Security needs to take priority for connected devices

Used with the permission of http://thenetwork.cisco.com by Liza Meak Liz Centoni and Matt Watchinski join forces on the RSA stage to show the next generation of threats to this new world of connected devices. The explosion of connected devices is happening at breakneck speed. By 2020, Gartner predicts 20 billion connected devices and more devices mean more security threats. In a keynote address at RSA, Matt Watchinski, Cisco VP of the Talos Threat Intelligence Research Group, said that everything from cameras, to audio equipment, to parking meters connect to our networks. “We have entire generations that look at the world,…

READ MORE

5 Tips to Secure Your Home Office Network

You may be a busy, travelling executive, a telecommuter or multi-tasking parent. More than likely you have multiple devices that connect to your home Wi-Fi. With cyber-criminals getting more sophisticated and attacks more frequent, you may want to do more to secure your home office network. If you are concerned about identity theft and the security of your accounts and personal information, here are our top five recommendations to secure your home office network: 1.  Use 2FA for Bank Accounts, Social Media and System Access Cyber-criminals now use a variety of methods to guess or steal passwords. Simply put, a…

READ MORE

A Look Back at the Worst Cyber Attacks of 2017

With 2017 in the rearview mirror, it’s time to focus on the future. But to keep your business safe, it’s useful to reflect on the mistakes that were made last year—and for many businesses, 2017 was a devastating year for cyber attacks. With cyber criminals becoming more sophisticated by the day, it’s more important than ever for business owners to stay one step ahead of the latest threats. Let’s take a look back at the scariest hacks of 2017—and find out what you can do to ensure your business isn’t mentioned in next year’s list. WannaCry May, 2017. In a…

READ MORE

Your Manufacturing Company May be a Prime Target for Cybercrime

Whether you produce automobiles or textiles, as a manufacturing company, your primary focus is output. You’re committed to ensuring the quality of your product, while increasing the efficiency of your process. However, you may want to turn your attention away from what’s leaving your company and take a look at what could be coming in. Manufacturing has recently jumped to number two on the list of industries most vulnerable to cyber attack, ranked just one notch below the notoriously at-risk healthcare industry. We uncover the security flaws behind manufacturing’s dramatic leap towards the top of the list, before telling you…

READ MORE

Protect Business Data with Powerful Microsoft Security

Experts estimate that last month’s WannaCry attack cost hundreds of millions of dollars in lost productivity, investigation and data restoration. With the certainty of more cyber-attacks on the horizon, businesses are building their defenses. Protect Business Data with Powerful Microsoft Security In May, hackers exploited a vulnerability in pre-Windows 10 versions of the Windows operating system. The ransomware attack compromised 230,000 computers worldwide. Fortunately, researchers quickly discovered a kill switch that significantly slowed the infection rate. Computers without the necessary security patch remain at risk, however. Researchers have already discovered several additional cyberattacks that exploit the same vulnerabilities. Malware with…

READ MORE

How to Protect Your Small Business from Cyber Attacks

The public is used to hearing about cyber attacks on big companies. Sony Pictures famously canceled the release of its film The Interview after facing pressure from North Korean hackers. Controversial website Ashley Madison came under fire when sensitive user information was leaked.  Yahoo was hit with a massive wave of data theft that affected more than one billion accounts. But this isn’t just a problem for big corporations. In fact, 43% of small businesses will face a cyber attack. At eMazzanti, we care about your security. Follow these steps to make sure you and your business are protected. Stay…

READ MORE

NYC Area Companies to Explore Network Security Solutions at Manhattan Cyber Security Summit

eMazzanti Technologies partners with WatchGuard Technologies to demonstrate IT security at top industry event Hoboken, New Jersey ­- (Cision) September 15, 2016 – eMazzanti Technologies, a New York City area IT security expert, computer consultant, and 5X WatchGuard Partner of the Year, announced today that it will be exhibiting at the 2016 Cyber Security Summit in tandem with WatchGuard Technologies, a network security industry leader. The Cyber Security Summit is an influential conference series sponsored by Darktrace. It connects senior business leaders responsible for protecting their companies’ critical IT infrastructures with innovative technology providers and prominent information security experts. The New York 2015…

READ MORE

6 reasons why you’re an easy cybercrime target

As an entrepreneur, you probably think hackers won’t bother with you because your business is too small to care about. In reality, cybercrime targeting smaller companies is on the rise. Why are cybercriminals after your business—and what can you do about it? Cybercrimes cost smaller companies 12% more in 2015 than in 2013.1 Not only is it growing, it disproportionately affects small businesses: Visa estimates 95% of credit-card data breaches it finds happen to its smallest business customers.2 When it happens, the consequences of cybercrime can be devastating to a small company. Cybercrime costs small businesses 4.2 times more per employee…

READ MORE

How to Protect your Business from a Dyre Wolf Attack

The evolution of a recent cyber-criminal threat illustrates how social engineering exploits the weakest link in data security Data security threats are constantly evolving to elude detection. A recent example, the Dyre Wolf campaign, highlights the use of social engineering techniques to obtain credentials and gain access to otherwise secure banking sites. People are the weakest link in any data security defense and Dyre Wolf illustrates perfectly why this is the case. What is Dyre Wolf? Dyre wolf is an iteration of the Dyre malware that surfaced last year. Well-funded and organized cyber criminals recently used Dyre Wolf to steal…

READ MORE