ECW: Blog
Windows 10 Creators Update and Surface Studio to Revolutionize PC User Creativity
Designed to “empower a new wave of creativity,” Microsoft has unveiled its Windows 10 Creators Update along with the introduction of Surface Studio, Surface Dial, and a new Surface Book. Microsoft hopes these new products will have an effect similar…
Read MoreYou Don’t Have to Be Hacked to Be Cyber-Breached
It’s a widespread misconception that you have to have your PC, mobile device, or network hacked in order to experience a cyber breach. The fact is, hack-jobs account for only 52.6% of cyber breaches, according to Risk Based Security’s “First…
Read MoreAnother Regulation to Add to the Compliance-Readiness List
If you’re not already feeling the heat of compliance-regulatory scrutiny, there’s another cybersecurity-related acronym that just joined the list. Add to PCI, SOX, GLB, and HIPAA the European Union General Data Protection Regulation, or GDPR. Those of you outside of…
Read MoreMulti-Factor Authentication a Good Solution to Unauthorized Access Problem
The use of only passwords – even well-encrypted ones – for login permission is not enough, it seems, to stem the tide serious problem of black hat hacking and unauthorized access. Across the cybersphere, it seems the more frequently a…
Read MoreWhat to Consider if You’re Thinking About Moving to the Cloud
There are many reasons business owners are feeling the pull to migrate to cloud solutions as an answer to their data protection and storage challenges. Many feel that on-premise file servers are an outmoded technology compared to the burgeoning presence…
Read MoreEnhance Your Computing Life with These Microsoft Outlook Plugins
As the top-rated business email client in the land by 2016 estimates, Outlook runs on approximately half a billion devices, or half the Microsoft Office Suite users. If you’re in the mood for something fun and different when it comes…
Read MoreYet Another Ransomware Attack Has the Cyber Sphere on Edge
June 2016 — This time, it was the University of Calgary – a sign that ransomware attackers are increasingly choosing academic institutions as a favorite victim. IT Specialist is calling it a “successful attack,” and certainly it was successful for…
Read More5 Reasons Why Assessing IT Infrastructure Performance is So Vital
It’s something that many companies overlook, but regular performance assessment of IT infrastructure is vital to overall performance and security. Not performing regular system checks of your entire data network is similar to forsaking vehicle maintenance and continuing to drive…
Read MoreYahoo Data Theft –A Good Reason to Regularly Change Passwords
In case you needed another reason for regularly changing your passwords, the recently-uncovered Yahoo hack of 500 million accounts is probably the reason of the decade so far. The hack and subsequent data theft involving half a billion Yahoo accounts…
Read MoreIs Your Antivirus Protection Up to Speed?
It’s become an all-too-common occurrence: Cyberattack in the form of ransomware, resulting in major payouts to both hackers and in potential HIPAA fines. Ultimately, many of these increasing ransomware attacks are caused by a convincing-looking link embedded in official-looking emails.…
Read MoreRecent Posts
How can we help?
Whether you need immediate help with an IT issue or want to discuss your long-term IT strategy, our team is here to help.
Call us at (561) 303-2310 or complete the form below and we'll help in any way we can.
"*" indicates required fields