ECW: Blog
The Top 5 Cyber Security Issues of 2016
In 2015, I witnessed numerous, high-profile cyber attacks. It began with the pilfering of tens of millions of social-security records at a major health insurer. Then I noticed infiltrations of major global hospitality firms and hotel chains such as Hyatt…
Read MoreProtecting Your Business Against the Badlock Vulnerability
During late March of 2016, a vulnerability now called Badlock was found in the popular business network application Samba. Samba enables different kinds of computers to connect to files and printers on Microsoft Windows servers, the central platform for many…
Read MoreDo you know the true power of LinkedIn?
Everyone in the business world knows that LinkedIn is a powerful tool. However, many businesses have neglected to maximize its potential for marketing success. There is far more to LinkedIn than just connecting with some users and joining a few…
Read MoreMysterious Hacking Group Has Had Access to Government Records for Years
Earlier in April, the FBI warned that a group of foreign government-backed hackers known as APT6 has been compromising commercial and governmental networks and stealing information from them since 2011. This surprising news, revealed in an alert the agency issued,…
Read MoreHere’s What You Need to Know About Facebook’s Secret Message Folder
If you are like most people, you don’t even know that Facebook contains a secret message folder. No, this secret message folder is not the same as the “Others” message folder that is often overlooked for months on-end, as emails…
Read MoreConsidering Hiring In-House IT? Why That Isn’t A Good Idea
You know how important your IT is to your business. One problem with a server could have you down for days. You know you need to find someone to handle and maintain the updates, software issues, and safety of your…
Read MoreSecure Your Data with Disc Encryption
Data security is in the forefront of everyone’s mind. There doesn’t seem to be a day that goes by where some data security breach isn’t mentioned. You think about the information you have stored on your computer and wonder how…
Read MoreTop Ten Ways To Create A Strong Password
Creating a password is not as easy as it has been in the past. People today are forced to make stronger passwords and keep track of several different ones. While this may seem complicated, it is important to create a…
Read MoreWhat is a Business Continuity Plan and Why Do You Need It?
Disasters of the natural and cyber nature happen every day and many smaller companies are simply not prepared for the immense amount of recovery that it takes to get back to work. As a mid or smaller level company it…
Read MoreUS and Canadian Governments Issue Ransomware Warnings
In a day and age where information is king and the internet is used for nearly every business transaction that is made it is now more important than ever that companies protect themselves against potential invasion of privacy and stealing…
Read MoreRecent Posts
How can we help?
Whether you need immediate help with an IT issue or want to discuss your long-term IT strategy, our team is here to help.
Call us at (561) 303-2310 or complete the form below and we'll help in any way we can.
"*" indicates required fields