Zero Touch Deployment: The Perfect System for Schools Facing COVID-19

Shaking hands upon introduction. Holding a menu at a restaurant. Many touches you regularly performed pre-COVID-19 now seem like an unnecessary risk. We can relate. We feel this way about traditional software deployment. In a traditional deployment, eMazzanti’s specialists work with members of the client organization to log into a device and configure all software, custom settings and security measures. We then test that all systems are go, often with the help of the end user, before moving onto the next device. While we are known for our efficiency and commitment to minimizing downtime, we recommend that clients seeking to…

READ MORE

Is Your Classroom Going Virtual?

Virtual Classroom: 3 Tips from an Educator Who’s Done It Students milling about the grounds. Professors bellowing in lecture halls. This was the scene in late summer 2020, when Notre Dame University opened its South Bend, Indiana campus for classes as usual. In the midst of normalcy, an invisible intruder lurked, waging a potentially deadly attack. Students, staff and faculty began falling ill with sore throats, chills and fever. Over the next few days, approximately 400 members of the Notre Dame community tested positive for COVID-19. The administration promptly shut down all activity on campus and called for at least…

READ MORE

How Your School Can Ace Virtual Teaching

As schools across the United States plan for a virtual or partially virtual curriculum, eMazzanti Technologies has received an influx of phone calls and emails from educators seeking a swift and seamless transition to this new normal. We are honored, but not surprised that schools trust us to guide them through this period of unprecedented change. Mere months ago, few could have anticipated that the COVID-19 pandemic would impact the Fall 2020 school semester, but the team at eMazzanti is better equipped than most. Since 2001, we’ve been helping clients adjust operations to adapt to changing times. School administrators—start taking…

READ MORE

How to Strengthen Convenience Store Security

High traffic and employee turnover make the more than 150,000 convenience stores (C-stores) in the U.S. attractive targets for cyber-criminals. The nature of the C-store environment makes it difficult to deliver compliance and standardization. So, what can business leaders do to strengthen convenience store security? Why Convenience Store Data Breaches? Some brands in the retail space experience almost no turnover in staff. By comparison, C-stores employ more transient workers. Deploying standards across all the stores proves difficult without having a regional or district manager visit every store on a regular basis. Hence, as studies show, C-stores and gas station chains…

READ MORE

3 Steps to Help Manufacturers Comply with New York SHIELD Law

In July 2019, Governor Andrew Cuomo signed the Stop Hacks and Improve Electronic Data Security act (SHIELD) into law. This law affects any organization that holds private information for New York state residents. A greater understanding of key components of the New York SHIELD law will ease regulatory compliance for manufacturers and other businesses. In summary, SHIELD expands data breach notification requirements and mandates that organizations create or update a data security program. To meet these requirements, manufacturers must address risk, review vendor compliance, and ensure proper notification in the event data becomes compromised. 1. Comply with Expanded Data Breach…

READ MORE

Boost Manufacturing Cyber-Security with IT/OT Convergence Best Practices

Information technology (IT) and operational technology (OT) alignment with IT/OT Convergence Best Practices improves security and reduces downtime. Industry 4.0 continues to transform manufacturing. From collaborative robots to powerful data analytics, connected systems offer a host of exciting possibilities. However, those opportunities come with a cost in terms of security. To combat the rising threat of cyber-attacks, manufacturing companies must turn their focus to IT/OT convergence. Critical Differences Between IT and OT Before Industry 4.0, information technology (IT) and operational technology (OT) typically operated in separate silos with competing priorities. Even now, IT processes focus on data confidentiality and security….

READ MORE

3 Steps to Keep Manufacturing Operations Safe from Phishing Attacks

Verizon reports that phishing attacks remain the number one cause of data breaches, particularly in the manufacturing sector. In just the first half of 2019, more than 4.1 billion records were compromised. Alarmingly, attackers hope to gain trade secrets, compromise personal and financial data or even disrupt manufacturing processes. Manufacturers can, and should, implement high quality firewalls and automatically scan incoming emails for suspicious attachments or links. But technology cannot eliminate the human factor. As cyber criminals increase the sophistication of their attacks, end users must learn how to recognize and counter phishing attacks when they occur. Common Phishing Attacks…

READ MORE

3 Steps to Proactive Manufacturing Cyber Security

Global insurance giant Chubb recently published a cyber risk report listing manufacturing as one of the top two industries targeted by ransomware attacks. With a large attack surface and a high incentive to quickly restore operations, factories make a particularly attractive target. Consequently, the spotlight has turned to increasing manufacturing cyber security. In fact, just last March, the Norwegian aluminum producer Norsk Hydro suffered a ransomware attack. The incident forced the company to temporarily close multiple plants, and losses totaled nearly $52 million. Smaller manufacturers, as well, face significant risk, heightened by historically lax cyber security measures. Industry 4.0 Blends…

READ MORE

How to stay protected before device recycling

used with permission from Tektonika (HP) Donating devices like laptops, phones, and flash drives may seem like a noble thing to do—after all, it’s good for the environment and makes devices available at a lower price point for people who may not otherwise be able to afford them. However, device recycling can pose a serious and often overlooked security risk. Device security is a concern that has to be addressed before donating so you can trust that your personal information will remain protected. In a 2019 report, security operations company Rapid7 revealed the dangers of recycling and discarding devices. Researcher…

READ MORE

Envision the Possibilities with AR in Manufacturing

In 1913, Henry Ford began using the assembly line to mass produce automobiles. This dramatic change reduced the automobile production time from twelve hours to just two and a half. Ford ushered in a century of innovation, dominated by advances in technology beyond anything he could have imagined. While technological advances have allowed factories to produce high quality goods more efficiently and safely, they have also created a skills gap. Baby boomers have begun to retire, taking their expertise with them. At the same time, innovations have created a greater need for highly skilled workers. AR in manufacturing can help…

READ MORE