Targeted Security Awareness Training Delivers Large Return on Cybersecurity Investment

McAfee recently estimated the global cost of cybercrime at nearly $1 trillion. In response, companies have increased security spending while strengthening cloud security, network monitoring and threat detection. But to truly combat cyber threats, a comprehensive cybersecurity solution must include targeted security awareness training. The People Challenge Despite millions spent securing networks and deploying state-of-the-art cybersecurity tools, the biggest threat to an organization remains the human factor. When employees re-use passwords, click unsafe links or browse the internet, they introduce vulnerabilities. In fact, over 90 percent of cyberattacks occur because users click malicious links or share information. Hackers know these…

READ MORE

5 Steps to Prevent Cyberattacks and Safeguard Legal Client Information

Attacks like WannaCry and Petya have dominated tech news in recent years. Ransomware has become big business, with highly organized bad actors using increasingly sophisticated tactics. The risks and costs associated with ransomware have mounted higher than ever. But law firms can take simple, effective measures to prevent cyberattacks. In the legal industry, the real costs of cyberattacks reach beyond the budget. Law firms make extremely attractive targets for hackers because they store a wealth of sensitive information. Consequently, firms have an ethical obligation to proactively address technological challenges in the context of client matters. Catching hackers can prove nearly…

READ MORE

Supply Chain Disruptions Cause Delays for Many Businesses, But Not All

Empty shelves and lengthy shipping delays continue to wreak havoc on the global economy. For businesses, supply chain disruptions all too often mean delaying critical technology purchases or limping by on old equipment. As a result, organizations need to think creatively and explore the options at hand. And for eMazzanti customers, help may be just a phone call away. Perfect Storm Leads to Supply Chain Disruptions No single event resulted in today’s situation. Even before 2020 turned the world upside down, digital transformation sparked an increasing demand for technology. When the corporate world switched to remote work almost overnight, that…

READ MORE

Protecting Critical Data Starts with Microsoft 365 Data Resiliency and Recovery

Migrating to the cloud brings a host of benefits, beginning with anytime/anywhere data access. However, even in the cloud, organizations need to plan for business continuity and data recovery. The key to protecting information assets begins with understanding Microsoft 365 data resiliency and recovery. While machine failures and natural disasters pose less of a threat in Microsoft 365 than with on-premises data, other risk scenarios exist. For instance, a disgruntled employee may delete critical files or emails. Likewise, an admin can mistakenly remove large portions of content. And cyber criminals always pose a threat. Fortunately, Microsoft has implemented several layers…

READ MORE

Modern Authentication in Microsoft 365 Key to Improved Security

In February 2021, Microsoft announced an updated schedule for removing support for basic authentication. That is, in the second half of 2021 modern authentication will become the access method for Office apps. While Microsoft has granted customers additional time to implement the change, organizations need to prepare now. The process of implementing modern authentication methods and disabling basic authentication can prove complex. Various versions of Office handle authentication differently. Additionally, while challenges with application and protocol support have eased, mobile apps still give some trouble. And organizations need to avoid a key security risk. Modern Authentication vs. Basic Authentication First,…

READ MORE

Regain Control of the Cloud with Microsoft Cloud App Security

Migrating to the cloud strengthens organizations by powering remote work and increasing collaboration. However, with these advantages come additional challenges as companies work to balance data accessibility with data security. Microsoft Cloud App Security helps businesses harness the value of cloud computing while safeguarding critical digital resources. Visibility, Protection, and Compliance with Microsoft Cloud App Security As a Cloud Access Security Broker (CASB), Microsoft Cloud App Security sits between cloud services providers and the users of those services. In this role, it acts to enforce the organization’s security policies. For instance, a CASB may enforce a policy that prohibits sharing…

READ MORE

Windows 11 Set to Deliver Security and Productivity Improvements

This fall, Microsoft will release the newest version of its Windows operating system. While official Microsoft communications remain vague on the timing, signs point to an October release date for Windows 11. New and improved features promise enhanced security and productivity, as well as faster updates and more support for tablets. Productivity Boosts Windows 11 includes several key features to boost productivity and collaboration. To begin with, the update allows users to access Microsoft Teams directly from the taskbar. That means that with the click of a mouse, users can chat with or video call a contact without leaving their…

READ MORE

Kaseya Ransomware Attack, Lessons to Learn

Over the July 4th weekend, IT solutions provider Kaseya fell victim to a cyber-attack. Cybercriminal gang REvil exploited a vulnerability in Kaseya’s remote monitoring tool, using the update process to push ransomware further downstream. The Kaseya ransomware attack provides yet another cautionary tale for businesses across the spectrum. Kaseya represents the trend of small to medium businesses (SMBs) using managed services providers (MSPs) to manage their IT environments. These critical services allow SMBs to focus on their core business while benefiting from enterprise-level IT services. But the convenience, while essential, does pose some risk. Kaseya Ransomware Attack Highlights Supply Chain…

READ MORE

Your Identity Theft Playbook

The United States suffers identity theft at more than twice the rate of the world average. According to a recent survey, identity theft has struck an astonishing 33 percent of US citizens. And, while thieves certainly prey on the elderly, the majority of victims are younger. Consequently, identity theft poses a risk not only for the victim, but for their places of business. Consider the risk when high-level employees have their identities stolen. Not only can thieves wipe out their bank accounts, but they can use stolen credentials to gain access to privileged information. Individuals and businesses both need to…

READ MORE

How to Know If Your Phone Has Been Hacked

Smartphones have revolutionized our personal and business lives. We socialize on phones, take endless photos, use them to close deals, find restaurants, organize our schedules, and deposit checks. But all that power and flexibility brings inherent risks. Protect yourself by recognizing the signs that indicate your phone has been hacked. Know the Hacker Playbook Individuals can gain access to your phone and its data in a variety of ways. Understanding their methods will help you keep bad actors out. For instance, hackers may access your phone by: Direct access – With direct access to your phone, a hacker can install…

READ MORE