IT

Small organizations have small IT budgets. Yet, technology is now more important than ever. How do you reconcile these two things? You do so by strategically allocating your IT spending towards technologies that have the most impact on your organization. Over the past 18 years, I have had hundreds of conversations about how technology can help small organizations. Most...

The December holidays are upon us and everyone is busy shopping for gifts and holiday specials. With a surge in the COVID-19 cases, online shopping is the primary source of purchasing right now. As a result, there is a drastic increase in cybersecurity vulnerabilities. Email scams, texting scams, identity theft, package...

Today’s business environment seems calamitous. Many previously well-established norms and assumptions are no longer valid, and every organization must choose to do nothing or to adapt. Well, it is really not a choice when it's a matter of survival, is it? Calamity Brings Opportunity We see all around us...

Over the years we’ve learned that the most common cybersecurity attacks are email phishing scams, brute force attacks and wire transfer scams. However, we are oblivious to the numerous attacks that occur every day but are not as well known. Often while looking out for scams, we forget to...

ECHO releases this monthly patch bulletin for all our IT clients to provide you quick access to the latest Microsoft patches which include critical updates as well as common vulnerabilities and exposures.   This is a huge month for MS patches with 120 unique CVE’s, 6 technologies with critical updates, 2 zero-day...