Ransomware Insurance Coverage Disappearing, Not Enough for Robust Cybersecurity

On May 9, European insurance giant AXA announced it will no longer provide support for ransom payments made to hackers. While AXA appears to be the first insurer to deny ransom payments, the move could signal an impending shift in ransomware insurance coverage. The AXA announcement comes as ransomware attacks prove an increasingly lucrative business model. For instance, victims paid an estimated $350 million in ransom payments in 2020, over 300 percent more than in 2019. In recent high-profile cases, Colonial Pipeline paid attackers $4.4 million, and CNA Financial Corporation paid a whopping $40 million. Meanwhile, cyber criminals continue to…

READ MORE

Hybrid Workforce Strategies for Success

With vaccinations on the rise and more locations preparing to return to quasi-normal, businesses need to plan next steps. While numerous surveys show that employees mostly celebrate returning to the office, workers expect more flexibility than before. For many organizations, this means operating with a hybrid workforce. A hybrid workforce includes employees working in a traditional setting as well as employees working remotely. In fact, many workers plan to split their time between the office and home. To promote success in this new environment, organizations need to use the lessons from 2020 to drive strategies moving forward. Analyze Lessons Learned…

READ MORE

Improve Email Deliverability and Secure Business Reputation with Essential Tools

Email plays a vital role in finding and retaining customers. However, emails that fail to reach their targets represent critical missed opportunities. And when hackers successfully spoof company email addresses, your online reputation suffers. Addressing key components of email authentication helps you improve email deliverability and protect your business reputation. Emails can fail to reach their intended targets if the inbound mail server cannot verify the sender. For instance, in a spoofing attack, the hacker poses as a legitimate sender to trick the receiver into downloading malware or providing information. Consequently, if a receiving mail server doubts the authenticity of…

READ MORE

Remote IT Support Delivers Proactive Solutions

With information technology and cybersecurity threats both evolving daily, organizations struggle to secure vital assets and maximize productivity. A widening cybersecurity skills gap further complicates the scene. Harnessing the power of remote IT support allows even small businesses to benefit from enterprise-grade solutions. Flexible Options to Meet Varied Business Needs Managed services providers (MSPs) offer a wide variety of solutions customized to specific business demands. For example, an organization with an established, in-house IT department may contract with a service provider to support a specific software platform. Alternatively, the MSP may provide communications services or facilitate cloud migration. Additional services…

READ MORE

Incident Response Plan a Critical Component of Cyber Security

By Almi Dumi, CISO, eMazzanti Technologies A security breach can have devastating effects on your organization. In fact, a recent report from IBM lists the average cost of a data breach in the United States at $8.64 million. However, organizations that define and follow an incident response plan for all security incidents can mitigate exposure and risk. Consequently, organizations should have a plan ready before an incident occurs. An incident response plan that begins with 24/7/365 monitoring will shorten the response time and increase the chances of a successful recovery. This post outlines the six phases of a typical incident…

READ MORE

Secure Wi-Fi Resources and Enable Your Remote Workforce with eMazzanti’s Cyber Security Workshop Replay

NYC area IT security consultant makes 2021 Secure Wi-Fi Workshop available to anyone online—in virtual cyber security workshop replay Hoboken, New Jersey – eMazzanti Technologies, a specialist in cybersecurity, is replaying on demand a workshop promoting secure Wi-Fi for your remote workforce. The informative virtual replay session addresses the landscape of 2021 Wi-Fi cyber-threats featuring Wi-Fi security experts from WatchGuard and eMazzanti Technologies. 2021 Wi-Fi Cyber-Threats Workshop On-Demand The virtual event, “Enable Your Remote Workforce – Secure Your Wi-Fi Resources to Prevent Cyber Risk,” is available any time for replay on demand. Here, Jim Steinbacher, WatchGuard Technical Evangelist for Wireless,…

READ MORE

Celebrate World Backup Day with Data Backup Best Practices

Break out the party hats and celebrate World Backup Day on March 31. Better yet, use the coming month to implement data backup best practices to protect vital information assets and ensure business continuity. Reliable backups form a critical factor in defending your business from ransomware, natural disasters, and other hazards. Start with the Basics Begin with essential data backup best practices that have saved businesses for years: 3-2-1 rule – Simply put, the 3-2-1 rule means that you store three copies of the data on at least two different backup devices and move one copy offsite. For instance, you…

READ MORE

Balancing Cybersecurity and Productivity to Optimize Work-From-Home

During an important video chat sales presentation, an account executive attempts to bring up critical information. But the system denies her access to the file. Frustrated, she limps through without the data. In the current environment, the perfect blend of effective cybersecurity and productivity can prove elusive. But with careful planning, businesses can achieve both goals. In today’s data-driven and work-from-home business environment, organizations need strategies that give the good guys ready access to data while keeping the bad guys out. Several factors make finding that balance a challenge. First, to work productively, employees need quick access to quality data….

READ MORE

Microsoft Exchange Hack – Essential Steps to Protect Your Data

On March 2, Microsoft warned of exploits that take advantage of multiple Microsoft Exchange vulnerabilities. Security experts warn that any organization running on-premises Microsoft Exchange could be at risk for the Microsoft Exchange Hack. They must take the threat seriously and follow the steps necessary to protect data assets. Hafnium Hack The Microsoft hack appears to have originated with the Hafnium organization out of China. Hence, some refer to it as the Hafnium Hack. However, experts have now identified at least ten advanced persistent threat groups using the vulnerabilities to attack thousands of servers an hour. And it appears the…

READ MORE

Replay eMazzanti’s Cybersecurity Workshop to Protect Against 2021 Cyber-Threats

NYC area IT security consultant makes 2021 Cyber-Threats Workshop with security recommendations available to anyone online—in virtual workshop replay Hoboken, New Jersey – eMazzanti Technologies, a specialist in cybersecurity, is replaying on demand the first of two informative cybersecurity workshops. The virtual replay session addresses the landscape of 2021 cyber-threats featuring experts from WatchGuard and eMazzanti Technologies. 2021 Cyber-Threats The first virtual event entitled, “2021 Cyber Threat Landscape: What is Happening Now and What You Need to Know,” is available any time for replay on demand. In this session, Marc Laliberte, WatchGuard Senior Security Analyst, delivers an interactive workshop discussing…

READ MORE