Section 179 Deductions Power Technology Investments for Small Businesses

When December air turns frosty, children of all ages envision sleigh bells and a cornucopia of gifts. Business owners make their own wish lists. But instead of letters to Santa, they dream of year-end tax deductions. With Section 179 of the tax code offering more tax relief than ever, small businesses can make those dreams a reality with upgraded technology. Recent Changes Bring Business Benefits The Tax Cuts and Jobs Act, which took effect last year, introduced some key adjustments to Section 179 and bonus depreciation that put even more money back into the business budget. These changes include the

Read More »
Cyber security Best Practices

7 Cyber Security Best Practices Every Business Should Implement

During 2019, cyber criminals attacked thousands of businesses. Half of those attacks targeted small businesses, many of which rely on outdated systems and insufficient security. Those businesses lost millions of dollars, as well as the confidence of their customers. While cyber attacks pose an increasingly serious threat, cybersecurity best practices mitigate the danger. Businesses that invest in cybersecurity initiatives realize the benefits of protecting vital assets and maintaining a critical business reputation. With the help of an experienced technology partner, use these seven steps to begin building the fortress you need to defend against cyber crime. 1. Create an Acceptable

Read More »
the Holiday Shopping Season

How to Fight Formjacking and Win Back the Holiday Shopping Season

The 2018 holiday season brought a new kind of Grinch. Late in the year, Symantec revealed that hackers had begun to employ a nearly invisible new tactic called formjacking. According to the Internet Security Threat Report, Symantec blocked nearly four million formjacking attacks in 2018. One third of those attacks occurred during November and December. Remember ATM skimmers that steal credit card information when you swipe your card? Think of formjacking as the online version of skimming. Hackers infect an online order form with malicious JavaScript. Then, when you enter your card information to make a purchase, the code transfers

Read More »
SQL Server Dba

How to hire a DBA

Database Administrators – especially competent ones – can be difficult to find, validate technically, and hire, as they are rare and in high demand. This article discusses finding, scoping, and acquiring your new DBA, SQL Server DBA. Finding a DBA Where do DBAs hang out? Larger companies may hire a staffing firm. This may be expensive (staffing firms will charge a significant percentage of the DBA’s income), but you’ll likely get a warranty of a sort (let the new hire go within 3 months and we’ll find you another for free, for example). The staffing firm may or may to

Read More »
dba team

How to burn out your DBA team

How to burn out your DBA as quickly as possible Are you trying to get rid of your DBA – or DBA team? Want to make a reputation for your IT shop that will make recruitment borderline impossible? Simply want to make somebody’s life miserable? Then this article is for you! (Note If you want a happy DBA that stays with you, do the opposite.) Put your DBA on call 24×7 Nobody wants solo responsibility for a system. People like to go to dinner… a movie… a vacation… sleep… and should be allowed to. No backup DBA team This is

Read More »
DBA Support

Why you need a DBA support

DBA Support There seem to be patterns and cycles in everything. Application development is no exception. For a variety of reasons, organizations of all sizes frequently end up without a DBA support. What is a DBA support and why do you need it? Database administrators performs or directs activities relating to maintaining a successful environment this can include: establishing policies and procedures, security maintenance, use and training in database management systems, and designing and implementation. Lack of a DBA will put organizations at risk in a variety of ways: Performance issues, slowly snowballing (or suddenly escalating) until they are intolerable

Read More »

3 Steps to Help Manufacturers Comply with New York SHIELD Law

In July 2019, Governor Andrew Cuomo signed the Stop Hacks and Improve Electronic Data Security act (SHIELD) into law. This law affects any organization that holds private information for New York state residents. A greater understanding of key components of the New York SHIELD law will ease regulatory compliance for manufacturers and other businesses. In summary, SHIELD expands data breach notification requirements and mandates that organizations create or update a data security program. To meet these requirements, manufacturers must address risk, review vendor compliance, and ensure proper notification in the event data becomes compromised. 1. Comply with Expanded Data Breach

Read More »

Boost Manufacturing Cyber-Security with IT/OT Convergence Best Practices

Information technology (IT) and operational technology (OT) alignment with IT/OT Convergence Best Practices improves security and reduces downtime. Industry 4.0 continues to transform manufacturing. From collaborative robots to powerful data analytics, connected systems offer a host of exciting possibilities. However, those opportunities come with a cost in terms of security. To combat the rising threat of cyber-attacks, manufacturing companies must turn their focus to IT/OT convergence. Critical Differences Between IT and OT Before Industry 4.0, information technology (IT) and operational technology (OT) typically operated in separate silos with competing priorities. Even now, IT processes focus on data confidentiality and security.

Read More »

Is Private Browser Really Private? Short answer: No

Is Private Browser Really Private? Short answer: No used with permission from Norton by Symantec by Alison Grace Johansen You probably expect your “private” browser to be private. It’s not. So-called private browsers are a standard feature of several web browsers, and have private-sounding names like Private Browsing, Private Tab, and Private Window. Using a private browsing mode can help you to do a lot of things, but maintaining total privacy isn’t one of them. That doesn’t mean they’re not useful. It’s important to understand what a private browser does, and does not, do. For instance, do you know that

Read More »

Upgrade from Windows 7 to Remain Secure

It’s still coming whether we like it or not: Windows 7 End of Life. If your organization is still running Windows 7, what can you expect? Is this truly the end of Windows 7, and should you upgrade? The answer, realistically, is yes. It’s a smart move to upgrade now, for security and stability. Mainstream support for Windows 7 ended in 2015. Extended support ends on January 14, 2020. Windows 7 is now end-of-life. It will not be supported, nor will it receive regular patches and security updates. What’s the risk of not upgrading? Failing to upgrade to supported software, like Windows

Read More »


Recent Posts

eMazzanti to Repeat on NJBIZ Cyber Security Panel

Keeping current with evolving rules across multiple jurisdictions, dealing with ransomware and countering internal threats topics of expert NJBIZ cyber security panel eMazzanti Technologies President and Co-founder, Carl Mazzanti, will be a featured cyber security industry expert on a Cyber Security Panel Discussion presented by NJBIZ, Tuesday, February 25, 2020. Mazzanti was also featured at the 2019 NJBIZ event. The NJBIZ cyber security educational event is scheduled to run from 8:00 to 10:00 am at The DoubleTree by Hilton Somerset, 200 Atrium Drive, Somerset, New Jersey. Interested parties may register with for a nominal fee. The panel of industry

eMazzanti Technologies Recognized on CRN’s 2020 MSP500 List

NYC area IT company is listed among top 500 North American Managed Services Providers in Pioneer 250 category, cites continued growth in cloud services eMazzanti Technologies, a NYC area managed services provider, announced today that CRN®, a brand of The Channel Company, has named eMazzanti Technologies to its 2020 Managed Service Provider (MSP) 500 list in the Pioneer 250 category. This popular list identifies North American solution providers that deliver operational efficiencies, IT system improvements, and a higher rate of return on investments for their customers. These accomplished MSPs work tirelessly to guide their customers and create solutions for complex

Life Beyond Passwords: Biometrics and the Future of User Verification

Kingdoms once protected vast treasures of gold and jewels with secret vaults and well-armed guards. Now, computer networks and even mobile devices grant access to our most valuable assets. As cyber risks evolve, businesses and individuals must also evolve beyond passwords to more sophisticated authentication methods. The obvious next step beyond passwords involves biometrics as part of a multi-factor authentication (MFA) process. For instance, anyone who purchased a new cellphone in the last couple of years has likely used facial recognition to access the phone and various apps. Biometrics offers quick access with a relatively high degree of security. And

Secure Your Business with Strong Passwords and Multi-factor Authentication

In the 1983 movie WarGames, Matthew Broderick’s character hacks into a powerful military supercomputer by correctly guessing a single password. Computers, hackers and cyber security have come a long way since the WarGames days. Now, savvy organizations use a combination of strong passwords and multi-factor authentication to secure sensitive data and processes. Password Evolution Think of your early passwords. Perhaps you used a pet’s name or your last name, followed by the month and year of your birth. (Perhaps you still use those passwords. If you do, change them. Now.) Then, experts told users to add a mix of uppercase

Emotet Phishing Scam Targets Financial Institutions with Malicious Fake Invoices

Widespread malware evolves, spreading rapidly in the US and UK We’ve written a lot about phishing and spear phishing in this space, but a new series of phishing scam attacks targeting banks and financial institutions in the US and the UK deserves your renewed attention. They are not only destructive but also leave doors open for future attacks. Emotet Trojan Powers Phishing Scams A banking trojan called Emotet has recently evolved into a botnet. It enables enterprising cyber criminals to profit from lending its powerful capabilities to others who seek to spread their own malware to unsuspecting victims. Last year,

Get help dealing with 2020’s weather emergencies

used with permission from by Colleen Tressler So far, this year has seen devastating wildfires, earthquakes, tornadoes and flooding, crippling snow and ice storms. These kinds of severe weather and natural disasters can occur anywhere — sometimes with little warning. It’s one thing to prepare your family, pets, and property for these events. It’s another to protect your personal information and finances from scammers who use weather emergencies to cheat people. The FTC’s site, Dealing with Weather Emergencies, has practical tips to help you prepare for, deal with, and recover from a weather emergency. Like all the FTC’s materials,