Ransomware Payments Sanctions Avoided with Risk-based Compliance Program

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) recently issued an advisory to highlight the sanctions risks of ransomware payments. The advisory warns companies and others that ransomware payments to cyber criminals on OFAC’s blocked persons lists and those covered by embargoes are prohibited. Violators of OFAC regulations face financial sanctions that may be reduced if they meet certain conditions. “Under the Enforcement Guidelines… the existence, nature, and adequacy of a sanctions compliance program is a factor that OFAC may consider when determining an appropriate enforcement response,” the OFAC notice reads. “Now more than ever, preventative…

READ MORE

How to spot a business email compromise scam

Business email compromise (BEC) scams are on the rise. They target business owners and high-level employees in order to defraud a company, its customers, or its partners. In this type of scam, an attacker will pretend to be a trusted entity by spoofing a company email account. Then, they trick employees into revealing sensitive information or performing wire transfers. Types of BEC Scams There are different types of BEC scams. However, all these threats usually target employees with access to company finances, in an attempt to trick them into transferring money or revealing sensitive data. BEC scams include: false invoice…

READ MORE

7 bizarre security analogies about preventing ransomware hacks

7 bizarre security analogies about preventing ransomware hacks. Ransomware is the worst. Attacks grew 250 percent last year, and 26.2 percent of those targets were businesses. Even worse, one in six businesses that paid the ransom still didn’t get their data back. WannaCry alone affected over 400,000 machines, and let’s not even get started about ExPetr—the wipervirus formerly known as Petya—or October’s Bad Rabbit. And even though you’ve already implemented as many “new” and “innovative” strategies as you can, you still can’t sleep at night. First, the good news: Some script kiddies are switching to cryptocurrency mining. Fewer new strains were discovered last year than expected, and…

READ MORE

What NOT to do after a data breach

What NOT to do after a data breach Breathe deep, reduce anxiety, and avoid these 9 things It’s an IT department’s worst nightmare: Your business has been hacked by a third party that has accessed your sensitive, confidential data. And often, by the time you discover it, a breach is well underway: US companies take an average of 221 days to detect a breach, according to a 2018 study. So what do you do? Well, it turns out that knowing what not to do is just as important—because, even with the best of intentions, your team could accidentally make the…

READ MORE

eMazzanti Offers Microsoft Azure Hands-on Immersion Workshops

Hoboken, New Jersey, October 28, 2020 (Cision) – eMazzanti Technologies, a New York City area business IT consultant and Microsoft Cloud Services provider has scheduled a series of complimentary virtual Microsoft Azure hands-on workshops for modern business. Attendees will walk through a virtual tour of the Azure Portal and receive hands-on training for deploying various Azure capabilities. Sessions of the Azure Customer Immersion Experience (CIE) are scheduled for 10:00 am EST on October 29, November 10, November 17, and December 15, 2020. Each session is 90 minutes long. Interested parties may register for the workshops here:Microsoft Azure Hands-on Immersion Workshop…

READ MORE

Microsoft 365 vs Google Workspace; Which Will Power your Teams?

The software you choose to power your teams will affect nearly every aspect of the workday, from online meetings to document creation and email. Naturally, Microsoft and Google dominate the landscape, both offering a variety of solutions for business. In the Microsoft 365 vs Google Workspace (formerly G-Suites) battle, which option will deliver for you? On the surface, Microsoft and Google offer similar options. Both provide email, word processing, spreadsheets and presentation capabilities. Both deliver the ability to connect through video conferencing and chat, to take notes and store documents. But a closer look reveals differing approaches. Microsoft builds on…

READ MORE

eMazzanti Technologies Makes Clutch’s Annual List of Top IT Firms in New Jersey

Our team at eMazzanti Technologies just got off the phone with Clutch! They called our offices to tell us that we had just been named one of the top IT firms in New Jersey! Hiring an outside provider is a smart business move in many ways, and hiring IT consultants is even more essential. That is why we are so honored to be one of Clutch’s top firms for 2020. Clutch is located in the nation’s capital city, just steps away from the White House in the District of Columbia. Their team of highly trained analysts takes the time to…

READ MORE

Cell Phone Best Practices Empower Work from Home

Now, more than ever, the lines between work and personal life have blurred. And for the millions of employees working from home, the cell phone represents the ultimate connecting point. More than ever, we use personal cell phones to conduct business. The following cell phone best practices help protect both the organization and the employee. Understand the Risks Allowing (or encouraging) employees to use their personal cell phones for business can benefit both the workplace and the employee. Employees benefit from the convenience of using a single, familiar device. Meanwhile, businesses save money on company phones while enjoying greater employee…

READ MORE

How to Succeed at Company-Wide Security Awareness Training

A recent survey by Security Magazine indicated that eighty percent of companies experienced at least one cybersecurity incident over the previous year. Firewalls and antivirus alone will not protect essential information from attack. Organizations must mitigate the human error factor with targeted, relevant security awareness training for every employee, including executives. Security awareness training teaches employees how to recognize and reduce cyber security risks. All too often, employees at all levels fail to realize how their own behavior opens the door to attack. Likewise, they may not understand and follow best practices to protect both the organization and customer data….

READ MORE

MSPs Empower Remote Work with Flexible Solutions

By summertime, nearly half of the U.S. workforce reported working from home full-time. Even after the pandemic, many employees will continue to work remotely at least part-time. Managed services providers (MSPs) help make that possible. By providing increased security, cloud services and collaboration tools, MSPs empower remote work. Long before 2020, work-at-home numbers began a steady climb. Remote work benefits businesses by reducing overhead costs and allowing hiring managers to seek talent without regard to location. On the other hand, workers benefit from increased flexibility, often reporting greater productivity when they work from home. At the same time, remote work…

READ MORE