IT

ECHO has been made aware of phishing attempts using names of managers at ECHO. Please note that if you apply for a job at ECHO Technology Solutions, you may receive a call or email from HR, but will NOT under any circumstances be requested to...

Last week, Apple hosted their annual iPhone event where they revealed their latest addition, the iPhone 7. This device has been rumored about for quite some time and one of the most pervasive rumors was that Apple would be doing away with the headphone jack. Well,...

Do regular password changes actually make things worse? A recent article at CSO Online stipulates that it might. A summary of that article would read: Trust your users to not use the same passwords everywhere, because forcing them to use a different one periodically will backfire when they use...

The convenience of single sign-on services is undeniable.  Pretty much every useful website or app requires a password these days, and keeping all of those credentials straight can be both frustrating and insecure.  We all have our system.  Post-It notes on a computer monitor, excel...

Apple has patched three high-severity iOS vulnerabilities that are being actively exploited to infect iPhones so attackers can steal confidential messages from a large number of apps, including Gmail, Facebook, and WhatsApp The spyware has been dubbed Pegasus. To protect yourself you must update to the latest...

When you’re starting a business, internally-facing I.T. is usually the last thing on your mind.  People build businesses because they have big ideas and profitable dreams – I.T. is the kind of amenity that happens because it must. Yet more often than not, how you structure your...