Author: ECHO Technology Solutions

When you’re starting a business, internally-facing I.T. is usually the last thing on your mind.  People build businesses because they have big ideas and profitable dreams – I.T. is the kind of amenity that happens because it must. Yet more often than not, how you structure your...

This just in from the DEF CON security conference in Las Vegas on August 7: security researchers Paul Stone and Alex Chapman revealed that a default setting in Windows and one that is present in many web browsers across operating systems allows a compromised network...

Most hacks require some kind of user feedback.  Whether it’s visiting a certain website, opening a certain .exe file, or clicking “yes” on an OK button, exploits are usually something we have to allow. Apple identified a new bug last week, however, which uses a far more...

Resilience is a fashionable term in homeland security circles these days.  The idea is simple.  It’s impossible to predict or plan for every kind of emergency situation.  What you can do, however, is to plan for the time after an emergency comes. If there are structures and procedures in place to...

In the technology sector, bridging the gap between theoretical knowledge and experience can be difficult.  Today’s employers want technicians who have all the certifications and book knowledge, but also have some time “in the trenches” dealing with clients and customers directly.  For those who are just starting...

When it comes to technology, sometimes the whole is less than the sum of its parts. Most organizations tend to buy programs for their individual features, not thinking about how all of those programs will (or won’t) work together.  When all of those different programs start operating...