ECW: Blog
Using Two-Factor Authentication to Address Workplace Cyber Threats
Two-factor authentication (2FA) – or, Multi-factor authentication (MFA), as it’s becoming increasingly known – is perhaps the most directly effective way to combat password hacking and the unauthorized access to company data, software, and devices. Password hacking is becoming more…
Read MoreIs It Still Possible to Get a Free Windows 10 Upgrade?
According to an August 3rd, 2016 article in ZDNet.com you can still reportedly get a free Windows 10 upgrade by using your Windows 7 or 8 product keys. Apparently Microsoft is so gung-ho about having all Windows users on board…
Read MoreThe IT Implications of Hijacked Texas Traffic Signs
In May of 2016, someone repeatedly hacked digital traffic information signs on a freeway under construction in North Dallas, Texas, infuriating TX DOT officials and entertaining motorists with such perplexing tidbits as: “Donald Trump is a shapeshifting lizard” and “Bernie…
Read MoreWhat You Need to Know About Microsoft’s Office 365 Upgrade
The fascination and utility of cloud-based services continue unabated for individuals and organizations looking to cut down on work time and increase productivity. Perhaps nowhere is this embodied better than in Microsoft’s Office 365 platform, which bundles all the utility…
Read More3 Reasons Enterprises Need Email Encryption Today
Virtually every enterprise transmits some sensitive data via email at some point during the year. This data might have been accidentally sent or it might have been intercepted, which could result in a costly data breach. This unwanted result, combined…
Read MoreBeware eBay Scams!
It appears that, sadly, there has been a proliferation of eBay scams occurring as of late. Although it’s not shocking or surprising that the online auction site is being abused by some users, it’s dismaying nonetheless. We should come to…
Read MoreHow to Have Transparency and Security in the Workplace
A workplace that experiences a high level of transparency and security may not seem possible, but if the right social environment and work standards are applied, your business can at least get that much closer to such a state. According…
Read MoreYour Printers…are they secure?
Overlooking Printer Security Is Costly It may not be as high-profile a part of your data network infrastructure, but printers are a viable security threat, if access and permissions are not iron-clad. This may come as a surprising wake-up call to…
Read MoreiPads Only At Work? Really?
Google Apps Create ‘iPad Only at Work’ Possibilities The constant improvement and number of Google apps is now allowing more and more of us to be able to work solely on an iPad. Workplaces may soon see significantly more open…
Read MoreProtect the “C” Suite from Phishing & Other Scams
Imagine if your CEO or CFO or other occupants of your company were successfully hacked? How much of your files would be jeopardized? If just thinking about this scenario makes you ill, there are some preventative measures you can take.…
Read MoreRecent Posts
How can we help?
Whether you need immediate help with an IT issue or want to discuss your long-term IT strategy, our team is here to help.
Call us at (561) 303-2310 or complete the form below and we'll help in any way we can.
"*" indicates required fields