9 Tips for Safe Online Shopping to Keep the Season Merry

This year, according to Adobe Analytics, shoppers spent a record $4 billion shopping online on Thanksgiving Day. And by the time the ball drops on New Year’s Eve, holiday shoppers will have spent more than $143 billion online. Not surprisingly, cyber criminals love this time of year. But with a little education and some basic safety tips, you can enjoy safe online shopping this season. 1. Beware of “Too Good to Be True” Deals You know never to trust a street seller offering Prada handbags or Rolex watches for $50. The same logic holds true for online sellers. The security…

READ MORE

Section 179 Deductions Power Technology Investments for Small Businesses

When December air turns frosty, children of all ages envision sleigh bells and a cornucopia of gifts. Business owners make their own wish lists. But instead of letters to Santa, they dream of year-end tax deductions. With Section 179 of the tax code offering more tax relief than ever, small businesses can make those dreams a reality with upgraded technology. Recent Changes Bring Business Benefits The Tax Cuts and Jobs Act, which took effect last year, introduced some key adjustments to Section 179 and bonus depreciation that put even more money back into the business budget. These changes include the…

READ MORE

7 Cyber Security Best Practices Every Business Should Implement

During 2019, cyber criminals attacked thousands of businesses. Half of those attacks targeted small businesses, many of which rely on outdated systems and insufficient security. Those businesses lost millions of dollars, as well as the confidence of their customers. While cyber attacks pose an increasingly serious threat, cybersecurity best practices mitigate the danger. Businesses that invest in cybersecurity initiatives realize the benefits of protecting vital assets and maintaining a critical business reputation. With the help of an experienced technology partner, use these seven steps to begin building the fortress you need to defend against cyber crime. 1. Create an Acceptable…

READ MORE

How to Fight Formjacking and Win Back the Holiday Shopping Season

The 2018 holiday season brought a new kind of Grinch. Late in the year, Symantec revealed that hackers had begun to employ a nearly invisible new tactic called formjacking. According to the Internet Security Threat Report, Symantec blocked nearly four million formjacking attacks in 2018. One third of those attacks occurred during November and December. Remember ATM skimmers that steal credit card information when you swipe your card? Think of formjacking as the online version of skimming. Hackers infect an online order form with malicious JavaScript. Then, when you enter your card information to make a purchase, the code transfers…

READ MORE

3 Steps to Help Manufacturers Comply with New York SHIELD Law

In July 2019, Governor Andrew Cuomo signed the Stop Hacks and Improve Electronic Data Security act (SHIELD) into law. This law affects any organization that holds private information for New York state residents. A greater understanding of key components of the New York SHIELD law will ease regulatory compliance for manufacturers and other businesses. In summary, SHIELD expands data breach notification requirements and mandates that organizations create or update a data security program. To meet these requirements, manufacturers must address risk, review vendor compliance, and ensure proper notification in the event data becomes compromised. 1. Comply with Expanded Data Breach…

READ MORE

Boost Manufacturing Cyber-Security with IT/OT Convergence Best Practices

Information technology (IT) and operational technology (OT) alignment with IT/OT Convergence Best Practices improves security and reduces downtime. Industry 4.0 continues to transform manufacturing. From collaborative robots to powerful data analytics, connected systems offer a host of exciting possibilities. However, those opportunities come with a cost in terms of security. To combat the rising threat of cyber-attacks, manufacturing companies must turn their focus to IT/OT convergence. Critical Differences Between IT and OT Before Industry 4.0, information technology (IT) and operational technology (OT) typically operated in separate silos with competing priorities. Even now, IT processes focus on data confidentiality and security….

READ MORE

3 Steps to Keep Manufacturing Operations Safe from Phishing Attacks

Verizon reports that phishing attacks remain the number one cause of data breaches, particularly in the manufacturing sector. In just the first half of 2019, more than 4.1 billion records were compromised. Alarmingly, attackers hope to gain trade secrets, compromise personal and financial data or even disrupt manufacturing processes. Manufacturers can, and should, implement high quality firewalls and automatically scan incoming emails for suspicious attachments or links. But technology cannot eliminate the human factor. As cyber criminals increase the sophistication of their attacks, end users must learn how to recognize and counter phishing attacks when they occur. Common Phishing Attacks…

READ MORE

Internet Domain Name Provider, Network Solutions Data Breach Confirmed

eMazzanti Technologies reports on Network Solutions Data breach affecting millions of web.com domain name customers Hoboken, New Jersey ­- November 6, 2019 — eMazzanti Technologies, a NYC area IT security consultant and MSP, shares information on a data breach confirmed yesterday by Internet domain name provider, Network Solutions. eMazzanti believes it important to share this information broadly as organizations large and small may be significantly affected. Currently, eMazzanti helps business leaders deal with all types of evolving cyber security threats. Network Solutions, the company reporting the breach, is the world’s first Internet domain name provider. It currently operates as a…

READ MORE

3 Steps to Proactive Manufacturing Cyber Security

Global insurance giant Chubb recently published a cyber risk report listing manufacturing as one of the top two industries targeted by ransomware attacks. With a large attack surface and a high incentive to quickly restore operations, factories make a particularly attractive target. Consequently, the spotlight has turned to increasing manufacturing cyber security. In fact, just last March, the Norwegian aluminum producer Norsk Hydro suffered a ransomware attack. The incident forced the company to temporarily close multiple plants, and losses totaled nearly $52 million. Smaller manufacturers, as well, face significant risk, heightened by historically lax cyber security measures. Industry 4.0 Blends…

READ MORE

3 Steps to Effective Local Government Cyber Security

Four years ago, the city of Atlanta launched a smart city initiative, hoping to improve municipal operations with integrated technology. The future looked bright. And then, in 2018, a ransomware attack crippled city infrastructure. One year and $17 million dollars later, Atlanta serves as a reluctant poster child for the necessity for robust local government cyber security. Anatomy of a Cyber Attack In 2019 alone, local governments and hospitals in the United States have reported 140 cyber-attacks. In fact, cyber-attacks have more than doubled since last year. These assaults have destroyed public records, disrupted healthcare and law enforcement and frozen…

READ MORE