Cyber-security for Business: Lessons from Equifax

Equifax, one of the three major credit reporting agencies, announced last week that hackers had potentially accessed personal data for 143 million American consumers. In addition to a wakeup call for consumers, the hack offers important lessons in cyber-security for business owners. The wealth of names, credit card numbers, social security numbers and more constitute a gold mine for identify thieves. An increasingly complex cyber landscape requires organizations to educate themselves on emerging threats and best practices for securing data. Equifax Primer – What Happened? On September 7, Equifax announced a critical breach to their system, the third in just…

READ MORE

How the Cloud Eliminates Your Top Three Data Security Risks

You are a business owner who has their doubts about the cloud’s data security. We get it. The thought of migrating all of your company’s mission critical data to a relatively new piece of intangible technology named after a weather phenomenon traditionally associated with doom and gloom is a scary concept. The reality is that you have nothing to fear. There are outside forces and internal practices threatening to bring doom and gloom to your business each day, from which the cloud can protect you. Continue reading to learn how cloud-powered data storage eliminates your three biggest security risks. The…

READ MORE

Shadow IT and BYOD—Conquering These Corporate Cousins

Keeping Up with Business Needs and Devices Shadow IT is a dreaded aspect of cyber security. It is a world in which employees use services such as their private computer or, say, an iPad, to do their work without having obtained corporate approval. Standard Information Security protocols should apply to Shadow IT but because the devices are personal, enforcement is difficult. Shadow IT, when used across an enterprise, strongly illustrates that The company lacks up-to-date cyber resources; The company is unable to cope as requirements change for various departments; The IT infrastructure isn’t flexible enough to cover evolving business needs….

READ MORE

Ransomware Threat Called #1 Growing Security Threat on Manhattan Chamber of Commerce Program

eMazzanti Technologies CEO, Carl Mazzanti discusses nature and persistence of ransomware threat on blogtalkradio broadcast Hoboken, New Jersey ­- (Cision) June 24, 2016 — A NYC area IT security expert and eMazzanti Technologies CEO, Carl Mazzanti, discussed the topic of the ransomware threat on a June 15, 2016 blogtalkradio business program sponsored by the Manhattan Chamber of Commerce, calling ransomware the number one growing security threat. In the interview, Mazzanti discussed the nature and persistence of the ransomware threat. How infections occur and methods to prevent them, including education and IT security tools, were explained in response to questions asked by program…

READ MORE

eMazzanti Technologies Issues Locky Ransomware Warning

NYC area IT security consultant warns customers and the public to take extra precautions to avoid data loss in light of new data security threat Hoboken, New Jersey ­- (Cision) February 26, 2016 — eMazzanti Technologies, a NYC area IT consultant and MSP, issued a warning today regarding a new ransomware virus that has infected hundreds of thousands of computer networks worldwide. The company urges business and home computer users to take extra precautions to avoid being victimized by the malware threat, called Locky, that encrypts their data, holding it hostage until a ransom is paid. “Locky is wreaking havoc…

READ MORE

Viruses and Malware are Not worth Your Time

How can small business owners effectively deal with the ever increasing treat of viruses, trojans, ransomware and all kinds of computer malware? Downtime, lost productivity, data destruction and just the time to deal with the problem are significant business costs. I work hard to prevent these problems from occurring in my customers’ networks and I’m good at it. If you started a business, you obviously thought that you could succeed. Achieving that goal is priceless. This post is not about just malware. It’s about how to make the important decisions you and I consider along the road to success. What…

READ MORE

Data Security Rules for the Office

A trusted client recently forwarded an outline of computer security rules that he asked his organization to follow. Some of the rules are obvious, but often ignored. Here are his data security rules, supplemented with a few of our own. Computer Security 101 Passwords Do not put passwords on Post-it Notes near your computer. If you must use them, keep them far away from the computer and locked away, if possible. Do not share your passwords with anyone. Add numbers and symbols. Passphrases (the first letter of each word in a favorite saying or lyric) are harder to crack, but…

READ MORE