How Engler IT Supports Nonprofit Cybersecurity One of the most effective steps a nonprofit can take is to clearly define who owns what data and who is allowed to access it, including staff, volunteers, board members, and third-party vendors. Many nonprofit breaches occur not because of advanced hacking, but because: Engler IT works with nonprofit leadership to: This single step …
ATM Jackpotting – U.S. DOJ Charges 54 in ATM Jackpotting Scheme Using Ploutus Malware
originally published by Hacker News, December 2025: The U.S. Department of Justice (DoJ) this week announced the indictment of 54 individuals in connection with a multi-million dollar ATM jackpotting scheme. Ploutus Malware The large-scale conspiracy involved deploying malware named Ploutus to hack into automated teller machines (ATMs) across the U.S. and force them to dispense cash. The indicted members are …
Comcast Hit With $1.5M Fine For Cyber Breach
Originally posted on Bleeping Computer: Comcast will pay a $1.5 million fine to settle a Federal Communications Commission investigation into a February 2024 vendor data breach that exposed the personal information of nearly 275,000 customers. The breach occurred in February 2024, when attackers hacked into the systems of Financial Business and Consumer Solutions (FBCS), a debt collector Comcast had stopped …
Flying for the holidays? FBI issues Social Engineering warning for airlines
Yes, that’s the FBI letting the world know in a very visible way that airlines are at risk and continue to be attacked through social engineering. “They target large corporations and their third-party IT providers, which means anyone in the airline ecosystem, including trusted vendors and contractors, could be at risk,” the FBI said. The underground digital crooks — believed …
Breach News – City of Baltimore (Again)
The City of Baltimore lost more than $1.5 million to a business email compromise (BEC) scam after a fraudster tricked employees into changing a contractor’s bank account information. Investigators just announced that in December 2024, an unspecified attacker submitted a fraudulent supplier contact form using the name of a legitimate company employee to gain access to the vendor’s Workday account. …
Hackers Bypass Signal, Telegram And WhatsApp Encryption To Read Messages
By Davey Winder Updated November 25 with a new warning from America’s Cyber Defense Agency, CISA, regarding how spyware is targeting users of instant messaging applications, as well as further comments from malware experts regarding the Sturnus threat from hackers impacting all secure messenger users. Nobody wants their secrets to leak, whether that is the Department of War, FTSE 100 …
ID 20/20: How Engler IT Stops Social Engineering and Protects Clients 24/7
At its core, social engineering exploits human weakness, not technical weakness. It works by tricking someone into granting access through: It’s the classic “Hi, this is Carl in accounting. I’m locked out and need a reset” scenario. In a busy office, or a growing company where people don’t know every employee personally, this can be extremely effective. With today’s tools, attackers …
Cybersecurity for Insurance Teams
Insurance sales teams rely heavily on digital tools, client data, and communications. Any downtime, security breach, or misconfiguration can risk both productivity and client trust. Engler IT provides Managed IT Services to handle technology, cybersecurity, and compliance so the sales team can focus on selling and servicing clients, not troubleshooting systems. Cybersecurity for Insurance Sales Teams – What You Are Responsible For: …
Achieving FERPA Compliance
FERPA (Family Educational Rights and Privacy Act) protects student education records and governs how schools collect, store, and share student information. From an IT perspective, schools must demonstrate that systems, policies, and procedures keep student data secure and private. Achieving FERPA Compliance – here are the key milestones: 1. Assess Current Systems & Data Inventory Goal: Full visibility into data and risk …
CMMC Compliance for Engineering Firms
Engineering firms working with the Department of Defense (DoD) or federal subcontractors must comply with the Cybersecurity Maturity Model Certification (CMMC). This ensures that Controlled Unclassified Information (CUI) and Federal Contract Information (FCI) are protected from cyber threats. Understanding CMMC Compliance for Engineering Firms CMMC compliance depends on the level required by your contracts: For engineering firms, Level 2 is often …










