malware attack

Signs of a Malware Attack on Your Phone

Share: Facebook Twitter Google Email

When a virus hits your computer, it's usually pretty obvious. Strange pop-ups appear on your screen, your computer gets stuck, or it gets really slow and then crashes. But what about your smart phone? Are the signs of an attack quite so obvious? A malware attack on your phone might be much...

Offensive Security Engagements

Why SMB’s Need to Utilize Offensive Security Engagements

Share: Facebook Twitter Google Email

My name is Dave Collins and I am a security analyst here at ETGI / DarkHound Security. I’ve previously written about threat actors targeting the small to mid-size business (SMB) space here and now I want to expand on the concepts I covered in that article. Today I want to focus on offensive...

Tips to Avoid Ransomware

Tips to Avoid Ransomware

Share: Facebook Twitter Google Email

Combatting ransomware is always on the forefront of cyber news. This week an article by Joe Merces, the former CIO of the New York City Law Department (the world's largest public sector law firm) and now CEO for Cloud Daddy was published on the best practices for avoiding ransomware. Merces...


How to Securely Manage Your IoT Devices

Share: Facebook Twitter Google Email

Managing IoT devices is a lot like running a preschool after recess. The toys are all over the place and the kids are going crazy. So how do IT security professionals protect their business from cyber risk and still let the employees have access to all their connected devices? A good place to...

Cyber Security Best Practices

The Majority of Users Don’t Know Cyber Security Best Practices

Share: Facebook Twitter Google Email

Cyber Security Best Practices: According to KnowBe4 and new data from MediaPRO’s third annual State of Privacy and Security Awareness Report, users are less prepared this year to address the risk of cyberthreat. With the threat of cyber attacks increasing, organizations would like to think...

Westminster College

Westminster College using Office 365 to Connect

Share: Facebook Twitter Google Email

Is your organization connected? The City of Westminster College is looking at ways to further engage and empower students to use technology to benefit the whole school community. At EnhancedTECH, we believe that a connected organization is a strong organization, and with the right tools, being...


Blockchain Offers Enterprise New Opportunities

Share: Facebook Twitter Google Email

Cryptocurrencies may have fixated everyone with their insane valuations that have hogged the limelight over the past few years, but as the hype dies down, the focus has rightfully shifted to blockchain, the technology that underpins those digital currencies. With blockchain, information is...


IoT: How Manufacturers Can Get Started

Share: Facebook Twitter Google Email

Interested in exploring how a manufacturing operation can become IoT-enabled and the potential benefits of this technology? The internet of things (IoT) is revolutionizing the way businesses operate, helping them work smarter and more efficiently. Access to data is the key to garnering insights...

Information Pivacy

California Passes New Information Privacy Law

Share: Facebook Twitter Google Email

California is stepping up it's game in cybersecurity to protect your identity. The CA legislature recently passed the "Information Privacy: Connected Devices" bill that will come into effect on January 1, 2020. The bill will require a manufacturer of a connected device to equip the device with...

Online Reputation

Protecting Your Online Reputation

Share: Facebook Twitter Google Email

In the days of old, maintaining a good reputation boiled down to good service. Do a job well and people will refer their friends and colleagues. Today, not so much.  Social media and the internet have added an extra layer of complexity. Does your brand hold weight in the digital world? Do your...