ECW: Blog
Sending SMS Messages with Skype and Windows 10
Using Skype through Windows 10 to send SMS messages is pretty easy. Read how to do just that with our tutorial. SMS messages are a fast way to send information to someone. SMS messages are sent every second of every…
Read MoreAnother Regulation to Add to the Compliance-Readiness List
If you’re not already feeling the heat of compliance-regulatory scrutiny, there’s another cybersecurity-related acronym that just joined the list. Add to PCI, SOX, GLB, and HIPAA the European Union General Data Protection Regulation, or GDPR. Those of you outside of…
Read MoreMulti-Factor Authentication a Good Solution to Unauthorized Access Problem
The use of only passwords – even well-encrypted ones – for login permission is not enough, it seems, to stem the tide serious problem of black hat hacking and unauthorized access. Across the cybersphere, it seems the more frequently a…
Read MoreBeware eBay Scams!
It appears that, sadly, there has been a proliferation of eBay scams occurring as of late. Although it’s not shocking or surprising that the online auction site is being abused by some users, it’s dismaying nonetheless. We should come to…
Read MoreProtect the “C” Suite from Phishing & Other Scams
Imagine if your CEO or CFO or other occupants of your company were successfully hacked? How much of your files would be jeopardized? If just thinking about this scenario makes you ill, there are some preventative measures you can take.…
Read MoreMicrosoft’s Encryption Leak Proves Apple’s Point in Fight Against FBI
The subject of encryption has been one shrouded in controversy and debate since Apple took on the FBI earlier in 2016. In an effort to gain access to the data contained on a terrorist’s smartphone, the FBI wanted Apple to…
Read MoreWhy Your Business Should Be Publishing On Medium
A look at some of the many reasons as to why your site should be publishing on Medium. Medium has become an outstanding force when it comes to content marketing. Since some may have some confusion as to what Medium…
Read MoreWhat Does the Workforce of the Future Look Like?
If the year was 1995 and you were to ask anyone, even a tech visionary, about what the workforce of the future would be capable of, they’d be hard pressed to arrive where we are now. Individuals in a wide…
Read MoreKeep Your IT Safe & Out of the Shadows
Shadow IT is a description of software and hardware being used by an organization without the knowledge or approval of the IT department. While the term is a neutral one, to many it suggests a negative feeling since the IT…
Read MoreDon’t think of technology investments as a necessary evil
Many business owners considering an investment in new technology approach the decision-making process with a level of reluctance bordering on total unwillingness. While it’s never fun to part ways with hard-earned company money, it’s important to look at new technology…
Read MoreRecent Posts
How can we help?
Whether you need immediate help with an IT issue or want to discuss your long-term IT strategy, our team is here to help.
Call us at (561) 303-2310 or complete the form below and we'll help in any way we can.
"*" indicates required fields