BLOG

Remote Collaboration

Remote Collaboration: Connecting Teams When Circumstances Force Work-at-Home

From winter blizzards to international travel advisories and global health concerns, sometimes powers beyond our control force remote solutions. When team members cannot gather in person, technology comes to the rescue. Now, more than ever, solutions such as Microsoft Teams prove essential in maintaining productivity through remote collaboration. Coronavirus Provides Preparedness Motivation Current global fears about coronavirus (COVID-19) have set stock markets reeling and prompted widespread panic. In the office, an employee with a persistent cough prompts worry among coworkers. Parents find themselves unexpectedly working at home when schools or daycares close. And employees cancel work trips to high risk

Read More »
NJBIZ-Cybersecurity

Human vulnerability identified as weak link in cyberattacks

Human vulnerability identified as weak link in cyberattacks. Don’t be so quick to click that link. That urgent email is one of the biggest cybersecurity threats out there, and hackers are getting smarter in figuring out just how to get you to share your personal information allowing them access to everything about your business. This topic took center stage Tuesday as NJBIZ hosted a panel discussion on cybersecurity at the DoubleTree by Hilton Somerset Hotel. A panel of experts, with the goal of safeguarding information, said that criminals are waging cyberattacks on businesses, stealing money, accessing private information, and eroding trust between

Read More »
Future of Authentication

Focusing on the Future of Authentication

Weak and stolen passwords result in data breaches that cost businesses millions of dollars each year. Biometrics and multi-factor authentication (MFA) offer a stronger solution. And yet, hackers can still spoof fingerprints and voices. Take a look at the future of authentication and determine what options make the most sense for your organization. Most experts agree that MFA provides a more secure environment for valuable data assets. With MFA, organizations require at least two verification methods to establish identity, instead of relying on passwords alone. For instance, authentication could include a password in conjunction with a fingerprint or verification text.

Read More »
NJBIZ

eMazzanti to Repeat on NJBIZ Cyber Security Panel

Keeping current with evolving rules across multiple jurisdictions, dealing with ransomware and countering internal threats topics of expert NJBIZ cyber security panel eMazzanti Technologies President and Co-founder, Carl Mazzanti, will be a featured cyber security industry expert on a Cyber Security Panel Discussion presented by NJBIZ, Tuesday, February 25, 2020. Mazzanti was also featured at the 2019 NJBIZ event. The NJBIZ cyber security educational event is scheduled to run from 8:00 to 10:00 am at The DoubleTree by Hilton Somerset, 200 Atrium Drive, Somerset, New Jersey. Interested parties may register with NJBIZ.com for a nominal fee. The panel of industry

Read More »
NJBIZ Cyber Security Panel

eMazzanti Technologies Recognized on CRN’s 2020 MSP500 List

NYC area IT company is listed among top 500 North American Managed Services Providers in Pioneer 250 category, cites continued growth in cloud services eMazzanti Technologies, a NYC area managed services provider, announced today that CRN®, a brand of The Channel Company, has named eMazzanti Technologies to its 2020 Managed Service Provider (MSP) 500 list in the Pioneer 250 category. This popular list identifies North American solution providers that deliver operational efficiencies, IT system improvements, and a higher rate of return on investments for their customers. These accomplished MSPs work tirelessly to guide their customers and create solutions for complex

Read More »
Beyond-Passwords

Life Beyond Passwords: Biometrics and the Future of User Verification

Kingdoms once protected vast treasures of gold and jewels with secret vaults and well-armed guards. Now, computer networks and even mobile devices grant access to our most valuable assets. As cyber risks evolve, businesses and individuals must also evolve beyond passwords to more sophisticated authentication methods. The obvious next step beyond passwords involves biometrics as part of a multi-factor authentication (MFA) process. For instance, anyone who purchased a new cellphone in the last couple of years has likely used facial recognition to access the phone and various apps. Biometrics offers quick access with a relatively high degree of security. And

Read More »
Passwords-and-Multi-factor-Authentication

Secure Your Business with Strong Passwords and Multi-factor Authentication

In the 1983 movie WarGames, Matthew Broderick’s character hacks into a powerful military supercomputer by correctly guessing a single password. Computers, hackers and cyber security have come a long way since the WarGames days. Now, savvy organizations use a combination of strong passwords and multi-factor authentication to secure sensitive data and processes. Password Evolution Think of your early passwords. Perhaps you used a pet’s name or your last name, followed by the month and year of your birth. (Perhaps you still use those passwords. If you do, change them. Now.) Then, experts told users to add a mix of uppercase

Read More »
Phishing-Scam

Emotet Phishing Scam Targets Financial Institutions with Malicious Fake Invoices

Widespread malware evolves, spreading rapidly in the US and UK We’ve written a lot about phishing and spear phishing in this space, but a new series of phishing scam attacks targeting banks and financial institutions in the US and the UK deserves your renewed attention. They are not only destructive but also leave doors open for future attacks. Emotet Trojan Powers Phishing Scams A banking trojan called Emotet has recently evolved into a botnet. It enables enterprising cyber criminals to profit from lending its powerful capabilities to others who seek to spread their own malware to unsuspecting victims. Last year,

Read More »
2020’s weather emergencies

Get help dealing with 2020’s weather emergencies

used with permission from FTC.gov by Colleen Tressler So far, this year has seen devastating wildfires, earthquakes, tornadoes and flooding, crippling snow and ice storms. These kinds of severe weather and natural disasters can occur anywhere — sometimes with little warning. It’s one thing to prepare your family, pets, and property for these events. It’s another to protect your personal information and finances from scammers who use weather emergencies to cheat people. The FTC’s site, Dealing with Weather Emergencies, has practical tips to help you prepare for, deal with, and recover from a weather emergency. Like all the FTC’s materials,

Read More »
Weak-Passwords

Close the Door to Hackers by Purging Weak Passwords

Marriott, Target, Home Depot and others have made headlines in recent years for data breaches that affected millions of customers. But did you know that 43 percent of breaches hit small businesses? Limited resources and lack of expertise often leave security gaps in smaller organizations, compounded by weak passwords and other risky practices. For instance, in the Target attack, hackers stole credentials from a much smaller company in the retailer’s supply chain. They then used the stolen credentials to access Target’s network. Sadly, similar scenarios play out over and over again. And users make the job much easier for criminals

Read More »

Upcoming Webinar

Webinar Cyber Security

Are Your IT Resources Effective
in the New Normal?

Wed, Jul 15 – 10:00 AM EST

NEWSLETTER

Recent Posts

5 tips for working from home with children

Working from home with children. Just a few weeks back, hearing—or seeing!—our coworkers’ kids during a meeting would have been remarkable. Today, it’s all part of a day’s work. With schools and daycares closed the world over, and so many of us working remotely, the lines between work and home have blurred indeed. And while it’s delightful to see a child scurry past our screen, this situation is undeniably tough on parents. To help our employees balance work and childcare, this week we distributed an internal work-from-home as a parent guide. It’s full of tips and shared practices that we have

4 Tips to Reduce Cloud Spending During COVID-19 and Beyond

Even before COVID-19 sent the workforce home, businesses anticipated steadily increased spending on cloud infrastructure. Now, cloud services take on an even greater importance. In the coming months and years, organizations will continue to increase cloud usage. But severe budgetary constraints will put pressure on IT managers to reduce cloud spending. For example, in 2019, Gartner estimated that organizations would spend over $206 billion on public cloud services, particularly Infrastructure as a Service (IaaS). But they inserted a caution. $14.1 billion of that spending would go to waste, due to idle resources and oversized infrastructure. As businesses struggle through the

How to Manage Remote Workers

With a global customer base, eMazzanti Technologies positions engineers and project managers in various locations worldwide to support that reach. As a technology service provider, the company also designs remote connectivity solutions for clients who are looking to expand their remote workforce. Based on 10+ years of experience, here’s our take on how to manage remote workers. Job Functions that Fit Remote Work Certain job functions provide a more natural fit for remote workers. In general, we have had greater success with client facing positions (sales, network engineers and project managers) than with back office employees (administrative, bookkeeping, HR) working

Tips for Transitioning to Remote Work

Over a period of three weeks, most of the workforce in the United States found themselves transitioning to remote work. Fortunately, the trend toward digital transformation means that many businesses had already begun to adopt cloud-based tools and policies. However, this abrupt switch to fully-remote work has sent both employees and IT departments scrambling. Moving an entire workforce home virtually overnight brings unique challenges. Individual employees need to set up home offices, often sharing Wi-Fi with family members. Teams need to develop collaboration strategies over distance. And security personnel must work to protect networks and data in a dramatically broadened

Collaborate with Exceptional Security and Privacy Using Microsoft 365 for Remote Work

Three years ago, Microsoft launched Teams, a powerful component of Office 365 (now Microsoft 365), ushering in the next phase of cloud-based collaboration. Now, with the majority of employees working from home, the service and providers that support Microsoft 365 prove more essential than ever. Organizations around the world depend on Microsoft 365 for remote work. They tap into its robust and secure options for online meetings and collaboration. Feature-Rich Video Conferencing Online meetings help to bridge the gap created by social distancing, bringing team members into a virtual conference room. Because much of communication depends on nonverbal cues, video

You Look Marvelous! The Sprint to Video-based Team Interaction

In our new work-from-home (WFH) world, the requirement for on demand video conferencing has exploded with quadruple digit growth. Businesses are scrambling to engage qualified video conferencing vendors to implement video-based team technology virtually overnight. Businesses now must deal with completely remote workforces, while schools and education systems attempt to facilitate online learning. And, with social distancing as our new norm, our connection constraints now point to video. Security and Functionality The journey to video has had some notable bumps with flurries of headlines and memes that make fun of Zoom and its unsecure platform. Skype (owned by Microsoft) started