ECW: Blog
5 Important Features You’ll Find In iOS12
Apple’s newest software update has arrived, and it’s already making an impact in how effectively users manage their smartphones. iOS 12, which comes preinstalled in the iPhone XS and iPhone XS Max, is equipped with a number of shiny, new…
Read MoreIt’s Cyber Security Awareness Month…Are You Prepared?
Are You REALLY Secure? Follow This Checklist To Know For Sure [youtube https://www.youtube.com/watch?v=uUtARVvjSis] When everything is going well, the last thing you want to do is think about what will happen when something goes wrong. It can be easy to…
Read MoreNew Gift Card Scam Hits Just In Time For The Holidays
There’s a new Gift Card scam going around that has already cost consumers lots of money, frustration, and headaches. Here’s how it works. You’ll get an email from a friend or relative asking you to go buy them a gift…
Read MoreWhat’s New in the September Update of Office 365?
The September update of Office 365 includes some major additions and changes to tools such as Microsoft Teams, PowerPoint, and Excel, just to name a few. It is important to keep up with these developments, so here is a list…
Read MoreImportant News: Potential Facebook Data Breach
Facebook Was Breached Were You Or A Facebook Friend Affected? Facebook has confirmed that more than 50 million user accounts have been breached. They made the announcement today, Friday, September 28th. However, their engineering team discovered the security breach back on…
Read MoreDid You Know That October Is National Cybersecurity Awareness Month?
Online security is something that should get everyone’s attention. Threats exist all around us: ransomware, viruses, spyware, social engineering attacks and more. There’s so much you need to know to keep your personal and business information safe. [youtube https://www.youtube.com/watch?v=EuZ206e_wRA] But……
Read MoreTech Tip: iPad Pro vs. Microsoft Surface Pro
Laptop users are loyal to their devices, but when portability is a priority, tablets can’t be beaten. [youtube https://www.youtube.com/watch?v=awhkXrnHV-Q]With so many strong tablet contenders on the market, narrowing down the options before making a purchase can seem overwhelming. This is…
Read MoreHow To Reduce Vulnerability To Phishing When Using Office 365
What Is Phishing? Phishing is the act of sending phony emails to people for the purpose of tricking them into revealing their username and password. The sender pretends to represent an organization that has a viable reason to make an…
Read MoreHow Can I Benefit From Keyboard Shortcuts?
What Are Keyboard Shortcuts? Keyboard ‘shortcuts’ are the strategic use of combinations of keys on your keyboard to perform some task in your software more efficiently. There are shortcuts you can use in your file folders, word processing programs, and…
Read MoreHow Can I Best Protect My Business Entity From Current Hacker Potentials?
Improvements in technology have led to increased connectivity with improvements in security, but have also involved unique vulnerabilities and potential for hackers to access a wide range of information. Particularly problematic to businesses is the potential for a phisher to…
Read MoreRecent Posts
How can we help?
Whether you need immediate help with an IT issue or want to discuss your long-term IT strategy, our team is here to help.
Call us at (561) 303-2310 or complete the form below and we'll help in any way we can.
"*" indicates required fields