US – NORTHEAST REGION WINNER Engler IT, a managed services provider based in Maryland (greater DC), is proud to announce it has been honored with the US-Northeast Regional Award at the inaugural Leader in Managed IT Awards, held during MSP SUMMIT at The 20 HQ in Plano, Texas. The Leader in Managed IT Awards debuted live at MSP SUMMIT (January …
Google Extensions Hack: 840,000+ users hit by malicious browser extensions. Uninstall these ASAP!
originally published by PC World, January 2026 Security researchers are now warning of a targeted malware campaign that involves malicious software hiding in certain browser extensions. The wave of attacks, dubbed “GhostPoster”, targets Chrome, Firefox, and Edge users. There have been over 840,000 attacks since December, and the extensions went undiscovered in the Google App Store since 2020. How the GhostPoster …
DoorDash Data Breach
DoorDash, the popular app for ordering food and groceries, disclosed a recent data breach. A social-engineering scam was the culprit. The company’s response claims that there is no indication that any fraud or identity theft have occurred. Here’s what happened: How Major Corporations Respond Disappointingly, DoorDash mentioned in their press release to affected users below that they are trying to …
Data Protection in Healthcare – Youth Data
How Engler IT Protects Youth Health Data Healthcare organizations that serve youth carry an added responsibility: protecting highly sensitive data while navigating complex consent and privacy requirements. Engler IT partners with healthcare providers to ensure youth health records are secure, compliant, and accessible only to authorized users. The First Major Step Healthcare Organizations Should Take Separate Youth Health Data from General …
Chris Engler sits as special guest on the Lights, Sprinklers, Action Podcast
This episode of Lights, Sprinklers, Action teams up with Chris Engler of Engler I.T. to talk about practical AI and automation for businesses — especially how leveraging these technologies can improve operations while still keeping data security and safety top of mind. Chris Engler gives insight on: 1. What AI Can Do for Small & Medium BusinessesChris discusses how modern AI tools and automation solutions can take over routine tasks, …
IT Risk Management for Contractors
Construction companies operate in dynamic environments, including working between multiple job trailers, field devices, subcontractor platforms, and tight project deadlines. Engler IT works with contractors to manage IT risk without slowing the job down. One Thing Contractors Should Do Now: Secure and Standardize Field Technology Field devices, including laptops, tablets, and phones used on jobsites, are one of the largest unmanaged risks for …
ATM Jackpotting – U.S. DOJ Charges 54 in ATM Jackpotting Scheme Using Ploutus Malware
originally published by Hacker News, December 2025: The U.S. Department of Justice (DoJ) this week announced the indictment of 54 individuals in connection with a multi-million dollar ATM jackpotting scheme. Ploutus Malware The large-scale conspiracy involved deploying malware named Ploutus to hack into automated teller machines (ATMs) across the U.S. and force them to dispense cash. The indicted members are alleged to be part …
Comcast Hit With $1.5M Fine For Cyber Breach
Originally posted on Bleeping Computer: Comcast will pay a $1.5 million fine to settle a Federal Communications Commission investigation into a February 2024 vendor data breach that exposed the personal information of nearly 275,000 customers. The breach occurred in February 2024, when attackers hacked into the systems of Financial Business and Consumer Solutions (FBCS), a debt collector Comcast had stopped using two …
Hackers Bypass Signal, Telegram And WhatsApp Encryption To Read Messages
By Davey Winder Updated November 25 with a new warning from America’s Cyber Defense Agency, CISA, regarding how spyware is targeting users of instant messaging applications, as well as further comments from malware experts regarding the Sturnus threat from hackers impacting all secure messenger users. Nobody wants their secrets to leak, whether that is the Department of War, FTSE 100 companies, or …
CMMC Compliance – Step by Step
1. CMMC Is 70% Technical Controls — IT Is Core to Compliance Most of CMMC’s Level 1 and Level 2 requirements involve: These are IT disciplines, not legal or consulting tasks. Engler IT implements the actual technologies that meet these controls, not just paperwork. 2. Policies Alone Don’t Make You Compliant Many cybersecurity firms deliver policies in a binder and leave. …
- Page 1 of 2
- 1
- 2










