Category Archives: Data Security




You spend thousands of dollars and untold hours of time to protect the data in your company– well. Maybe you don’t. Whether you provide attention to your company’s security or not, be sure to take just a few minutes to download our newest tool to help you understand the important parts of what “Overlooked Security […]






From Eric Levy: ITAD Sales, EPC, Inc. EPC, Inc, now in its 30th year of business, continues to be a centerpiece of information in regard to Data Security. We have been offering companies of all sizes options that ensure compliance with specific industry standards to help protect a company’s reputation and information. A recent article from DataBreaches.Net […]




From Patrick Mann: ITAD Sales, EPC, Inc. Whether you’re a property manager, an IT or data center manager, a lessor, or a liquidation manager, when your company charges you with disposition of physical IT assets, there’s little room for error. Because of the unplanned and chaotic nature of the situations that call for IT asset disposition, you’re […]









From Eric Levy: ITAD Sales, EPC, Inc. EPC, Inc, now in it’s 30th year of business, continues to be a centerpiece of information in regard to Data Security. We have been offering companies of all sizes options that ensure compliance with specific industry standards to help protect companies reputation and information. A recent article from […]









Let’s face it: If you can rember 5 phone numbers of even your family members in today’s time (unless it’s part of a jingle), you are on the cusp of being an informational genius at this point. Today, we as technology-addicted humans put in not just phone numbers, but intimate family-based information, account numbers to […]









While it sounds like something from the movie Enemy of the State, new research from the University of Minnesota College of Science and Engineering indicates that attackers can capture the same information used by cellphone companies to track cellular handsets to pinpoint a target’s location. This attack leverages features of the GSM communication stack to […]









Research in Motion just cannot catch a break with their tablet, the Playbook. Not only are sales lagging behind Apple and Android offerings, forcing RIM to cut pricing to $299; but now security researchers have discovered email and other personal information could be stolen via malware. The security weakness is exploited using Playbook Bridge, a […]









Firsts have been a common occurence at EPC, Inc. over the years. Whether it was launching a different kind of computer company back in 1984, to the pioneering of computer sales on the now online juggernaut eBay, EPC has always had a hand in being the first to launch great new efforts. That tradition continues. […]









It sounds like a plot out of one of a summer spy movie, but security researcher Thomas Ryan tested what would happen when posting a fake profile of a real-life Abby Scuito. The results? Over 300 “friends” in the military, information security, and intelligence fields, a few job offers, and invitations to security conferences.














Well, here we are again. A few weeks after Microsoft pushed out a critical patch to all versions of Internet Explorer, Jorge Luis Alvarez Medina, a security consultant with Core Security Technologies provided details of another attack against the beleaguered browser. This time, an attacker “may be able to access files with an already known […]