Tech Thursday: Train Your Users to Avoid Spam

Of the millions of emails that flow through the Internet each day, more than half of them are spam -- unwanted email messages that clutter our inboxes and bog down our workflows. Many of these messages include malicious code and attachments, or point users to sites that attempt to steal their credentials.

CXO CyberSecurity Conference Less than a Month Away!

E-N Computers is helping to bring you an exciting CyberSecurity event!

CXO CyberSecurity Conference


Hotel Madison & Shenandoah Valley Conference Center

710 S. Main Street

Harrisonburg, Va. 22801



 12 pm to 6 pm

Join us to find out why CyberSecurity is the CXOs new priority.

Tech Thursday: Data Breaches and Credential Stuffing

Marriott. Kay Jewelers. The United States Postal Service. These are a few of the companies who have had customer data stolen from them by hackers just in the last month. But even if your company has never put you up at a Marriott, bought a ring from Kay, or sent a package through USPS, your company’s data might still be at risk because of these leaks.

Tech Thursday: How To Secure BYOD Mobile Devices

Companies have embraced BYOD -- Bring Your Own Device. Giving your users the ability to use the tools that they choose to stay connected on the go helps them to be productive and flexible on the go.

But BYOD brings with it a different set of security challenges that system administrators need to address.

E-N Computers Team Returns from IT Nation

During the week of November 5, 2018,  E-N Computers sent a team to IT Nation, a conference in Orlando, Florida, which gathers the top IT industry professionals from around the world.  Industry leader Connectwise brings together top-notch speakers, sessions, and networking focused on business best practices, thought leadership, and growth.

Tech Thursday: How To Secure USB Drives and Removable Media

USB drives, thumb drives, flash drives, pen drives, memory sticks -- whatever you call them -- pose a unique security challenge for network admins. They’re small, easily portable, and work in any computer. While this makes them great for quickly and easily moving files from computer to computer, these same features make them a serious threat to network and data security.

Technology and the Law

By Maximilian A. Bulinski, Attorney a Law

Over the past several years, the use of technology in law has grown significantly. According to Altman Weil’s 2016 “Law Firms in Transition” survey, 93% of law firm leaders think a focus on improved efficiency is a permanent trend in the legal market.

Tech Thursday: How To Prevent Data Theft With BitLocker

If you provide company laptops to your workers, it’s only a matter of time before one goes missing. Whether it’s accidentally or maliciously parted from its owner, your priority is to make sure that any proprietary, confidential, or legally protected data does not fall into the wrong hands.