What You Need to Know About the Strengthening American Cybersecurity Act

In the wake of the Russian military invasion of Ukraine, fear of cyberwarfare has risen among the American public, many of whom still have the Colonial Pipeline ransomware attack fresh on their minds. In response, the U.S. government is seeking not only to address these events, but also to raise awareness and security compliance for

2022-04-27T22:07:58+00:00April 27th, 2022|Thought Leadership|

5 Practices to Put in Place Now to Protect Your Organization’s Network

As organizations of all sizes increasingly rely on technology to conduct business, the likelihood of threats and security issues arising also continues to grow. One of the most crucial things small and midsized businesses can do now to safeguard their networks is prevent unauthorized access. Once breached, potential problems become significantly more difficult

2022-04-26T17:53:28+00:00April 26th, 2022|Thought Leadership|

What the Recent Okta Compromise Could Mean for You and Your Business

Okta, a massively popular company which provides identity and access management (IAM) services to clients worldwide, was recently targeted by threat actor Lapsus$. The compromise of Okta and other providers of IAM services is highly sensitive and potentially far-reaching as Okta’s IAM services alone allow approximately 15,000 companies to securely log into multiple

2022-04-14T19:33:32+00:00April 14th, 2022|Thought Leadership|

Explaining Microsoft’s Price Increases, Terms Changes

Last fall, Microsoft announced price increases set to go into effect beginning March 1, 2022. The company also outlined additional important changes that will impact users’ subscription agreements. Monthly pricing per license will increase on the following 365 products: Microsoft 365 Business Basic from $5 to $6. Microsoft 365 Premium from $20 to

2022-02-15T16:27:20+00:00February 15th, 2022|Thought Leadership|

D.C. and Data Breaches: What You Need to Know

The ubiquity of concerted campaigns through phishing and various other methods of malware deployment have led to individuals, small and midsized businesses (SMBs), and the largest companies worldwide to deal with the brutal impact of a data breach on daily operations. This pervasiveness is understood to occur due to the low-risk, high-reward ecosystem in

2022-02-10T17:36:52+00:00February 10th, 2022|Thought Leadership|

The Dangers of Consent Phishing

Cyber incidents often rely on human engagement to enable malware. Despite deploying security controls on the user’s account, target environment, and device, additional emerging threats may occur which require both users and enterprise administrators to put safeguards in place to mitigate the impact. The purpose of this blog is to analyze and mitigate the

2022-02-14T23:51:54+00:00February 4th, 2022|Thought Leadership|

ECC IT Solutions Changes Name to BinaryNetworks

Rockville, MD (Jan. 12, 2022) – / — ECC IT Solutions, a leading information technology managed service provider headquartered in Rockville, MD, announced that it has changed its name to Binary Networks LLC, effective January 1, 2022. The company’s overall rebranding is designed to not only simplify its name, but also to align with

2022-01-19T15:49:52+00:00January 12th, 2022|Company News, Thought Leadership|

The Problem with Ransomware

Showcased across traditional news outlets and dominating the cultural zeitgeist, ransomware and the threat it presents to individuals, corporations, and nation-states is occupying the public consciousness like never before. The eye-popping statistics of annual increases in ransomware activity and dizzying ransom prices validate this growing concern. During October alone, there

2021-12-29T17:59:22+00:00December 9th, 2021|Thought Leadership|

How To Keep Your Business Safe from Ransomware Attacks

The devastating impacts that a ransomware incident can have on a company range from minor inconveniences­, such as interruption of services, to the potential inability for a business to financially recover, creating an urgency to mitigate the effect of such a breach. What is ransomware? Ransomware is a type of

2021-12-09T18:45:29+00:00November 11th, 2021|Thought Leadership|

How to Download Google Chrome’s Browser Updates

Summary: Google has reported two zero-day vulnerabilities impacting their Chrome web browser with patches available to remediate the vulnerabilities currently exploited by unscrupulous actors. What is it? Zero-day vulnerabilities are those vulnerabilities that are not known to have been reported and/or discovered or that a patch has not been made yet to address the

2021-10-29T17:17:36+00:00October 29th, 2021|Thought Leadership|
Go to Top