ECW: Blog
The University Of Cincinnati Medical Center is now under investigation by the U.S. Department of Health and Human Services after a patient’s personal information was leaked.
USHHS Launched Investigation in Cincinnati The University Of Cincinnati Medical Center is now under investigation by the U.S. Department of Health and Human Services, after an alleged leak and manipulation of a patient’s personal information. The patient, diagnosed with a…
Read MoreYour Law Firm Must Adopt Up-To-Date IT Practices To Stay Ahead Of The Competition.
Most law firms today have three primary concerns when implementing new information technology—To: Help them analyze diverse and extensive amounts of data. Increase efficiencies and cost savings. Secure their clients’ confidential information. However, even with the extensive adoption of IT…
Read MoreWho Has Access To Your Business Network? 72% Of Small Businesses Report Having Their IT Systems Accessed By Those Without Proper Authorization!
Did you know 72% of small businesses report having their IT systems accessed by those without proper authorization? What does this mean for your small business? Well, chances are, your IT systems have also been accessed by an unauthorized individual.…
Read MoreWho’s Winning In The Battle of Cyber Crime?
According to The 12th Annual Survey of Cybercrime, 500 U.S. business executives, law enforcement experts, and government officials say that the cyber criminals are. The Survey was co-sponsored by the U.S. Secret Service, the CERT Division of Carnegie Mellon University’s…
Read MoreBEWARE: A New Version of CryptoLocker Is Disguised As a Fax. It Could Be Lurking In DropBox or Other Cloud-Storage Platforms.
Another version of CryptoLocker has just been released by the criminals who created the Australian Electric Company Bill version earlier this week. Except, this version has been improved, with a different mode of delivery. It comes in the form of…
Read MoreImportant Security Warning: Dramatic Increase In CryptoLocker Activity Observed
Our team of IT security professionals would like to draw your attention to a high rate of malicious email traffic containing Cryptolocker malware that WILL encrypt your organization’s data if executed. The majority of this traffic is coming through trusted…
Read MoreBeware: The New CryptoWall Ransomware Can Enter Your System On Its Own Without Any Actions On Your Part!
A new ransomware strain, CryptoWall, is attacking businesses and organizations worldwide. It seems that the cyber criminals who developed the CryptoDefense Ransomware in April 2014, released this strain because CryptoDefense was being blocked by endpoint protection software. Now they’re angry! …
Read MoreBeware: Another In A Chain Of Data Breaches Involving Credit/Debit Cards Has Occurred—This Time It’s P.F. Chang’s China Bistro.
If you eat at P.F. Chang’s, keep an eye on your debit and credit card statements. The restaurant chain is investigating claims of data breaches from all their restaurants in Florida, Maryland, New Jersey, Pennsylvania, Nevada and North Carolina. It…
Read MoreBeware: 96% of Mobile Malware Targets Android Devices – Take Precautions to Protect Your Data!
Urgent Warning: The Latest Mobile Malware Targets and Encrypts Sensitive Data Stored on Your Android Device! Security researchers discovered another form of malware that targets Android devices. The latest malware, known as Simplocker, is a malicious app designed to encrypt…
Read MoreWarning: Cybercrime is on the Rise! 8 Cyber Criminal Minds Were Busted In South Florida & Atlanta Over the Past Week
Similar to the hit TV show Criminal Minds, the FBI was hard at work in South Florida and Atlanta over the past week. As a result of their hard work, multiple cybercriminals and personal identity thieves were busted. The Miami…
Read More- « Previous
- 1
- …
- 93
- 94
- 95
Recent Posts
How can we help?
Whether you need immediate help with an IT issue or want to discuss your long-term IT strategy, our team is here to help.
Call us at (561) 303-2310 or complete the form below and we'll help in any way we can.
"*" indicates required fields