Online security tips for working from home

Teleworking during the Coronavirus outbreak? While working from home can help slow the spread of the virus, it brings new challenges: juggling work while kids are home from school; learning new software and conferencing programs; and managing paper files at home. As you’re getting your work-at-home systems set up, here are some tips for protecting your devices and personal information. Start with cybersecurity basics. Keep your security software up to date. Use passwords on all your devices and apps. Make sure the passwords are long, strong and unique: at least 12 characters that are a mix of numbers, symbols and capital and…

READ MORE

Unemployment scams and COVID-19: How to identify scams and help protect against them

Unemployment scams and COVID-19: How to identify scams and help protect against them If you’re one of the millions of Americans who have lost their jobs due to the coronavirus pandemic, you might seek unemployment benefits to ease financial pressure. The risk? You could become the victim of an unemployment scam. Newly idled Americans have filed millions of unemployment claims during the COVID-19 outbreak. Calls to state employment insurance services have at times overwhelmed phone lines and websites. That’s created opportunity for fraudsters. How? In some cases, scammers are pretending to represent government entities. Their goals include stealing claimant’s benefits,…

READ MORE

Top 10 Reasons to Move Your Business to the Cloud

Here is  Top 10 List to Move Your Business to the Cloud: 10. It’s the future: Whether we like it or not, and whether you want to or not, your business will be moving to the cloud. Of course, you already do email in the cloud, but it is just as easy to move your other business applications there as well, be it is document storage, security, office applications, backup, finances & accounting, sales & marketing, or what have you. 9. It’s safer: Cloud services are housed in remote servers, servers that have the best security systems available, and which…

READ MORE

10 of the latest Microsoft Teams integrations to help you work smarter, not harder

We built Microsoft Teams as a platform to bring together all of your workplace tools, apps, and services—whether or not we built them—to allow you to deliver better workday flow for you and your employees. A lot of you recognize the power of Teams, and you’ve been asking how to use Teams to its full advantage. Look no further. Today, we’re sharing ten of the latest Teams integrations you can use every day to simplify workflows, refocus your attention, and get back to working smarter—not harder. This is something our CEO, Satya Nadella, recently addressed in his interview on the future…

READ MORE

Check email header information for signs of spoofing

Think about this scenario: A friend tells you that they received a message from your email address that wasn’t really sent from you. They think you’ve been hacked and your account is sending malicious emails to friends. How do you know if your email address account has been compromised, or if this malicious attempt is just spoofing your email address? Email “spoofing” means that an attacker is impersonating you by pretending to send an email from your account. The recipient of the email will see your email… but if you dig deeper into the email message’s contents, you can often…

READ MORE

Securing Mobile Devices

Security is important, even on the go. Here are some quick tips on securing your mobile devices. Lock your device. Use a strong passcode, phrase, or PIN, just like you would secure your computer. Enable remote access. Check to see if the device manufacturer provides a service or feature to remotely connect to and locate your device. Use a Private Network. When on public wi-fi, use a VPN (virtual private network) to encrypt your connection. Install anti-virus. Mobile devices are the same as computers — they can get infected, so install trusted anti-virus and anti-malware software. Stop Bluetooth snoopers. When…

READ MORE

A short guide to mitigating the risk of the dark web

used with permission from Tektonika (HP) The dark web is a nefarious place, where criminals lurk and communicate, buy, sell, plot, and plunder. The clue, of course, is in the name. Speaking to NBC, FBI Supervisory Special Agent Mark Knoll referred to it as “like your new drug dealer on the corner in the virtual world.” UK Home Secretary Amber Rudd went even further, saying it’s a place where “anonymity emboldens people to break the law in the most horrifying of ways with platforms that enable dangerous crimes and appalling abuse.” Highlighting the broader impact of the dark web is…

READ MORE

eMazzanti Technologies | Technology Newsletter | Hoboken, NJ – New York, NY | January 2018

1-866-EMAZZANTI January 2018 Newsletter 2017 Business IT: The Year in Review December 28, 2017, by Kent Sorensen For small and midsize business owners, 2017 brought a greater awareness of cyber-security. Cloud computing and the Internet of Things (IoT) moved further into the mainstream. And, a host of new and improved tools streamlined the way we do business. To sum it up, 2017 business IT generated headlines and opportunities. So, let’s take a quick look back at the information technology developments that influenced our business lives in 2017. A thoughtful review positions us to better take advantage of the opportunities coming…

READ MORE

eMazzanti Technologies | Technology Newsletter | Hoboken, NJ – New York, NY | December 2017

1-866-EMAZZANTI December 2017 Newsletter Secure Cloud Computing: Trust but Verify November 15, 2017, by Kent Sorensen Move to the cloud or not? For many small to mid-size businesses, the choice seems clear. With promises of enhanced business continuity, reduced costs, and increased availability, the cloud can solve several business problems. However, the obvious potential benefits come with less obvious perils. When you decide on cloud computing trust but verify to minimize the risk. Yes, cloud computing can provide flexibility and fuel innovation. Yes, cloud computing can keep your business afloat and your data intact during a natural disaster. Read more…

READ MORE

eMazzanti Technologies | Technology Newsletter | Hoboken, NJ – New York, NY | November 2017

1-866-EMAZZANTI November 2017 Newsletter eMazzanti Technologies Urges Customers to download KRACK Wi-Fi Vulnerability Patch November 1, 2017, by Kent Sorensen NYC area IT security consultant also warns the public to take extra precautions to avoid data loss from new KRACK Wi-Fi data security threat Hoboken, New Jersey ­- (Cision) November 2, 2016 — eMazzanti Technologies, a NYC area IT consultant and MSP, issued a warning today regarding several recently revealed WPA/WPA2 encryption protocol vulnerabilities that affect countless Wi-Fi enabled devices worldwide. Read more → eMazzanti Presents Missed our 16th Anniversary? Watch below! eMazzanti Technologies Celebrates 16th Anniversary SharePoint and OneDrive:…

READ MORE