Cybersecurity for small business: Tech support scams

used with permission from FTC.gov Andrew Smith, Director, FTC Bureau of Consumer Protection An employee gets a phone call, pop-up, or email warning about a problem with the office computer. In an effort to be helpful – or perhaps concerned they clicked on something that caused the glitch – the employee follows instructions to send money, turn over personal information, or provide access to your system. As a small business owner, you know it’s a tech support scam, but are you sure every member of your team has the savvy to spot it? The FTC has new resources to help protect…

READ MORE

2018 Business Tech Review: Innovation Balanced with Security

From a surge in manufacturing robots and mobile POS to improved remote access, 2018 brought a host of advances in business tech. At the same time, cyber-attacks continued to make headlines, highlighting the need for more robust cyber-security. In the coming year, organizations will search for a balance between embracing technology and safeguarding information assets. Understanding where we have come from can inform our decisions moving forward. Improved Remote Access Nearly half of the workers in the United States work remotely at least part of the time. Remote access is not a new concept by any means. However, business tech…

READ MORE

How can you tackle network security on vacation?

used with permission from Tektonika (HP) by Joe Hewitson The snow gently falls outside as you kick back in your Snuggie, ready to conquer that Netflix backlog. You’ve earned it! During the months leading up to winter, you vanquished any and all network security vulnerabilities threatening your digital kingdom, and now, your office is more secure than the Fortress of Solitude. But then, you look at your watch and realize the minutes are melting away, even though the outside world is freezing over. Days are getting shorter, and the seasons are changing. While you’ve admirably confronted office security head-on, cold…

READ MORE

Cybersecurity for Small Business: Physical Security

used with permission from FTC.gov by Andrew Smith, Director, FTC Bureau of Consumer Protection An employee catches up on some work while visiting the local coffee shop. She grabs her Double Mocha to go, but accidentally leaves behind a flash drive with hundreds of Social Security numbers on it. When she returns, the flash drive is gone. Then there’s the staff member who needs to free up file room space. After he tosses a stack of old company bank records into the garbage, a dumpster diver spots the trash and walks away with a windfall. At meetings with small business…

READ MORE

Reduce Risk, Increase Productivity and Save Money with Information Governance

Reduce Risk, Increase Productivity and Save Money with Information Governance Every day, the world produces 2.5 quintillion bytes of data. We send emails and texts, record financial transactions and equipment logs, create spreadsheets and presentations, and much more. By the year 2020, experts suggest, there will be roughly 1.7 megabytes of data created each second for every human on the planet. While the potential benefits of analyzing that data are limited only by our imagination, the task is daunting. Currently, we use only a tiny fraction of the stored data, ever. Furthermore, the data also represents potential risk and liability…

READ MORE

Build Your Defense Against Cryptojacking, an Increasing Threat

Security Tips to Protect Against Cryptojacking, an Increasing Threat Almi Dumi, eMazzanti Technologies InfoSec Team The first cryptocurrency emerged in 2009 as Bitcoin. Over the past nine years, Bitcoin and other digital currencies have gradually cemented a place on the financial playing field. While the currency has attracted attention for its growth potential and anonymity, it also opens the door to new security threats in the form of cryptojacking. The term “cryptocurrency” combines the words cryptography and currency. And in fact, the money is based on complicated mathematical encryption. Surprisingly, the “coins” only exist as lines of code in a…

READ MORE

Don’t Fall for Dark Web Sextortion Scam

A wave of fraudulent emails containing real user data obtained from the dark web is hitting computers around the world. The emails include a variant of an old online phishing scam termed ‘sextortion’. This dark web sextortion scam leverages digital-age fears to blackmail recipients and targets computer users in large numbers. Dark web sextortion scam criminals fraudulently blackmail victims into paying a ransom to avoid the distribution of an embarrassing video to family, friends and co-workers. The message claims to have been sent from a hacker who’s breached your computer and used your webcam to record a video of you…

READ MORE

eMazzanti Technologies Issues Dark Web Sextortion Scam Warning

NYC area IT security consultant advises the public not to pay or fall for cyber-criminals’ false sextortion scam threats Hoboken, New Jersey ­- (Cision) October 4, 2018 — eMazzanti Technologies, a NYC area IT security consultant and MSP, issued a warning today regarding an email “sextortion” scam based on stolen passwords obtained from the dark web. Presently, the company helps customers deal with this and numerous evolving cyber-security threats. The advisory comes in response to increasing emails targeting computer users that threaten embarrassment and demand payment. Alarmingly, the emails cite real user passwords purchased on the dark web as leverage…

READ MORE

4 Common Sense Email Security Tips to Safeguard Vital Business Information

Email Security Tips from Alexander Verlarde Most of us spend a significant portion of our work day sending or responding to emails. In fact, a 2017 study reports that the number of emails sent and received each day, worldwide, exceeds 269 billion. As the number of emails grows, so do the number of email threats. While hackers grow more proficient, security professionals work hard to keep pace. However, email remains a key area of vulnerability. Following a few basic email security tips can save both you and your company a great deal of frustration. 1. Be Aware of Common Phishing…

READ MORE

3 Lessons Learned from the LifeLock Bug

3 Lessons Learned from the LifeLock Bug A lot of people (4.5 million) depend on LifeLock, a subsidiary of security giant Symantec, to help them protect their online identity. Ironically, the company recently admitted that a vulnerability on the LifeLock website (LifeLock Bug) had potentially exposed millions of customer email addresses to hackers. This all sounds familiar. Remember the Equifax security breach fiasco? Or, more recently, a website breach at Panera Bread? In each case, unauthorized persons were able to access millions of customer records through the company website. These incidents and dozens more serve as cautionary tales for organizations and…

READ MORE