ECW: Blog
Shopped at Kmart Recently? Better Check With the Bank To Make Sure You Haven’t Been Hacked!
Kmart, one of the country’s largest discount retailers with over 1,300 stores nationwide, reported over the weekend that they were the latest target for cyber criminals. Kmart confirmed that their payment data system was “purposely” infected with a new type…
Read More about Shopped at Kmart Recently? Better Check With the Bank To Make Sure You Haven’t Been Hacked!Learn from JP Morgan Chase’s Mistakes: Six Ways To Keep Hackers Out Of Your Account
You probably have heard all the hubbub surrounding the JPMorgan Chase hacking event from last week. It has been all over the news. Reports claim that this hacking attempt is the largest hacking event against a commercial business ever. But…
Read More about Learn from JP Morgan Chase’s Mistakes: Six Ways To Keep Hackers Out Of Your AccountIs Your Data Really Safe in the Cloud? ECW Computers Addresses All of Your Cloud Security Concerns!
The cloud enables you and your staff members to store and access data and applications over the Internet, as opposed to storing and accessing data and applications via your computer’s hard drive. As businesses around the world are using the…
Read More about Is Your Data Really Safe in the Cloud? ECW Computers Addresses All of Your Cloud Security Concerns!Should Your Business Retire the Traditional Desktop PC in Exchange for Tablet Computers?
Tablet computer sales have exploded in the past few years, and for good reason: they’re the perfect devices for busy students and home users looking to stay connected; but they’re also super powerful business tools. Since the BYOD trend has…
Read More about Should Your Business Retire the Traditional Desktop PC in Exchange for Tablet Computers?Stern Warning From HIPAA Enforcer – Conduct Your Risk Analysis Or Else!
The feds are coming, and they might be coming for you. That’s right, the federal regulators overseeing the healthcare industry in the United States are ramping up their HIPAA enforcement activities including their soon-to-be-relaunched COMPLIANCE AUDITS. The feds want medical…
Read More about Stern Warning From HIPAA Enforcer – Conduct Your Risk Analysis Or Else!If Your IT Company Isn’t Talking About Network Security – Get A New IT Company!
If there is one thing we stress above else for our clients at {company}, it is computer and network security. It’s not just for banks or big software companies to worry about; any business that deals with customer or client…
Read More about If Your IT Company Isn’t Talking About Network Security – Get A New IT Company!Email is the Leading Cause of Data Breaches in the Healthcare Industry
Have You Implemented Appropriate Safeguards to Protect Your Healthcare Organization Against Hefty Fines? When it comes to HIPAA compliance, regulations are becoming stricter than ever before. Do you allow your staff members to send protected health information (PHI) via email?…
Read More about Email is the Leading Cause of Data Breaches in the Healthcare IndustryIs Your Internet Browser Going BERserk?
Are you using Chrome or Firefox to browse the Internet? If so, IMMEDIATELY make sure you’ve got the latest updates for these Internet browsers. Why? A very dangerous security flaw has been identified that lets hackers and malware skip over…
Read More about Is Your Internet Browser Going BERserk?Caution: Watch Out for Shellshock, the Latest Vulnerability That’s Spreading Rapidly!
Could Potentially Be More Dangerous Than the Infamous Heartbleed! A major vulnerability, CVE-2014-6271, has been spreading rapidly and impacting a wide range of businesses. CVE-2014-6271, also known as “shellshock,” impacts “bash” software, which is used in most business computers. According…
Read More about Caution: Watch Out for Shellshock, the Latest Vulnerability That’s Spreading Rapidly!Security Warning: Your Computer Systems May Be at Risk for Exploitation Due to the Dangerous “Bash” Vulnerability!
A major high severity vulnerability, CVE-2014-6271, has been spreading quickly and impacting a wide range of businesses! The vulnerability, also known as “bash,” involves a UNIX type command shell that’s included in most distributions of Apple OS X and Linux.…
Read More about Security Warning: Your Computer Systems May Be at Risk for Exploitation Due to the Dangerous “Bash” Vulnerability!Recent Posts
How can we help?
Whether you need immediate help with an IT issue or want to discuss your long-term IT strategy, our team is here to help.
Call us at (561) 303-2310 or complete the form below and we'll help in any way we can.
"*" indicates required fields