(800) 567-1180


Posts Tagged ‘Internet Security’

ECT is still here for your building needs through COVID19

Here at ECT, like all companies, we are paying close attention to the CDC recommendations as well as the Governor of Kentucky’s rules and regulations as we continue to move through this pandemic.

Our business is still open, though we’ve made necessary updates to our workflow.

For employee safety, when we are interacting with our own team, we are giving space, staying 6 feet apart. 

For some of our customers, their everyday rules and regulations mandate we must have two people on any part of a job at any time, for safety and liability. We are following this rule and staying apart from each other as best we can.

Our team is using latex gloves on all projects, and, of course, is not shaking hands.

A lot of what we are doing right now is servicing buildings while they are closed. We follow all guidelines set forth by those buildings. We have several projects for JCPS we are working on now, while there are no people in the buildings and this will insure that when school reopens, all systems are “go.” We’re doing all scheduled service calls, checking systems and updating where necessary. Rest assured, we use disinfectant on all devices before and after touching them. Because we are dealing with biometrics in many cases (such as fingerprints) we are especially careful.

We view all of this as necessary work, and safer while there are no students or employees in these buildings. We want to keep our customers up and running. 

Most interaction with our customers has gone virtual and we are happy to meet via video chat with any facilities managers out there having issues. You want to be sure your HVAC and security systems are running as they should, protecting your building and company from all sides.

If you need sales or service, our people are remote and available. For more information:

For sales, please call (800) 567-1180 or email sales@ectservices.com

For service, please call (800) 567-1180 or email service@ectservices.com

Stay healthy, everyone!

HID Authentication Services offers seamless identity and access control

Security goes far beyond regulating who can enter and exit your facility.

As the world grow increasingly complex and more and more of our interactions take place online, controlling access to cyberspace has become at least as important as controlling physical space. Consumers are more aware than ever of privacy concerns, and regulators are enacting rules aimed at protecting their digital lives.

Organizations, particularly those in heavily regulated industries like finance and healthcare, have struggled to keep up. In most cases, they have cobbled together a patchwork of access systems that determine who can go where in both physical facilities and online networks. Those systems are often not integrated, which makes maintenance far from seamless.

HID is hoping its new cloud-based authentication service will help organizations take a big step forward in building and maintaining fully integrated, seamless identity and access management systems.

HID Authentication Service offers multi-factor authentication for users across the entire organization, from users who require only minimal access to those who must have access to the most sensitive areas and records. HID Authentication Services integrates with existing platforms seamlessly using APIs. Reports are centrally gathered, making auditing for compliance issues much simpler.

“HID Global continues its move toward cloud solutions with the addition of new IAM services, expanding the offering with a unifying technology platform for our millions of users,” Brad arvis, vice president and managing director of Identity & Access Management Solutions (IAMS) with HID Global, said in a company press release.  “HID is among the only IAM solution providers that can offer authentication for high security use cases all the way down to basic enterprise multifactor authentication. With this breadth of solutions, we believe that organizations in regulated markets, in particular, will gain the most significant benefits from the HID Authentication Service.”

Interested in reviewing your access and authentication requirements? Call ECT Services for a consultation.

Four best practices for keep your business secure on social media

Americans spend more time on social media than any other major Internet activity, including email, according to Business Insider. Having a robust presence on social media is an absolute must for businesses and organizations. Here are four best practices aimed at protecting your business on social media:

Screen Shot 2015-11-29 at 6.59.26 PM


Keep an eye on who has access to your profiles. Grant only the level of access necessary based on responsibilities. Review profiles regularly – once a quarter – and revoke access where necessary. Change passwords regularly, and always after personnel changes. Failing to keep access permissions updated could give disgruntled former associates the opportunity to highjack your profile and wreak havoc on your image.


Be aware of copyright permissions. Don’t just Google for images to go along with a post; you are more than likely violating the copyright of whoever owns the image and opening yourself up to a lawsuit. Purchase rights from a stock photo service, or look for images available under creative commons licenses or in the public domain. Be sure to credit appropriately as indicated under the license.


Beware the overshare. Before you share in image captured inside your facility, review it from a security point of view. Does it reveal anything that might put customers or employees at risk? Look for exposed computer screens with sensitive data on display, research and development information that might tip off competitors, or anything that might compromise security. Before you post an announcement about a new employee, deal or partnership, be sure you’ve gained approval from all parties involved.


Be responsive. If a customer engages with your business online, be sure to respond in a timely, appropriate manner. Customers expect two-way communication on social media, and failing to respond can damage credibility. Responses should be handled by a team member trained in customer service, and with privacy and security in mind.