ECW: Blog
Automobile Industry Compliance
Under the Federal Trade Commission’s Safeguards Rule, auto dealerships must develop, implement, and maintain comprehensive information security programs.
Read MoreHow To Respond To A Cybersecurity Incident
This post will look at the steps you want to follow at an organizational level to respond to a cybersecurity incident.
Read MoreWhat Your Business Needs to Know About Protecting Customer Data
What Your Business Needs to Know About Protecting Customer Data Key Points: The Federal Trade Commission (FTC) sets standards for safeguarding customer information. The Safeguards Rule took effect in 2003 but was amended in 2021 after public comment to ensure…
Read MoreHow Safe is Microsoft Teams?
How Safe is Microsoft Teams? Understanding the New Vulnerability Vectra Uncovered Key Points in This Article Cybersecurity researchers at Vectra recently unearthed a new vulnerability in Microsoft Teams that may allow cyber criminals the means to cause considerable harm. The…
Read MoreCyber Risk Insurance 101
Cyber Risk Insurance 101: What is it and Who Needs It? Every business needs to protect itself against cyberattacks. That’s why companies must have cyber risk insurance. Cyber risk insurance can help you pay for the costs associated with a…
Read MoreWhy Small Businesses Must Implement Ongoing Risk Management
Why Small Businesses Must Implement Ongoing Risk Management Key Points Risk management is identifying, assessing, and managing risks to help protect against potential losses or liabilities. Risks can come from financial, operational, legal, or reputational risks. By identifying and assessing…
Read MoreIT Company Focused On Helping Businesses Across The US
ECW is an IT company that focuses on helping small to midmarket clients across the United States.
Read MoreUber Investigating Security Breach After Hacker Gains Access to Internal Databases
Uber Investigating Security Breach After Hacker Gains Access to Internal Databases Key Points Uber announced a security breach last Thursday evening in response to a report from The New York Times. The breach was carried out by an unknown hacker,…
Read MoreData Classification Matters And Records Management
Why Data Classification Matters for Records Management Success Key Points: Records management (RM) is the administration of digital or paper records. It includes the creation, maintenance, and destruction of records. RM aims to ensure that records are created and maintained…
Read MoreWill Your Cybersecurity Insurance Claim Be Denied?
Cybersecurity Insurance: Will Your Claim Be Denied? Key Points: Cybersecurity insurance is an important tool to help protect businesses from the financial costs of a data breach. Still, it’s important to understand your policy’s limitations and ensure you have the…
Read MoreRecent Posts
How can we help?
Whether you need immediate help with an IT issue or want to discuss your long-term IT strategy, our team is here to help.
Call us at (561) 303-2310 or complete the form below and we'll help in any way we can.
"*" indicates required fields