Passwords Are Still the First Step in Data Security: Here’s How to Secure Yours

Whether they come to your organization as consumers or clients, students or patients, people expect you to keep their personally identifiable (and often highly sensitive) information safe. To meet this expectation, you might turn to cutting-edge encryption tools and pseudonymization methods. But countless organizations overlook the most obvious place to start when it comes to protecting data: passwords. To help you take this pivotal first step toward optimal data security and to protect your organization from mistakes and breaches from within, here a few robust password guidelines you can follow. Create and implement a password policy Simply, a password policy…

READ MORE

The VPNFilter Attack and Beyond: 3 Ways to Stay Safe in a Scary Cyber Security Climate

Small business owners have been on high alert since last month, when the FBI announced that VPNFilter has infected over half a million consumer devices—and recent reports suggest the attack was on an even bigger scale than initially thought. The malware menace is reportedly the handiwork of a ring of Russian state-sponsored hackers that goes by multiple names, including “Fancy Bear” and the “Sofacy Group”—the same cyber crime syndicate accused of tampering with the election during the 2016 United States presidential race. The group’s latest cyber strike is just as sophisticated as you would imagine.Though experts are still trying to…

READ MORE

3 Tips for Maintaining a Highly Functioning Firewall

“I’ve updated the user interface to make it cluttered and complex,” said no software designer ever. “I’d like the font on our wedding invitation to be messy and hard to decipher,” said no bride to be ever. Clean and simple is the way to go. Your firewall is no exception. A complicated firewall is not only convoluted, but dangerous. Unnecessary objects and rules open the door for misconfigurations, performance degradation, and compliance gaps that hike up operational costs and raise cybersecurity risk. To help you simplify your firewall for optimal performance, here are three easy, safety-conscious tips you can follow….

READ MORE

The Risks of GDPR Non-Compliance

In 2016, the European Union (EU) adopted the General Data Protection Regulation (GDPR). This legislation strengthens rules on data protection to allow individuals greater control over their personal data. The GDPR rules take effect on May 25, 2018, after which supervisory authorities may impose a range of penalties for GDPR non-compliance. Business leaders should know that the regulations apply to companies, government agencies, non-profits, and other organizations that do business with people in the EU, or that collect and analyze data tied to EU residents. The GDPR applies no matter where the organization is located. Despite ample warning, a significant…

READ MORE

GDPR and Cybersecurity: The Future of Data Protection is Here

We’ve all known for years now how important it is to manage and secure our company’s data to protect both consumers and ourselves. Still, hardly a week goes by without reports of cyberattacks and data leaks at organizations both large and small. According to Verizon’s 2018 Data Breach Investigations Report, 2017 saw more than 2,200 confirmed data breaches. That translates to a lot of lost data, lost trust, and lost revenue. In an effort to bolster data protection and increase its citizens’ ability to control their personal information, the European Union (EU) has developed the General Data Protection Regulation (GDPR). If…

READ MORE

Family Office Risk Management in the Digital World

In North America alone, over 4,500 family offices provide wealth management for, and oversee the affairs of, ultra-high net worth families. Family offices differ as widely in form and function as the families they represent. However, there are many commonalities among the challenges they face and the roles they fill, including family office risk management. Many family offices manage wealth equivalent to that of a small or mid-size business (SMB), and they face similar technology needs. As in an SMB, family office technology must provide the basic infrastructure for communication and document management in a safe and secure environment. Unique…

READ MORE

Top-to-bottom Cyber Security Policy Needed

In the digital economy, almost all businesses depend on computers, smartphones and the Internet to function. Thus, most are now potential targets for cyber-criminals. Clearly, modern companies need an effective cyber security policy. Attacks continue to increase in number and severity because bad actors are getting rich from the market for stolen data. As will be shown, a lack of awareness among entry-level employees and the need for top leaders to get behind security policies leaves many companies dangerously exposed. Entry-level Employees Unaware According to the February 15, 2018, article, Employee Awareness of IT Security Threats, appearing on the business…

READ MORE

5 Tips to Secure Your Home Office Network

You may be a busy, travelling executive, a telecommuter or multi-tasking parent. More than likely you have multiple devices that connect to your home Wi-Fi. With cyber-criminals getting more sophisticated and attacks more frequent, you may want to do more to secure your home office network. If you are concerned about identity theft and the security of your accounts and personal information, here are our top five recommendations to secure your home office network: 1.  Use 2FA for Bank Accounts, Social Media and System Access Cyber-criminals now use a variety of methods to guess or steal passwords. Simply put, a…

READ MORE

2017: The Year in Cyber Security

With 2018 well underway, we thought it was high time we took a look back at how the cyber security landscape changed in 2017. As we covered in a previous post, 2017 was the year that WannaCry waged a world war and titans of every industry announced devastating security breaches—perhaps to avoid the backlash that Yahoo! faced when it revealed it had kept a major breach under wraps for four years. The events of 2017 shattered trust. But they also inspired the sharpest minds in tech to take action and develop cyber security methods strong enough to match what we…

READ MORE

Manufacturing Cyber Security Presentation at NJMEP

Hoboken, New Jersey ­- (Cision) January 31, 2018 — eMazzanti Technologies Vice President and Co-founder, Carl Mazzanti, will be the featured speaker at a Manufacturing Cyber Security Program organized by the New Jersey Manufacturing Extension Program (NJMEP) on Thursday, February 1, 2018. The Manufacturing Cyber Security Program is scheduled to run from 9:30 to 11:30 am at NJMEP Headquarters, 2 Ridgedale Ave., Suite 305 in Cedar Knolls, New Jersey. As announced, Mazzanti’s topic will be, “Secure the Manufacturing Product Line.” “Manufacturing has recently jumped to number two on the list of industries most vulnerable to cyber-attack,” stated Mazzanti. “As industrial technology…

READ MORE