If you run a chiropractic practice in Maryland or the DMV, your phone system isn’t just a utility, it’s your revenue engine. Every new patient starts with a call. And if your phone system drops calls, routes incorrectly, lacks reporting, or can’t scale with growth, you are quietly losing revenue every week. That’s why modern chiropractic practices are switching to …
On the Cyber Brisket Podcast – Chris Traxler, The 20 MSP
True Partnership with MSP’s Chris Engler and Chris Traxler explore the dynamics of partnerships and common founder mistakes in sales process engineering. They discuss post-acquisition growth, culture evolution, and traits of successful sales leadership. The conversation shifts to building and scaling effective sales teams, highlighting Engler IT’s relationship with the 20 MSP and the benefits of community and scalability. The …
Google Extensions Hack: 840,000+ users hit by malicious browser extensions. Uninstall these ASAP!
originally published by PC World, January 2026 Security researchers are now warning of a targeted malware campaign that involves malicious software hiding in certain browser extensions. The wave of attacks, dubbed “GhostPoster”, targets Chrome, Firefox, and Edge users. There have been over 840,000 attacks since December, and the extensions went undiscovered in the Google App Store since 2020. How the GhostPoster …
Data Protection in Healthcare – Youth Data
How Engler IT Protects Youth Health Data Healthcare organizations that serve youth carry an added responsibility: protecting highly sensitive data while navigating complex consent and privacy requirements. Engler IT partners with healthcare providers to ensure youth health records are secure, compliant, and accessible only to authorized users. The First Major Step Healthcare Organizations Should Take Separate Youth Health Data from General …
IT Risk Management for Contractors
Construction companies operate in dynamic environments, including working between multiple job trailers, field devices, subcontractor platforms, and tight project deadlines. Engler IT works with contractors to manage IT risk without slowing the job down. One Thing Contractors Should Do Now: Secure and Standardize Field Technology Field devices, including laptops, tablets, and phones used on jobsites, are one of the largest unmanaged risks for …
Breach News – City of Baltimore (Again)
The City of Baltimore lost more than $1.5 million to a business email compromise (BEC) scam after a fraudster tricked employees into changing a contractor’s bank account information. Investigators just announced that in December 2024, an unspecified attacker submitted a fraudulent supplier contact form using the name of a legitimate company employee to gain access to the vendor’s Workday account. …
ID 20/20: How Engler IT Stops Social Engineering and Protects Clients 24/7
At its core, social engineering exploits human weakness, not technical weakness. It works by tricking someone into granting access through: It’s the classic “Hi, this is Carl in accounting. I’m locked out and need a reset” scenario. In a busy office, or a growing company where people don’t know every employee personally, this can be extremely effective. With today’s tools, attackers …
Cybersecurity for Insurance Teams
Insurance sales teams rely heavily on digital tools, client data, and communications. Any downtime, security breach, or misconfiguration can risk both productivity and client trust. Engler IT provides Managed IT Services to handle technology, cybersecurity, and compliance so the sales team can focus on selling and servicing clients, not troubleshooting systems. Cybersecurity for Insurance Sales Teams – What You Are Responsible For: …
Achieving FERPA Compliance
FERPA (Family Educational Rights and Privacy Act) protects student education records and governs how schools collect, store, and share student information. From an IT perspective, schools must demonstrate that systems, policies, and procedures keep student data secure and private. Achieving FERPA Compliance – here are the key milestones: 1. Assess Current Systems & Data Inventory Goal: Full visibility into data and risk …
CMMC Compliance for Engineering Firms
Engineering firms working with the Department of Defense (DoD) or federal subcontractors must comply with the Cybersecurity Maturity Model Certification (CMMC). This ensures that Controlled Unclassified Information (CUI) and Federal Contract Information (FCI) are protected from cyber threats. Understanding CMMC Compliance for Engineering Firms CMMC compliance depends on the level required by your contracts: For engineering firms, Level 2 is often …










