CIO's priorities

CIO’s Priorities for 2019

Share: Facebook Twitter Google Email

Gartner's latest annual CIO Agenda survey of more than 3,000 CIOs in 98 countries found that 95 per cent of CIOs expect digitalization to change their jobs. IT delivery is seen as a given, with the two-key transformation in the role being change leadership and the assumption of greater and broader...

Guide to DaaS

Share: Facebook Twitter Google Email

What is device-as-a-service (DaaS)? From desktop computers and laptops to tablets and smartphones, equipping your business with all the devices you need to thrive in the digital era can be expensive. It’s also difficult to manage a fleet of company-owned devices – most of which require...


I Know Your Secrets…And Other Cons

Share: Facebook Twitter Google Email

Maybe you've been one of the unfortunate folks who've received a scary email or even a letter in the mail trying to blackmail you into paying Bitcoin. Sadly, this con has gained quite a bit of traction, because let's be honest, many folks have their little secrets, and in the world of cons it's...

malware attack

Signs of a Malware Attack on Your Phone

Share: Facebook Twitter Google Email

When a virus hits your computer, it's usually pretty obvious. Strange pop-ups appear on your screen, your computer gets stuck, or it gets really slow and then crashes. But what about your smart phone? Are the signs of an attack quite so obvious? A malware attack on your phone might be much...

Offensive Security Engagements

Why SMB’s Need to Utilize Offensive Security Engagements

Share: Facebook Twitter Google Email

My name is Dave Collins and I am a security analyst here at ETGI / DarkHound Security. I’ve previously written about threat actors targeting the small to mid-size business (SMB) space here and now I want to expand on the concepts I covered in that article. Today I want to focus on offensive...

Tips to Avoid Ransomware

Tips to Avoid Ransomware

Share: Facebook Twitter Google Email

Combatting ransomware is always on the forefront of cyber news. This week an article by Joe Merces, the former CIO of the New York City Law Department (the world's largest public sector law firm) and now CEO for Cloud Daddy was published on the best practices for avoiding ransomware. Merces...


How to Securely Manage Your IoT Devices

Share: Facebook Twitter Google Email

Managing IoT devices is a lot like running a preschool after recess. The toys are all over the place and the kids are going crazy. So how do IT security professionals protect their business from cyber risk and still let the employees have access to all their connected devices? A good place to...

Cyber Security Best Practices

The Majority of Users Don’t Know Cyber Security Best Practices

Share: Facebook Twitter Google Email

Cyber Security Best Practices: According to KnowBe4 and new data from MediaPRO’s third annual State of Privacy and Security Awareness Report, users are less prepared this year to address the risk of cyberthreat. With the threat of cyber attacks increasing, organizations would like to think...

Westminster College

Westminster College using Office 365 to Connect

Share: Facebook Twitter Google Email

Is your organization connected? The City of Westminster College is looking at ways to further engage and empower students to use technology to benefit the whole school community. At EnhancedTECH, we believe that a connected organization is a strong organization, and with the right tools, being...


Blockchain Offers Enterprise New Opportunities

Share: Facebook Twitter Google Email

Cryptocurrencies may have fixated everyone with their insane valuations that have hogged the limelight over the past few years, but as the hype dies down, the focus has rightfully shifted to blockchain, the technology that underpins those digital currencies. With blockchain, information is...