ECW: Blog
It’s Data Privacy Day… Do You Know Where Your Data Is?
If you’re not doing everything in your power to protect your data, you’re leaving your most valuable business asset open to cybercriminals! January 28th, 2018 is Data Privacy Day, an international effort led by the National Cyber Security Alliance (NCSA)…
Read MoreThe Legal Risks of Cyber Theft
With the rising number of cyber thefts in the US, numerous lawsuits have been filed against businesses and organizations. In general, the public expects that their bank will take sufficient action to stop data theft. We expect this of the…
Read MoreGoogle Extends Search Result Snippets
First impressions are important. This is even more so in the world of technology. When searching for a company online, your first results appear in a small 160-character snippet. Now Google has officially extended the search results snippets to a…
Read MoreLinkedIn: Brands and the Rules of Engagement
Social is here to stay. That’s the unanimous sentiment regarding social media as a communication tool – and as a marketing channel. LinkedIn launched publicly before Facebook (2003 and 2006, respectively), and in these past 15 years we’ve seen an…
Read MoreRogue Employees and How To Stop Them
Technological advancements have, without a doubt, had a positive impact where your business is concerned. But they have also led to hacking, data breaches and the likelihood that rogue employees will use tools to jeopardize the security of your data.…
Read MoreThe Difference Between Business and Home Phone Services
If you think that all telephone services are equal and that there’s no difference between a business phone and a home phone system, you’d be wrong. In fact, there are several differences between a phone used for business and a…
Read MoreAre “Meltdown” and “Spectre” Something to Worry About?
Intel processors are having a Meltdown while AMD and ARM are being attacked by a Spectre. Is a James Bond villain making our computers freak out? No, it’s a new vulnerability found within these processors that affects Windows PCs, Linux,…
Read MoreWhat You Need to Know About “Meltdown” and “Spectre.”
Two critical vulnerabilities were found in Intel chips that could result in a malicious attacker stealing your data, such as photos, emails, documents, browsers, and password managers. How can this affect you? The vulnerabilities called “Meltdown” and “Spectre,” can affect…
Read MoreBe Prepared to Combat Insider IT Security Risks in 2018
Did you know that in 2016, IBM found that 60% of all cyber attacks were carried out by insiders? Of these three quarters were due to malicious intent, and one fourth due to negligence or error. Accidents: According to Verizon’s 2016 Data…
Read MoreRecent Posts
How can we help?
Whether you need immediate help with an IT issue or want to discuss your long-term IT strategy, our team is here to help.
Call us at (561) 303-2310 or complete the form below and we'll help in any way we can.
"*" indicates required fields