Emotet Phishing Scam Targets Financial Institutions with Malicious Fake Invoices

Widespread malware evolves, spreading rapidly in the US and UK We’ve written a lot about phishing and spear phishing in this space, but a new series of phishing scam attacks targeting banks and financial institutions in the US and the UK deserves your renewed attention. They are not only destructive but also leave doors open for future attacks. Emotet Trojan Powers Phishing Scams A banking trojan called Emotet has recently evolved into a botnet. It enables enterprising cyber criminals to profit from lending its powerful capabilities to others who seek to spread their own malware to unsuspecting victims. Last year,…

READ MORE

Close the Door to Hackers by Purging Weak Passwords

Marriott, Target, Home Depot and others have made headlines in recent years for data breaches that affected millions of customers. But did you know that 43 percent of breaches hit small businesses? Limited resources and lack of expertise often leave security gaps in smaller organizations, compounded by weak passwords and other risky practices. For instance, in the Target attack, hackers stole credentials from a much smaller company in the retailer’s supply chain. They then used the stolen credentials to access Target’s network. Sadly, similar scenarios play out over and over again. And users make the job much easier for criminals…

READ MORE

Law Firm Mobile Security Best Practices

Like most businesses, law firms have seen an increased mobile workforce in recent years. Mobile access increases employees’ ability to communicate with clients and coworkers quickly, as well as access documents on the run. But it also raises security concerns. Incorporate law firm mobile security best practices to protect sensitive business and client data. 1. Employ Mobile Device Management (MDM) The industry offers a host of MDM options to help your law firm get a handle on mobile security. Choose an MDM system that allows you to specify which devices can access the network, as well as what applications they…

READ MORE

Stop Abbreviating 2020 and Essential Tech Tips for the New Year

While you work on those resolutions to eat right and exercise, make a few resolutions for your business, as well. A fresh year presents the perfect opportunity to tighten security and run some much-needed maintenance. Protect your business with these basic tech tips for the new year. 1. Stop Abbreviating 2020 Commit now to writing out all four digits of the year. Writing “20” instead of “2020” leaves the door open for fraudsters. For example, suppose you sign a credit contract with the date 1/27/20. A bad actor could change the date to 1/27/2019 and attempt to collect an additional…

READ MORE

Gone Phishing: How to Be Safe from Personalized Spear Phishing Attacks

Phishing attacks entered the scene when AOL still ruled the Internet. More than two decades later, cyber criminals continue to use targeted phishing techniques for one simple reason. They work. Specialized attacks, known as spear phishing, use personal details to trick victims into clicking malicious links or sending sensitive information. For example, last year, hackers compromised the email system for an Ohio parish. After spying on email conversations, they posed as a construction company hired to complete parish renovations. Soon, the parish received an email, supposedly from the contractor, listing new instructions for payment transfer. In response, they paid nearly…

READ MORE

Seven cybersecurity tips for 2020

Seven cybersecurity tips for 2020 Used with the permission of http://thenetwork.cisco.com by Kevin Delaney Security experts share their predictions, warnings, and best practices for the coming year. 2020 promises a wave of technology change that will further transform the enterprise — and our very lives — in profound ways. But that inclusive, sustainable, and productive future demands a far-reaching commitment to cybersecurity. In 2019, there was no shortage of damaging, heavily publicized security breaches. And given the ever-increasing sophistication of cybercriminals — and the mounting complexity facing the defenders — the threat landscape in 2020 promises all-new challenges. So how…

READ MORE

Getting bombarded by scam calls? You’re not alone.

Getting bombarded by scam calls? used with permission from FTC.gov by Jim Kreidler The Social Security Administration (SSA) scam is the number one scam reported to the FTC right now. As soon as a caller threatens you, or demands you pay them with a gift card or by wiring money, it’s a scam. Even if the caller ID tells you otherwise. If you get a call from someone claiming to be from the Social Security Administration, hang up the phone and remember: Your Social Security number is not about to be suspended. The real Social Security Administration will never call…

READ MORE

How to Spot Data Breach Warning Signs to Protect Your Business

Data breach. The phrase suggests compromised customer data, with resulting legal battles and hefty remediation costs. Most attacks take weeks, or even months, to detect. However, businesses that detect and address data breach warning signs earlier can save millions of dollars while protecting sensitive data and business reputation. Alarmingly, according to a recent Ponemon study, hackers spend an average of 197 days inside the targeted system before being discovered. That represents more than six months to pull sensitive information, introduce malware or encrypt files. Adding to the problem, the mixture of public and private clouds, along with an increasingly mobile…

READ MORE

eMazzanti Technologies Seeks Fast Company’s 2020 World Changing Ideas Award

Hoboken, New Jersey — (Cision) January 1, 2020 – eMazzanti Technologies, a NYC area managed services provider (MSP), retail IT consultant, and cloud services company, is proud to announce that the company is competing for a prestigious Fast Company 2020 World Changing Ideas Award. The coveted award honors products, concepts, companies, policies, and designs that are pursuing innovation for the good of society and the planet. The contest, now in its fourth year, has honored everything from large companies’ sustainability initiatives to clever consumer products to groundbreaking government policies. World Changing Ideas Based on Experience and Backed by Science eMazzanti’s…

READ MORE

5 Ways A Managed Services Provider Promotes Revenue Growth in 2020

To gain and maintain a competitive edge, small to mid-size businesses (SMBs) require the same technologies as larger corporations. With enterprise needs and small business budgets, more and more SMBs are turning to a managed services provider (MSP) to move them ahead of the curve. While some businesses view IT consultants simply as a means to keep computers up and running, others see the possibilities for powerful, strategic partnerships. Choosing the right MSP not only helps your organization work smarter; it can also help you grow your business and improve your bottom line. Consider these five ways a quality managed…

READ MORE