Remote Access and VPN Policy Recommendation

Update: ECS Team has put together a guide to help companies with the remote employees. Here is a link to download the guide.
https://www.ecsoffice.com/ecs-remote-office-readiness-ebook/

Remote access and VPN provides convenience but can also be used to compromise company network when not implemented correctly. We have put together a recommended usage document, implemented in our own establishment, to better help you … Read More >

Hackers use corona virus scam

Hackers use Coronavirus scare to spread malware and phishing attempts

While the world attempts to take control over the spread of the Coronavirus and tries to contain, eliminate and prevent it from spreading further, hackers around the globe have found the Coronavirus scare serving them well as an enabler for their activities.

Security companies like CheckPoint are tracking fake emails selling “vaccines” and “coronavirus tests”. The emails may point the … Read More >

Multi-Factor Authentication (MFA) Setup on Microsoft 365

Traditional usernames and passwords can be easily stolen. When an intruder has user’s Microsoft 365 credentials they can log in from anywhere, read sensitive emails, access personal data, and compromise company network.

Multi-factor authentication (MFA) is a security system that requires more than one method of authentication to verify the user’s identity for login. It is an effective way to … Read More >

Windows 7 end of support

Windows 7 End of Life 14 January 2020

Microsoft ended Windows 7 support on Tuesday, January 14, 2020. Microsoft no longer offers patches, security updates, or customer support for Windows 7.

What does that mean to you?

If your company has windows 7 computers running, your network is at risk. Hackers are continuously working to find new bugs or problems to compromise computers. As there are no … Read More >

How to turn off FaceTime

Earlier today, a FaceTime bug was uncovered that affects users of iPhone, iPad, and Mac. The bug allows someone to hear your audio on FaceTime, even if you don’t answer. If you want to protect yourself as best you can, here’s how to turn off FaceTime entirely.

Note: disabling FaceTime on one device does not seem to disable it on … Read More >

Disaster Recovery Plan for Your Business


Your business data is the heart of your organization. It is crucial to protect it. Important information gets deleted or damaged by accident or malfunction. Any intentional or unintentional cause can leave your business in ruins. While hardware can be replaced, your critical business data may not be easily replaceable. Your business must have a reliable, cost-effective backup plan to … Read More >