sensitive data

Protect Employees’ Sensitive Data from Attack or be Held Liable


Don't neglect your cybersecurity or you might pay for it-twice. According to KnowB4, a recent ruling from the Pennsylvania Supreme Court on an employee lawsuit against the University of Pittsburgh Medical Center stemming from a data breach should put all employers on notice. As part of hiring...

Read More
Azure Cloud

Azure Cloud Helping First Responders Find Missing Children


Over 45,000 children go missing in Canada every year. Missing Children Society of Canada is using social media to get the word out about missing children. Everything was working well with their social media push notification system until their system went down. EnhancedTECH knows you can't...

Read More

Malware Targeting Holiday Shoppers


Instead of fighting the crowds on Black Friday and getting trampled, you may be thinking it's safer to cozy up on the sofa with your laptop and get those smoking deals online. But visiting your favorite sites might not be as safe as you think. Currently, there are at least 14 malware families...

Read More

Cybersecurity Not a Priority for Majority of Employees When Traveling


Look around any airport and you will find thousands of workers tapping away on their laptop--usually on free public WiFi. New research says that a whopping 77% of workers tap into free public WiFi when traveling and some 63% access their work emails and files. The statistics are startling to...

Read More
Smart Manufacturing

Smart Manufacturing


The industrial internet of things promises to be pivotal to the next industrial revolution in manufacturing. How? By harnessing all the power that digital technology offers through artificial intelligence and advanced machine learning. Still very much in its infancy, IoT solutions are already...

Read More
CIO's priorities

CIO’s Priorities for 2019


Gartner's latest annual CIO Agenda survey of more than 3,000 CIOs in 98 countries found that 95 per cent of CIOs expect digitalization to change their jobs. IT delivery is seen as a given, with the two-key transformation in the role being change leadership and the assumption of greater and broader...

Read More

Guide to DaaS


What is device-as-a-service (DaaS)? From desktop computers and laptops to tablets and smartphones, equipping your business with all the devices you need to thrive in the digital era can be expensive. It’s also difficult to manage a fleet of company-owned devices – most of which require...

Read More

I Know Your Secrets…And Other Cons


Maybe you've been one of the unfortunate folks who've received a scary email or even a letter in the mail trying to blackmail you into paying Bitcoin. Sadly, this con has gained quite a bit of traction, because let's be honest, many folks have their little secrets, and in the world of cons it's...

Read More
malware attack

Signs of a Malware Attack on Your Phone


When a virus hits your computer, it's usually pretty obvious. Strange pop-ups appear on your screen, your computer gets stuck, or it gets really slow and then crashes. But what about your smart phone? Are the signs of an attack quite so obvious? A malware attack on your phone might be much...

Read More
Offensive Security Engagements

Why SMB’s Need to Utilize Offensive Security Engagements


My name is Dave Collins and I am a security analyst here at ETGI / DarkHound Security. I’ve previously written about threat actors targeting the small to mid-size business (SMB) space here and now I want to expand on the concepts I covered in that article. Today I want to focus on offensive...

Read More