3 Steps to Proactive Manufacturing Cyber Security

Global insurance giant Chubb recently published a cyber risk report listing manufacturing as one of the top two industries targeted by ransomware attacks. With a large attack surface and a high incentive to quickly restore operations, factories make a particularly attractive target. Consequently, the spotlight has turned to increasing manufacturing cyber security. In fact, just last March, the Norwegian aluminum producer Norsk Hydro suffered a ransomware attack. The incident forced the company to temporarily close multiple plants, and losses totaled nearly $52 million. Smaller manufacturers, as well, face significant risk, heightened by historically lax cyber security measures. Industry 4.0 Blends…

READ MORE

3 Steps to Effective Local Government Cyber Security

Four years ago, the city of Atlanta launched a smart city initiative, hoping to improve municipal operations with integrated technology. The future looked bright. And then, in 2018, a ransomware attack crippled city infrastructure. One year and $17 million dollars later, Atlanta serves as a reluctant poster child for the necessity for robust local government cyber security. Anatomy of a Cyber Attack In 2019 alone, local governments and hospitals in the United States have reported 140 cyber-attacks. In fact, cyber-attacks have more than doubled since last year. These assaults have destroyed public records, disrupted healthcare and law enforcement and frozen…

READ MORE

Proactive 5G Cyber Security to Maximize Opportunity and Minimize Risk

You have seen the headlines, “The 5G Revolution,” and, “5G Will Change the World.” For years, the tech world has anticipated the approach of the fifth generation of wireless technology with the excitement of a five-year old nearing Christmas. Whether or not you buy into the hype, 5G will impact your business. Understanding and preparing for that impact, particularly in the area of 5G cyber security, can prove critical. Consider the evolution of cellular technology over the past 20 years. 3G brought us the mobile internet just after the turn of the century. In the late 2000s, 4G introduced internet…

READ MORE

3 Steps to Effective Cloud Security for Business

According to a recent report from Symantec Corporation, business organizations have transferred over half of their workload to the cloud. With huge benefits in terms of scalability and collaboration, the move makes good business sense. But those benefits come with risks. Business leaders must take a proactive approach to achieve effective cloud security that protects critical business assets. Effective Cloud Security: Complex Environment Creates Unique Challenges While the vast majority of organizations operate in the cloud to some degree, the nature of that cloud usage varies widely. Some businesses access specific software applications in the cloud while storing data on-premises….

READ MORE

How to avoid malicious hyperlinks and practice link safety

How to avoid malicious hyperlinks and practice link safety used with permission from Tektonika (HP) Whether it’s in reference to an interesting article or information on a great new restaurant, “send me the link” is a commonly used phrase in the internet era. This is equally true in professional circumstances, where coworkers communicate and collaborate as a part of their jobs. In today’s threat-filled environment, where large and small businesses alike are facing unprecedented cybersecurity attacks, link safety is an essential part of employee security training. CyberEdge Group’s 2019 Cyberthreat Defense Report found that 78 percent of networks had been breached in…

READ MORE

Carl Mazzanti to Address Industry 4.0 Risks on NJMEP National Manufacturing Day Panel

Hoboken manufacturing IT consultant is Platinum Sponsor and Featured Panelist at New Jersey gathering commemorating October 4th National Manufacturing Day eMazzanti Technologies today announced that Carl Mazzanti will be featured on a panel of cyber-security, privacy and business risk experts at the National Manufacturing Day Event organized by the New Jersey Manufacturing Extension Program (NJMEP). The NJMEP National Manufacturing Day program is scheduled to run from 7:30 am to 3:00 pm on Friday, October 4, 2019 at The Marigold, 315 Churchill Avenue in Somerset, New Jersey. The annual event brings together manufacturers, students, supporters and industry expert speakers. The proceedings…

READ MORE

Ecommerce Cyber Security 101 to Protect Your Small Business

Think like a thief. Picture a store left poorly secured, valuable merchandise easily accessible using minimal tools under cover of darkness. Now, imagine a digital storefront with weak security controls and thousands of financial records ripe for the picking. Hackers love small businesses, but you can stop them in their tracks with robust ecommerce cyber security. According to cyber security firm Kaspersky, 48 percent of small to medium businesses have experienced data breaches this year. That means the exposure of financial and personal data for thousands of customers. And it means a payday for hackers who sell that information on…

READ MORE

Master IoT Cyber Security Challenges with Comprehensive, Multi-layer Security

From the smart lock on your front door to the printer down the hall, you interact with the Internet of Things (IoT) dozens of times a day. In fact, in 2019, the number of connected devices jumped to more than three times the world population. In addition to convenience, that growth has also brought significant IoT cyber security challenges. Unfortunately, in their rush to meet consumer demand, manufacturers have paid more attention to features than to security. At the same time, global standards have failed to keep pace with innovation. With an ever-widening attack surface and valuable data ready for…

READ MORE

10 PCI Compliance Best Practices to Protect Your Business and Customers

In 2014, Home Depot suffered a data breach of historic proportions. Hackers gained access to the retailer’s payment systems, compromising credit card information for 56 million customers. That breach cost Home Depot $179 million. While no organization can claim immunity from cyber-attacks, following PCI compliance best practices can mitigate the extent of the damage. All organizations that process credit cards must adhere to the Payment Card Industry Data Security Standard (PCI DSS) or face stiff fines. More importantly, PCI compliance represents a starting point for effective cyber security. Following best practices not only keeps you compliant but protects both your…

READ MORE

How to stay protected before device recycling

used with permission from Tektonika (HP) Donating devices like laptops, phones, and flash drives may seem like a noble thing to do—after all, it’s good for the environment and makes devices available at a lower price point for people who may not otherwise be able to afford them. However, device recycling can pose a serious and often overlooked security risk. Device security is a concern that has to be addressed before donating so you can trust that your personal information will remain protected. In a 2019 report, security operations company Rapid7 revealed the dangers of recycling and discarding devices. Researcher…

READ MORE