BLOG

Law-Firm-Mobile-Security-Best-Practices

Law Firm Mobile Security Best Practices

Like most businesses, law firms have seen an increased mobile workforce in recent years. Mobile access increases employees’ ability to communicate with clients and coworkers quickly, as well as access documents on the run. But it also raises security concerns. Incorporate law firm mobile security best practices to protect sensitive business and client data. 1. Employ Mobile Device Management (MDM) The industry offers a host of MDM options to help your law firm get a handle on mobile security. Choose an MDM system that allows you to specify which devices can access the network, as well as what applications they

Read More »
Tech-Tips-for-the-New-Year

Stop Abbreviating 2020 and Essential Tech Tips for the New Year

While you work on those resolutions to eat right and exercise, make a few resolutions for your business, as well. A fresh year presents the perfect opportunity to tighten security and run some much-needed maintenance. Protect your business with these basic tech tips for the new year. 1. Stop Abbreviating 2020 Commit now to writing out all four digits of the year. Writing “20” instead of “2020” leaves the door open for fraudsters. For example, suppose you sign a credit contract with the date 1/27/20. A bad actor could change the date to 1/27/2019 and attempt to collect an additional

Read More »
Spear-Phishing-

Gone Phishing: How to Be Safe from Personalized Spear Phishing Attacks

Phishing attacks entered the scene when AOL still ruled the Internet. More than two decades later, cyber criminals continue to use targeted phishing techniques for one simple reason. They work. Specialized attacks, known as spear phishing, use personal details to trick victims into clicking malicious links or sending sensitive information. For example, last year, hackers compromised the email system for an Ohio parish. After spying on email conversations, they posed as a construction company hired to complete parish renovations. Soon, the parish received an email, supposedly from the contractor, listing new instructions for payment transfer. In response, they paid nearly

Read More »
cybersecurity tips

Seven cybersecurity tips for 2020

Seven cybersecurity tips for 2020 Used with the permission of http://thenetwork.cisco.com by Kevin Delaney Security experts share their predictions, warnings, and best practices for the coming year. 2020 promises a wave of technology change that will further transform the enterprise — and our very lives — in profound ways. But that inclusive, sustainable, and productive future demands a far-reaching commitment to cybersecurity. In 2019, there was no shortage of damaging, heavily publicized security breaches. And given the ever-increasing sophistication of cybercriminals — and the mounting complexity facing the defenders — the threat landscape in 2020 promises all-new challenges. So how

Read More »
Scam Calls

Getting bombarded by scam calls? You’re not alone.

Getting bombarded by scam calls? used with permission from FTC.gov by Jim Kreidler The Social Security Administration (SSA) scam is the number one scam reported to the FTC right now. As soon as a caller threatens you, or demands you pay them with a gift card or by wiring money, it’s a scam. Even if the caller ID tells you otherwise. If you get a call from someone claiming to be from the Social Security Administration, hang up the phone and remember: Your Social Security number is not about to be suspended. The real Social Security Administration will never call

Read More »
Data-Breach-Warning-Signs

How to Spot Data Breach Warning Signs to Protect Your Business

Data breach. The phrase suggests compromised customer data, with resulting legal battles and hefty remediation costs. Most attacks take weeks, or even months, to detect. However, businesses that detect and address data breach warning signs earlier can save millions of dollars while protecting sensitive data and business reputation. Alarmingly, according to a recent Ponemon study, hackers spend an average of 197 days inside the targeted system before being discovered. That represents more than six months to pull sensitive information, introduce malware or encrypt files. Adding to the problem, the mixture of public and private clouds, along with an increasingly mobile

Read More »
Fast-Company-WCI

eMazzanti Technologies Seeks Fast Company’s 2020 World Changing Ideas Award

Hoboken, New Jersey — (Cision) January 1, 2020 – eMazzanti Technologies, a NYC area managed services provider (MSP), retail IT consultant, and cloud services company, is proud to announce that the company is competing for a prestigious Fast Company 2020 World Changing Ideas Award. The coveted award honors products, concepts, companies, policies, and designs that are pursuing innovation for the good of society and the planet. The contest, now in its fourth year, has honored everything from large companies’ sustainability initiatives to clever consumer products to groundbreaking government policies. World Changing Ideas Based on Experience and Backed by Science eMazzanti’s

Read More »
Managed-Services-Provider-Growth

5 Ways A Managed Services Provider Promotes Revenue Growth in 2020

To gain and maintain a competitive edge, small to mid-size businesses (SMBs) require the same technologies as larger corporations. With enterprise needs and small business budgets, more and more SMBs are turning to a managed services provider (MSP) to move them ahead of the curve. While some businesses view IT consultants simply as a means to keep computers up and running, others see the possibilities for powerful, strategic partnerships. Choosing the right MSP not only helps your organization work smarter; it can also help you grow your business and improve your bottom line. Consider these five ways a quality managed

Read More »
New York SHIELD Act

Update Retail Privacy Practices with New York SHIELD Act

According to a 2019 retail privacy study by Deloitte, the majority of customers worry about the security of their personal data. Yet, only 22 percent of retailers build privacy into their strategic planning. With the New York SHIELD Act taking effect in 2020, retailers have the opportunity to revamp privacy practices to establish trust and strengthen customer relationships. Back in 2016, the adoption of the GDPR in Europe sparked an increased concern about privacy in the United States. Since 2016, at least half of the individual states have passed privacy laws modeled more or less on GDPR, including SHIELD. Many

Read More »
Green-Computing

How can Green Computing Energize Your Business in 2020?

From recycling to water conservation and solar panels, the Green Movement touches many aspects of our lives. For small to medium businesses (SMB), going green often begins in the computer room. Not only is it environmentally responsible, but green computing makes good business sense. What does Green computing means? In basic terms, green computing involves reducing the environmental impact of technology. That means using less energy, reducing waste, and promoting sustainability. Green computing reduces the carbon footprint of a business and provides a reputation boost. From a budget perspective, eco-friendly computing can reduce energy and operational costs more than 30%.

Read More »

Upcoming Webinar

Webinar Cyber Security

Are Your IT Resources Effective
in the New Normal?

Wed, Jul 15 – 10:00 AM EST

NEWSLETTER

Recent Posts

5 Endpoint Security Best Practices When Remote Work Takes Center Stage

With the majority of employees working from home this spring, organizations have encountered new challenges. The increased burden on corporate networks can result in diminished performance and productivity. More important, remote connections increase the security risk. Endpoint security best practices help to mitigate that risk and protect the organization. Endpoints include any devices that connect to the network. Every connection represents a possible point of access for cyber criminals. Endpoint security, therefore, acts as the front line of cyber security for the organization. An effective endpoint security solution uses a multi-faceted approach to detect and minimize threats and control system

Cloud-based Security Solutions Deliver Powerful, Scalable Protection for SMBs

The average small to medium business (SMB) has most likely migrated at least some essential data and operations to the cloud. At the same time, SMBs face increasingly strict privacy regulations, as well as a growing number of cyber attacks. And with a mobile, often remote, workforce, the environment demands reliable, cloud-based security solutions. As the security landscape grows more complex, many SMBs find that they lack the in-house expertise needed to keep data safe. And as they move more sensitive information to the cloud, protecting that data requires proactive solutions. Businesses need the ability to predict data breaches rather

Protect Your Business from COVID-19 Phishing Scams

The list of states implementing stay-at-home orders continues to grow while the world scrambles to curb the spread of COVID-19. As a result, the number of employees working remotely has skyrocketed overnight. Unfortunately, COVID-19 phishing scams have also skyrocketed, with scammers taking advantage of relaxed security perimeters. To protect the organization, businesses must implement additional security measures for the remote work environment. Employees working at home also need to take common-sense steps to work safely. And through it all, communication remains essential. Examples of COVID-19 Phishing Scams The most common COVID-19 phishing scams involve the tried and true method of

Working Remotely, What You Need to Know

The COVID-19 crisis – Working remotely to help These are trying times. First, know that that your health and safety is the highest priority. Second, we’re all in this together so cooperation and our best efforts are required. We appreciate the leadership of local, state and federal government officials and the dedicated healthcare professionals on the front lines. With a united effort, we can overcome the challenges ahead and return to conditions of health and prosperity. That said, we want you to know that with the coronavirus outbreak impacting populations worldwide, it looks like we’re in this for the long

Minimize the Cost of Small Business Data Breaches with Proactive Security

Last year, Marriott, Facebook, Capitol One and the Russian government all made headline news with devastating data breaches. However, between 43 and 60 percent of all cyber-attacks in 2019 actually targeted small to medium businesses (SMBs). And the cost of small business data breaches goes far beyond the immediate damages. Small businesses make an attractive target for cyber criminals for two reasons. First, SMBs often lack sufficient security, leaving them vulnerable to attack. Second, criminals see small businesses as a back door to the more lucrative large enterprises. Think of the Target attack several years ago, in which hackers gained

Voice Cloning Elevates Security Threats to the Next Level

Last year, scammers convinced a director at a British company to send them $240,000. Using voice cloning, they impersonated a senior executive at the company, instructing the director to wire the sum to a secret account. Recognizing his boss’s voice, he complied, only becoming suspicious when the thieves called a second time. While this may represent one of the first artificial intelligence (AI) heists on record, it will hardly be the last. Consider the possibilities. If bad actors use voice cloning technology to steal money from businesses, they can easily sabotage political elections or impersonate family members. Dangers of Increasingly