing of the possibility of such damage. Because some jurisdictions do not allow limitations on implied warranties, or limitations of liability for consequential or incidental damages, these limitations may not apply to you.
5. REVISIONS AND ERRATA
The materials appearing on Integrity Technology Systems, Inc.'s web site could include technical, typographical, or photographic errors. Integrity Technology Systems, Inc. does not warrant that any of the materials on its web site are accurate, complete, or current. Integrity Technology Systems, Inc. may make changes to the materials contained on its web site at any time without notice. Integrity Technology Systems, Inc. does not, however, make any commitment to update the materials.
Integrity Technology Systems, Inc. has not reviewed all of the sites linked to its Internet web site and is not responsible for the contents of any such linked site. The inclusion of any link does not imply endorsement by Integrity Technology Systems, Inc. of the site. Use of any such linked web site is at the user's own risk.
8. GOVERNING LAW
Any claim relating to Integrity Technology Systems, Inc.'s web site shall be governed by the laws of the State of Iowa without regard to its conflict of law provisions.
Personal identification information
We may collect personal identification information from Users in a variety of ways, including, but not limited to, when Users visit our site, subscribe to the newsletter, fill out a form, and in connection with other activities, services, features or resources we make available on our Site. Users may be asked for, as appropriate, name, email address, mailing address, phone number. Users may, however, visit our Site anonymously. We will collect personal identification information from Users only if they voluntarily submit such information to us. Users can always refuse to supply personally identification information, except that it may prevent them from engaging in certain Site related activities.
Non-personal identification information
We may collect non-personal identification information about Users whenever they interact with our Site. Non-personal identification information may include the browser name, the type of computer and technical information about Users means of connection to our Site, such as the operating system and the Internet service providers utilized and other similar information.
Web browser cookies
How we use collected information
Integrity Technology Systems, Inc. may collect and use Users personal information for the following purposes:
- To improve customer service Information you provide helps us respond to your customer service requests and support needs more efficiently.
- To improve our Site We may use feedback you provide to improve our products and services.
- To run a promotion, contest, survey or other Site feature To send Users information they agreed to receive about topics we think will be of interest to them.
- To send periodic emails We may use the email address to send User information and updates pertaining to their order. It may also be used to respond to their inquiries, questions, and/or other requests. If User decides to opt-in to our mailing list, they will receive emails that may include company news, updates, related product or service information, etc. If at any time the User would like to unsubscribe from receiving future emails, we include detailed unsubscribe instructions at the bottom of each email or User may contact us via our Site.
How we protect your information
We adopt appropriate data collection, storage and processing practices and security measures to protect against unauthorized access, alteration, disclosure or destruction of your personal information, username, password, transaction information and data stored on our Site.
Sharing your personal information
We do not sell, trade, or rent Users personal identification information to others. We may share generic aggregated demographic information not linked to any personal identification information regarding visitors and users with our business partners, trusted affiliates and advertisers for the purposes outlined above.
Third party websites
Users may find advertising or other content on our Site that link to the sites and services of our partners, suppliers, advertisers, sponsors, licensors and other third parties. We do not control the content or links that appear on these sites and are not responsible for the practices employed by websites linked to or from our Site. In addition, these sites or services, including their content and links, may be constantly changing. These sites and services may have their own privacy policies and customer service policies. Browsing and interaction on any other website, including websites which have a link to our Site, is subject to that website's own terms and policies.
Compliance with children's online privacy protection act
Protecting the privacy of the very young is especially important. For that reason, we never collect or maintain information at our Site from those we actually know are under 13, and no part of our website is structured to attract anyone under 13.
Your acceptance of these terms
Integrity performs ethical phishing tactics to reveal potential vulnerabilities an organization has to real attacks. These phishing techniques help organizations understand the proper training methods, which need to be implemented to help educate employees. Integrity phishing attacks are a safe way to test an organization's employee security methods and prepare it for real threats and malicious attacks.
Without proper training, an employee can unknowingly open an email and click a link that can expose an organization’s confidential information. This process is called Phishing.
Phishing - the practice of luring unsuspecting Internet users to a fake Web site by using authentic-looking email with the real organization's logo, in an attempt to steal passwords, financial or personal information, or introduce a virus attack; the creation of a Web site replica for fooling unsuspecting Internet users into submitting personal or financial information or passwords (dictionary.com)
A firewall is either a software or hardware appliance that acts as a gatekeeper of data being sent between two different networks (Usually a Local Area Network and the Internet). They work by allowing the user to set certain “rules” for both incoming and outbound traffic involved with the data transfer. A firewall is a great asset to any computer user because it can effectively block any malicious attacks coming in, and also control what kind of information is being sent out by the computer.
Updates, especially Operating System and Anti-Virus updates, are very important to the well-being of a user’s computer. Updates are used to improve current software so that it is both more secure and also more robust in features for its users. If updates aren’t kept up with at a fairly current pace, the chances of an attack on the computer increase along with the chances of the attack being successful. As a good practice, it is often recommended to turn the Automatic Updates function on for all programs that allow it. This takes the burden off the user to check for updates and allows the computer to stay up to date with all important patches and fixes.
The best practice for avoiding catastrophic data loss is to back up your information and to back it up regularly.Many people never think to back up their data, and can very quickly lose their computerized financial records, music, pictures, and other valuable information stored on their computer’s hard drive. Now, it is easier than ever to back up your important files to a secure location. Choices for where to back up could include a flash drive, DVD, portable hard drive, cloud based storage, or some other convenient location. Using one of these mediums to create a copy of your important data should leave you feeling more confident about the security of your significant files.
Yes! With the current influx of new viruses and exploits online, all computer users need some type of protection software for their computers. Even mobile devices such as smartphones and tablets are at risk. Anti-Virus software not only notifies you when you have possibly contracted a computer virus or piece of spyware, but also tries to proactively block the threat before it strikes. Having this software installed is a key way to prevent data loss stop the spread of malicious software.
Phishing is a technique used by online perpetrators and thieves to trick a user into giving up their personal information through some kind of fake website, email, or program. Generally, these phishing attempts mimic trusted sites to seem real, and then ask for information a trusted website would usually ask its users for. To prevent falling victim to one of these scams, there are a few rules of thumb to always follow. First, if some kind of offer seems too good to be true, it probably is, and is only an attempt to force you to compromise your personal information. Second, always remain skeptical of any suspicious emails you receive or websites you visit. If you experience anything odd or out of the ordinary, there is a good chance the website/email is bogus. By following these simple practices and always being an informed user, phishing attempts can be easily avoided.
Use more than 8 characters (More Characters = Stronger Passwords) Include random characters within the password (#, @, %, $, etc.) Use both upper and lower case characters (i.e. – AbCdeF) Avoid using “dictionary” words or stereotypical passwords such as “dog”, “red”, or “password” Avoid using important dates or other meaningful information in your password Try using a passphrase instead of a password .“I8burger4d!NER” (I ate burger for dinner) By following these simple password creation practices, a user should be able to guarantee greater piece of mind when saving valuable information to an online location.
If at all possible stop using the systems which you believe has been compromised. It could be used as a launch pad for additional attacks within your network. If you believe there has been financial loss to your organization you should report the intrusion to your local authorities. They will help determine which agencies should be involved in the investigation. Whether or not you choose to report the attack to law enforcement you should contact a reputable digital forensics investigator to determine how the attack occurred, the extent of damage and provide a plan for avoiding similar attacks in the future.
In most cases data can be recovered even after it has been deleted by the user. The area of a drive where deleted data resides is marked as free space. The deleted data remains in that space until the operating system overwrites it with new data. Sometimes this deleted data will remain on a drive for the life of that drive.
Vulnerability scanning is a non-invasive process which interrogates a device or application to determine if it is running software or has a configuration which has a known weakness. This weakness is not exploited in a vulnerability scan. A penetration test will actually attempt to exploit a weakness to determine what if any damage can be done. While both can be automated, penetration testing is a more complicated process.
A widely used acronym is used to teach kids the proper way to use the internet and respond to different situations, SMART.
S – Safe – Remain safe by not giving out personal information to people you don’t know.
M – Meeting – Never meet with anyone online that you don’t know.
A – Accepting – Don’t accept emails, IM, files from people/sources you don’t know – you never know what they could be.
R – Reliable – Information online is not always a reliable source, be cautious in choosing what you believe and what you don’t.
T – Tell - If anything online makes you feel uncomfortable or uneasy, don’t be afraid to talk to your parent about it.
Through teaching your child the SMART acronym, they can make better decisions based on their online experiences and interactions.
Yes, most browsers keep an easily accessible history that shows every site that a browser user visits. This provides an easy way for a parent to check-up on a child’s viewing habits and the type of sites being viewed. Although a great reference for parents, the Browsing History can easily be manipulated and deleted by a user. If this happens, and you notice it frequently, it is a good idea to investigate further and make sure your child isn’t misusing their internet privileges.
Allowing a minor to register for a social networking site is fully up to the discretion of the parents.
It is recommended that any computer that a child is using stays in an open and busy place such as a kitchen or family room. This is suggested because it allows parents to easily keep watch over the child’s computer usage and also discourages any improper use because of the busyness of moving family members and friends. Nowadays, with the popularity of laptops, smartphones and table devices, the computer’s positioning could become more difficult because of device size and mobility. To counteract this problem, only allow the device to be used in certain areas of the house that can be easily monitored.
Today, many software applications exist to help parents control their children’s computer and internet use. Many of these applications can be found online by a simple internet search, but usually cost to purchase. A great alternative to these programs is using the Microsoft Windows 7 Operating System built-in parental control capabilities. These controls can help set schedules for when a child uses the computer and also help monitor which programs and websites a child has access to. For more information on the Windows 7 Parental Controls, visit http://windows.microsoft.com/en-US/windows7/products/features/parental-controls.
There are many tools for parents concerned about restricting access or monitoring their child's activities online. Microsoft Windows Vista and later versions have a tool called Parental Controls. This allows a parent to control internet access by age rating and also creates reports for monitoring activity. There are many 3rd party tools available as well but I'd start with the free one first to see if it works for you. The important thing to remember is these tools can all be defeated so parents need to continue to exercise caution and talk with their kids about online safety.