Tech Thursday: How To Enable DKIM Signing in Office 365

Last week, we covered how to enable SPF records to prevent spammers from spoofing your domain. DKIM, or DomainKeys Identified Mail, provides another layer of protection against spammers by signing all outgoing messages with a private key. Receiving mail servers can then verify that signature to know that the message came from your organization.

Tech Thursday: Train Your Users to Avoid Spam

Of the millions of emails that flow through the Internet each day, more than half of them are spam -- unwanted email messages that clutter our inboxes and bog down our workflows. Many of these messages include malicious code and attachments, or point users to sites that attempt to steal their credentials.

CXO CyberSecurity Conference Less than a Month Away!

E-N Computers is helping to bring you an exciting CyberSecurity event!

CXO CyberSecurity Conference


Hotel Madison & Shenandoah Valley Conference Center

710 S. Main Street

Harrisonburg, Va. 22801



 12 pm to 6 pm

Join us to find out why CyberSecurity is the CXOs new priority.

Tech Thursday: Data Breaches and Credential Stuffing

Marriott. Kay Jewelers. The United States Postal Service. These are a few of the companies who have had customer data stolen from them by hackers just in the last month. But even if your company has never put you up at a Marriott, bought a ring from Kay, or sent a package through USPS, your company’s data might still be at risk because of these leaks.

Tech Thursday: How To Secure BYOD Mobile Devices

Companies have embraced BYOD -- Bring Your Own Device. Giving your users the ability to use the tools that they choose to stay connected on the go helps them to be productive and flexible on the go.

But BYOD brings with it a different set of security challenges that system administrators need to address.