IT

Have you ever experienced a computer failure and were not able to get any tasks for the day completed until the problem was fixed? What do you do in such a case? How do you recover your data or continue with urgent tasks? Imagine this happens to your business systems and company data and that it can't be resolved with the purchase of a new piece of hardware. Businesses are...

ECHO releases this monthly patch bulletin for all our IT clients to provide you quick access to the latest Microsoft patches which include critical updates as well as common vulnerabilities and exposures.   Microsoft released patches for 64 CVEs covering Microsoft Windows components this month. Of these 64 CVEs, 11 are listed...

Small organizations have small IT budgets. Yet, technology is now more important than ever. How do you reconcile these two things? You do so by strategically allocating your IT spending towards technologies that have the most impact on your organization. Over the past 18 years, I have had hundreds of conversations about how technology can help small organizations. Most...

The December holidays are upon us and everyone is busy shopping for gifts and holiday specials. With a surge in the COVID-19 cases, online shopping is the primary source of purchasing right now. As a result, there is a drastic increase in cybersecurity vulnerabilities. Email scams, texting scams, identity theft, package...

Today’s business environment seems calamitous. Many previously well-established norms and assumptions are no longer valid, and every organization must choose to do nothing or to adapt. Well, it is really not a choice when it's a matter of survival, is it? Calamity Brings Opportunity We see all around us...

Over the years we’ve learned that the most common cybersecurity attacks are email phishing scams, brute force attacks and wire transfer scams. However, we are oblivious to the numerous attacks that occur every day but are not as well known. Often while looking out for scams, we forget to...