Technology Insights

Latest technology news from ECW Network & IT Solutions.

How to Create and Use Strong Passwords

How to Create and Use Strong Passwords

The frequency with which new passwords need to be created for new accounts is taxing. As many of you know, when making a password, there is usually a colored bar letting you know if your password is strong or weak. You always want to have that bar in the green. It is crucially important that […]

read more
Have You Performed Your Social Media Audit Recently?

Have You Performed Your Social Media Audit Recently?

Performing a social media audit is just as important as developing your strategy. Use our tips to help determine what is and is not working for your company.   You likely already have a social media strategy in place. However, did you know that it is just as important to perform social media audits to […]

read more
You Don’t Have to Be Hacked to Be Cyber-Breached

You Don’t Have to Be Hacked to Be Cyber-Breached

It’s a widespread misconception that you have to have your PC, mobile device, or network hacked in order to experience a cyber breach. The fact is, hack-jobs account for only 52.6% of cyber breaches, according to Risk Based Security’s “First Nine Months of 2016 Data Breach QuickView Report”. Still technically a majority – and they […]

read more
Another Regulation to Add to the Compliance-Readiness List

Another Regulation to Add to the Compliance-Readiness List

If you’re not already feeling the heat of compliance-regulatory scrutiny, there’s another cybersecurity-related acronym that just joined the list. Add to PCI, SOX, GLB, and HIPAA the European Union General Data Protection Regulation, or GDPR. Those of you outside of the EU may be scratching your heads at that and saying, “Well, that doesn’t apply […]

read more
Multi-Factor Authentication a Good Solution to Unauthorized Access Problem

Multi-Factor Authentication a Good Solution to Unauthorized Access Problem

The use of only passwords – even well-encrypted ones – for login permission is not enough, it seems, to stem the tide serious problem of black hat hacking and unauthorized access. Across the cybersphere, it seems the more frequently a given company or individual updates their passwords that just as fast there is a “cracker” […]

read more
What to Consider if You’re Thinking About Moving to the Cloud

What to Consider if You’re Thinking About Moving to the Cloud

There are many reasons business owners are feeling the pull to migrate to cloud solutions as an answer to their data protection and storage challenges. Many feel that on-premise file servers are an outmoded technology compared to the burgeoning presence of cloud storage and other services which entice with their ease of use and access. […]

read more
Enhance Your Computing Life with These Microsoft Outlook Plugins 

Enhance Your Computing Life with These Microsoft Outlook Plugins 

As the top-rated business email client in the land by 2016 estimates, Outlook runs on approximately half a billion devices, or half the Microsoft Office Suite users. If you’re in the mood for something fun and different when it comes to Microsoft Outlook plugins, we’ve found 5 that are fun, practical, and will boost your […]

read more
Yet Another Ransomware Attack Has the Cyber Sphere on Edge

Yet Another Ransomware Attack Has the Cyber Sphere on Edge

June 2016 — This time, it was the University of Calgary – a sign that ransomware attackers are increasingly choosing academic institutions as a favorite victim. IT Specialist is calling it a “successful attack,” and certainly it was successful for the ransomware-ists on multiple levels. The University, in acceding to the demands of data-rustling scum […]

read more
5 Reasons Why Assessing IT Infrastructure Performance is So Vital

5 Reasons Why Assessing IT Infrastructure Performance is So Vital

It’s something that many companies overlook, but regular performance assessment of IT infrastructure is vital to overall performance and security. Not performing regular system checks of your entire data network is similar to forsaking vehicle maintenance and continuing to drive it on a daily basis. Holistic diagnostic and performance checks will also let you know […]

read more
Yahoo Data Theft –A Good Reason to Regularly Change Passwords

Yahoo Data Theft –A Good Reason to Regularly Change Passwords

In case you needed another reason for regularly changing your passwords, the recently-uncovered Yahoo hack of 500 million accounts is probably the reason of the decade so far. The hack and subsequent data theft involving half a billion Yahoo accounts is the largest of its kind – ever. Granted, it is Yahoo, where most people […]

read more
Is Your Antivirus Protection Up to Speed?

Is Your Antivirus Protection Up to Speed?

It’s become an all-too-common occurrence: Cyberattack in the form of ransomware, resulting in major payouts to both hackers and in potential HIPAA fines. Ultimately, many of these increasing ransomware attacks are caused by a convincing-looking link embedded in official-looking emails. A healthcare employee or Business Associate (BA) of the hospital or healthcare facility casually clicks […]

read more
Business hours are ECW IT & Network Solutions Rated 5 / 5 based on 5 reviews. | Read Our Reviews