How to stay protected before device recycling

used with permission from Tektonika (HP) Donating devices like laptops, phones, and flash drives may seem like a noble thing to do—after all, it’s good for the environment and makes devices available at a lower price point for people who may not otherwise be able to afford them. However, device recycling can pose a serious and often overlooked security risk. Device security is a concern that has to be addressed before donating so you can trust that your personal information will remain protected. In a 2019 report, security operations company Rapid7 revealed the dangers of recycling and discarding devices. Researcher…

READ MORE

Create a modern IT strategy as your CIO role evolves

used with permission from Tektonika (HP) by Rose de Fremery As an IT leader, your job is growing more challenging by the day. Your IT strategy must be sophisticated and agile, balancing digital transformation priorities with security imperatives—and you probably have to stick to a lean budget too. What are the non-negotiable priorities you absolutely must include? Here’s a look at some of the most important IT issues that a modern CIO or CTO must tackle and why they matter to your success. 1. Enable digital maturity Digital transformation may be the buzzword phrase of the moment, but there’s a…

READ MORE

How can you tackle network security on vacation?

used with permission from Tektonika (HP) by Joe Hewitson The snow gently falls outside as you kick back in your Snuggie, ready to conquer that Netflix backlog. You’ve earned it! During the months leading up to winter, you vanquished any and all network security vulnerabilities threatening your digital kingdom, and now, your office is more secure than the Fortress of Solitude. But then, you look at your watch and realize the minutes are melting away, even though the outside world is freezing over. Days are getting shorter, and the seasons are changing. While you’ve admirably confronted office security head-on, cold…

READ MORE

Build Your Defense Against Cryptojacking, an Increasing Threat

Security Tips to Protect Against Cryptojacking, an Increasing Threat Almi Dumi, eMazzanti Technologies InfoSec Team The first cryptocurrency emerged in 2009 as Bitcoin. Over the past nine years, Bitcoin and other digital currencies have gradually cemented a place on the financial playing field. While the currency has attracted attention for its growth potential and anonymity, it also opens the door to new security threats in the form of cryptojacking. The term “cryptocurrency” combines the words cryptography and currency. And in fact, the money is based on complicated mathematical encryption. Surprisingly, the “coins” only exist as lines of code in a…

READ MORE

Technology Tips to Bridge the Distance for Remote Workers

Employees in today’s workforce are increasingly likely to work from home, from hotel rooms or even from a table in the corner coffee shop. In fact, 43 percent of the workforce works remotely at least some of the time. Hiring remote workers offers benefits, from cost savings to increased creativity and employee retention. But the distances also bring challenges. Collaboration and communication across time zones can prove tricky. Likewise, building company culture with an increasingly remote workforce requires new approaches. Fortunately, technology offers solutions. Cloud-Powered Teams Cloud-based document management systems empower team members to easily and securely access shared documents from…

READ MORE

3 Ways to Protect Your Wallet from Cryptojacking

In his 1811 Dictionary in the Vulgar Tongue, Francis Grose defines pickpocketing as, “The newest and most dexterous way [to steal], which is, to thrust the fingers straight, stiff, open, and very quick, into the pocket, and so closing them, hook what can be held between them.” Since many of Grose’s readers were new to city life, the idea that thieves could be so crafty was surprising. Today, we’re well aware of that fact, prompting thieves to find new ways to catch us off guard—and take off with our hard-earned cash. To help you protect yourself, here’s the scoop on…

READ MORE

Passwords Are Still the First Step in Data Security: Here’s How to Secure Yours

Whether they come to your organization as consumers or clients, students or patients, people expect you to keep their personally identifiable (and often highly sensitive) information safe. To meet this expectation, you might turn to cutting-edge encryption tools and pseudonymization methods. But countless organizations overlook the most obvious place to start when it comes to protecting data: passwords. To help you take this pivotal first step toward optimal data security and to protect your organization from mistakes and breaches from within, here a few robust password guidelines you can follow. Create and implement a password policy Simply, a password policy…

READ MORE

Is it Spring Yet? How to Survive a Late Season Winter Storm

Just when you think it’s safe to go outside and grab some rays, along comes another winter storm. This year’s fourth Nor’easter on the first day of spring makes winter-weary individuals and business leaders want to just ignore it. Regardless of our hopes for spring, precautions are still in order whenever weather experts forecast winter storms. We recommend everyone heed the warnings from the National Weather Service and please stay safe through any storm. And to protect your business, we advise that you take steps to verify the integrity of your business continuity hardware such as surge protectors and UPS…

READ MORE

Meltdown and Spectre: 2018’s Newest Security Threat

By: Almi Dumi Chief Information Security Officer at eMazzanti Technologies Meltdown and Spectre are the latest cyber security threats that is making the news! Not sure how these threats may affect you? Wondering what you need to do to protect yourself and your business? eMazzanti Technologies has been working tirelessly with our partners and hardware vendors to ensure that our client base has taken the appropriate steps to protect their data. Below we have given you a helpful summary of what these threats are and what steps have been taken thus far to mediate the vulnerabilities: The Difference between Meltdown…

READ MORE

5 Tips to Protect Computers from Summer Heat and Storms

Ah, the dog days of summer! Sweat drips down your back as you commute to work. And afternoon storms promise both spectacular lightning and annoying power outages. That same heat that drags you down can interrupt your business if you don’t take steps to protect computers from summer heat and storms. Slower processing and unexplained crashes may signal that your systems are suffering in the heat. Power surges and outages caused by summer storms can also wreak havoc on your electronics. Fortunately, with a few simple steps you can protect vital computer systems. Location, location, location Any real estate agent…

READ MORE