Replay eMazzanti’s Cybersecurity Workshop to Protect Against 2021 Cyber-Threats

NYC area IT security consultant makes 2021 Cyber-Threats Workshop with security recommendations available to anyone online—in virtual workshop replay Hoboken, New Jersey – eMazzanti Technologies, a specialist in cybersecurity, is replaying on demand the first of two informative cybersecurity workshops. The virtual replay session addresses the landscape of 2021 cyber-threats featuring experts from WatchGuard and eMazzanti Technologies. 2021 Cyber-Threats The first virtual event entitled, “2021 Cyber Threat Landscape: What is Happening Now and What You Need to Know,” is available any time for replay on demand. In this session, Marc Laliberte, WatchGuard Senior Security Analyst, delivers an interactive workshop discussing…

READ MORE

Technology Security During COVID

We are wearing our masks, sanitizing our hands, sheltering in place, and anxiously awaiting our dose of the vaccine because when it comes to Covid-19—to paraphrase Benjamin Franklin—an ounce of prevention is worth a pound of recovery. The pandemic has upended our lives and has been especially tough on small businesses in a number of ways. The one that concerns eMazzanti is the unique risk small businesses’ work from home policies pose to their technology security. In this post, we’ll outline the vulnerabilities a work from home environment creates as well as how small business owners can cover all bases…

READ MORE

Cybersecurity Workshops Assessing 2021 Cyber-Threats Offered by eMazzanti

eMazzanti live virtual cybersecurity workshops to feature security and wireless experts on next steps to protect organizations and minimize work-from-home risk Hoboken, New Jersey (February 15, 2021) – eMazzanti Technologies, a specialist in cybersecurity, is hosting two informative cybersecurity workshops. The live virtual sessions describe and address the current landscape of cyber-threats and feature experts from WatchGuard Technologies. Cybersecurity Workshops The first virtual event entitled, “2021 Cyber Threat Landscape: What is Happening Now and What You Need to Know,” is scheduled February 19, 2021 at 11:00 am EST. In this session, Marc Laliberte, WatchGuard Senior Security Analyst, will deliver an interactive…

READ MORE

How Retail Cybersecurity Can Adapt to the 2021 New Normal

The retail industry, having learned to co-exist with a global pandemic, saw significant changes in 2020. Foremost among them is a major shift to the eCommerce channel. For those smaller retailers new to eCommerce technology, shopping and payment apps, and work-from-home technology, retail cybersecurity challenges have become much more of a concern for 2021. 2021 Cybersecurity Threats Trustwave’s 2020 Global Security Report found that 24% of all cyberattacks targeted retailers, the most of any industry. Alarmingly, the new normal of eCommerce and work from home (for back office staff) makes retail even more of a target than it was a…

READ MORE

Engage a Personal Cyber Security Trainer for the New Year

In our previous post, we listed three common cyber security threats with security best practices and cyber-security solutions that simplify your life while reducing the risk of an energy-draining security breach. Again, we encourage you to engage your personal cyber security trainer to improve your security health for the new year. Until you attend that life-changing meeting, here are three more common cyber security threats you face with security best practices and solutions to help keep you in shape. Remote Employee Threats As remote work multiplies employee locations, your workforce will be less and less protected by your network security…

READ MORE

Schedule a Workout Session with a Business Cyber Security Coach

Your day starts with an energy bar and a three-mile run. But on your laptop awaits a long list of business cyber security notifications that require your immediate attention. You rush to get through the alerts before others sign in and you’re swamped with the usual fire drills. And that project you’ve been trying to get to for the last five weeks? Well, it’s just going to have to wait for another day. Wouldn’t it be great if you could get this all into shape through a workout session with an expert business cyber security coach? Someone who could run…

READ MORE

Fight Double Extortion Ransomware Threat with Essential Security

Late in 2019, a new cyber security threat emerged. Criminals used ransomware to attack Allied Universal. In a twist now known as double extortion, the bad actors first extracted sensitive information before encrypting company data. Then they insisted that Allied pay a stiff ransom to avoid seeing sensitive data leaked publicly. Throughout 2020, other attackers have followed suit. To convince organizations to pay a ransom, criminals threaten to publish or sell the stolen data. To prove their point, they post samples of the data on their websites. Thus, the tactic effectively combines ransomware with data breach. And it places organizations…

READ MORE

Ransomware Payments Sanctions Avoided with Risk-based Compliance Program

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) recently issued an advisory to highlight the sanctions risks of ransomware payments. The advisory warns companies and others that ransomware payments to cyber criminals on OFAC’s blocked persons lists and those covered by embargoes are prohibited. Violators of OFAC regulations face financial sanctions that may be reduced if they meet certain conditions. “Under the Enforcement Guidelines… the existence, nature, and adequacy of a sanctions compliance program is a factor that OFAC may consider when determining an appropriate enforcement response,” the OFAC notice reads. “Now more than ever, preventative…

READ MORE

How to spot a business email compromise scam

Business email compromise (BEC) scams are on the rise. They target business owners and high-level employees in order to defraud a company, its customers, or its partners. In this type of scam, an attacker will pretend to be a trusted entity by spoofing a company email account. Then, they trick employees into revealing sensitive information or performing wire transfers. Types of BEC Scams There are different types of BEC scams. However, all these threats usually target employees with access to company finances, in an attempt to trick them into transferring money or revealing sensitive data. BEC scams include: false invoice…

READ MORE

7 bizarre security analogies about preventing ransomware hacks

7 bizarre security analogies about preventing ransomware hacks. Ransomware is the worst. Attacks grew 250 percent last year, and 26.2 percent of those targets were businesses. Even worse, one in six businesses that paid the ransom still didn’t get their data back. WannaCry alone affected over 400,000 machines, and let’s not even get started about ExPetr—the wipervirus formerly known as Petya—or October’s Bad Rabbit. And even though you’ve already implemented as many “new” and “innovative” strategies as you can, you still can’t sleep at night. First, the good news: Some script kiddies are switching to cryptocurrency mining. Fewer new strains were discovered last year than expected, and…

READ MORE