Blog

6 Tips on Accessing your Work Computers from Home

Here are the top six tips on working productively and securely from home:

1. Fully implement a Cloud base Office Suite, such as Microsoft Office 365 or Google Suite: Encourage your company in fully implement your Office productivity suite. Many companies have partially implemented these tools and might only use the e-mail.

A Message to Our Community

Dear E-N Computers Community,

The global spread of COVID-19 is affecting every one of us. At E-N Computers, we are people first, and we do what we do with the belief that technology can change lives and the hope that it can be a valuable tool in a moment like this.

Tax Preparers – Protect Your Clients’ Data From These Scams

For the last few weeks, we’ve been examining the data protection guidelines that the IRS has laid out for tax preparers in IRS Publication 4557. First, we examined how tax preparers can comply with the Safeguards Rule of the Gramm-Leach-Bliley Act (GLBA). Then we looked at some of the digital safeguards that tax professionals need to put in place to protect their computers and systems from hackers.

Safeguarding Taxpayer Data with IRS Publication 4557

Along with tax season comes an increase in taxpayer data theft and associated fraud. So, the IRS has issued Publication 4557 to help tax preparation professionals safeguard the data that has been entrusted to them.

Last week, we looked at the Safeguards Rule of the Gramm-Leach-Bliley Act (GLBA) and why tax preparers need a written data security plan.

DFARS In Depth – Part 9: System and Information Integrity

For our final installment of the “DFARS In Depth” series, we’ll cover the last of the fourteen security requirement families in NIST SP 800-171 -- System and Information Integrity.

While you may have spent fantastic amounts of time and energy securing your systems, the requirements in this family remind us that security is an ongoing process, which requires constant monitoring and adjustment.

DFARS in Depth – Part 7: Risk and Security Assessment

As we continue our in-depth look at NIST SP 800-171 as it applies to DFARS, we will get into two important assessments that organizations need to make continually: risk assessment and security assessment.

As both your systems and threats against those systems continue to evolve over time, it’s important that you implement routine checks to make sure that you’re still secure and in compliance with regulations.

DFARS In Depth – Part 5: Incident Response and Maintenance

Our in-depth discussion of the DFARS security requirements as set out in NIST SP 800-171 continues with the next two security requirement families: Incident Response and Maintenance.

Both of these security families involve taking steps to make sure that the security infrastructure that you’ve put in place remains functional and responsive to new threats.