Update: ECS Team has put together a guide to help companies with the remote employees. Here is a link to download the guide.
Remote access and VPN provides convenience but can also be used to compromise company network when not implemented correctly. We have put together a recommended usage document, implemented in our own establishment, to better help you … Read More >
While the world attempts to take control over the spread of the Coronavirus and tries to contain, eliminate and prevent it from spreading further, hackers around the globe have found the Coronavirus scare serving them well as an enabler for their activities.
Security companies like CheckPoint are tracking fake emails selling “vaccines” and “coronavirus tests”. The emails may point the … Read More >
Traditional usernames and passwords can be easily stolen. When an intruder has user’s Microsoft 365 credentials they can log in from anywhere, read sensitive emails, access personal data, and compromise company network.
Multi-factor authentication (MFA) is a security system that requires more than one method of authentication to verify the user’s identity for login. It is an effective way to … Read More >
Microsoft ended Windows 7 support on Tuesday, January 14, 2020. Microsoft no longer offers patches, security updates, or customer support for Windows 7.
What does that mean to you?
If your company has windows 7 computers running, your network is at risk. Hackers are continuously working to find new bugs or problems to compromise computers. As there are no … Read More >
Earlier today, a FaceTime bug was uncovered that affects users of iPhone, iPad, and Mac. The bug allows someone to hear your audio on FaceTime, even if you don’t answer. If you want to protect yourself as best you can, here’s how to turn off FaceTime entirely.
Note: disabling FaceTime on one device does not seem to disable it on … Read More >
Your business data is the heart of your organization. It is crucial to protect it. Important information gets deleted or damaged by accident or malfunction. Any intentional or unintentional cause can leave your business in ruins. While hardware can be replaced, your critical business data may not be easily replaceable. Your business must have a reliable, cost-effective backup plan to … Read More >