Close
  • About
  • IT Solutions
  • Industries
  • Cybersecurity
  • Resources
  • News
  • Careers
  • Refer Us
  • Payment Portal
  • Home
Get Support
Linkedin
Facebook-square
Twitter

ECS + MyIT Logo
  • About
  • IT Solutions
      Outsourced IT icon

      Outsourced IT

      Hybrid IT icon

      Hybrid/Co-IT

      Phones icon

      VOIP Phones

      Cloud icon

      Cloud & Network Equipment

      Consulting & Strategy

      Audits & Assessments

  • Industries
      heartbeat icon

      Compliance

      Auto dealership icon

      Auto Dealerships

      Professional IT Services hand icon

      Professional Services

      SMBs icon

      Small Businesses

      Government building icon

      Government

      Education icon

      Education

      Construction icon

      Construction

      Non-Profit organization icon

      Non-Profit

  • Cybersecurity
  • Resources
Contact Us
ECS + MyIT Logo
  • About
  • IT Solutions
      Outsourced IT icon

      Outsourced IT

      Hybrid IT icon

      Hybrid/Co-IT

      Phones icon

      VOIP Phones

      Cloud icon

      Cloud & Network Equipment

      Consulting & Strategy

      Audits & Assessments

  • Industries
      heartbeat icon

      Compliance

      Auto dealership icon

      Auto Dealerships

      Professional IT Services hand icon

      Professional Services

      SMBs icon

      Small Businesses

      Government building icon

      Government

      Education icon

      Education

      Construction icon

      Construction

      Non-Profit organization icon

      Non-Profit

  • Cybersecurity
  • Resources
Contact Us

Cybersecurity

Blog  ·  Cybersecurity
What to Do When Your Medical Information Has Been Hacked

Guest post by Patrick Bailey Every person in the United States has medical records stored online as the healthcare industry moved to electronic medical records over the past two decades. Unfortunately, millions of electronic medical records are not properly secured […]

Continue Reading
Cybersecurity  ·  Industry-Specific Technologies
Are Top-Level Domains (TLDs) like .Law & .CPA More Secure?

A friend who is the marketing director for a New Orleans-based accounting firm asked my thoughts on the new hot topic in the CPA community – the launch of the .CPA domain suffix. Top-level domains like .law, .bank, and .car […]

Continue Reading
Cybersecurity
Beware of Fear-based COVID-19 Phishing Attacks

Globally, people are looking for honest information, facts, and answers to the COVID-19 (Corona Virus) Pandemic. Many organizations, including the Center for Disease Control (CDC), are doing their best to educate the public and prevent mass hysteria. While reliable people […]

Continue Reading
Cybersecurity
Non-Technical Person’s View to Protect Against Phishing Emails

Before joining ECS + My IT a year ago, I worked in the art museum world for 17 years with a rather blasé attitude towards cybersecurity. Of course, the Museum had a Network Security Administrator in the IT Department, but […]

Continue Reading
Cybersecurity
Two Huge, Scary, Unique Data Breaches that Will Affect You Personally

What Happened Back in November, two of the largest data breaches ever occurred, but despite being headline news, many people outside the security industry failed to notice because they simply did not recognize the brand names associated with the breaches […]

Continue Reading
Cybersecurity
Cybersecurity Best Practices — Protect Your Passwords

KEEP YOUR PASSWORDS COMPLETELY UNIQUE FOR EACH LOGIN, INCLUDING YOUR PERSONAL ACCOUNTS.   Using the same password, or a similar password, across multiple systems is the most widespread cybersecurity mistake. It leaves you vulnerable to “credential stuffing attacks” where cybercriminals purchase […]

Continue Reading
Cybersecurity
What is the Dark Web? What Do I Do If My Info is on the Dark Web?

The Dark Web is not dissimilar to the regular internet that you are accustomed to using daily. The major difference is that it is only accessible by using a specific web browser called, Tor browser. Without going into a bunch […]

Continue Reading
common tactics used in BEC scams
Cybersecurity
What You Should Know About Business Email Scams and How To Stay Protected

Do you conduct wire transfers as part of your day-to-day business, particularly with respect to overseas vendors? If you answered, “Yes”,  you will be a primary target for those who are involved in business email scams, and even more so […]

Continue Reading
secure healthcare device management
Cybersecurity
Secure Healthcare Device Management

Secure Healthcare Device Management: High Numbers, High Complexity Healthcare is one sector that involves the most delicate of matters. This brings about the topic of healthcare device management which basically means the effort put to protect healthcare information on mobile […]

Continue Reading
12345
Page 1 of 5


Explore

About Us
IT Solutions
Industries
Get Help
Contact

Disclaimer

Privacy Policy
Terms of Use
Master Client Agreement

Locations

New Orleans
6620 Riverside Drive, Suite 200
Metairie, LA 70003
504-888-6948

Shreveport
347 W. Bert Kouns Industrial Loop
Shreveport, LA 71106
318-219-3427

ECS + MyIT Logo
Linkedin
Facebook-square
Twitter
© 2020 My IT. All Rights Reserved.
  • About
  • IT Solutions
    ▼
    • Outsourced IT
    • Hybrid/Co-IT
    • VOIP Phones
    • Cloud & Network Equipment
  • Industries
    ▼
    • Compliance
    • Auto Dealerships
    • Professional Services
    • Small Businesses
    • Government
    • Education
    • Construction
    • Non-Profit
  • Cybersecurity
  • Resources
  • Contact Us
  • Get Support
  • News
  • Careers
  • Payment Portal