7 Cyber Security Best Practices Every Business Should Implement

During 2019, cyber criminals attacked thousands of businesses. Half of those attacks targeted small businesses, many of which rely on outdated systems and insufficient security. Those businesses lost millions of dollars, as well as the confidence of their customers. While cyber attacks pose an increasingly serious threat, cybersecurity best practices mitigate the danger. Businesses that invest in cybersecurity initiatives realize the benefits of protecting vital assets and maintaining a critical business reputation. With the help of an experienced technology partner, use these seven steps to begin building the fortress you need to defend against cyber crime. 1. Create an Acceptable…

READ MORE

7 Simple Calendar Tricks That Will Level-up Your Team’s Productivity

7 Simple Calendar Tricks That Will Level-up Your Team’s Productivity used with permission from Microsoft What’s the secret to maximizing productivity and efficiency? There’s no single silver bullet, but one sure-fire way to make gains is with calendar tricks that will keep you organized and focused. From scheduling “no meeting” time blocks to integrating mobile so you never miss a meeting—the art of calendar optimization is crucial. Simple Calendar Tricks Here are seven simple calendar tricks you can use to bring your productivity to the next level: Schedule “no meeting” time blocks—Instead of multitasking, set aside time without interruptions. “When people multitask,…

READ MORE

Keep Your Business Secure with an Up-To-Date Firewall

The UK phone and broadband company TalkTalk was recently hacked by a seventeen-year-old, compromising 157,000 data pieces. The total bill? Around $49 million dollars. As technology progresses, cyber-attacks are largely becoming the norm in business. Small businesses are far from immune to such threats—a recent report showed that three in five cyber-attacks targeted small and mid-sized businesses, who oftentimes make themselves vulnerable by not dedicating the requisite staff or budget to their internet security. A secure firewall is a key defense against cyber attacks. It’s imperative that your business remains current with the latest updates and tools to implement a…

READ MORE

What is Our Greatest Cyber-Security Threat?

OT vulnerability explained and national conversation about cyber-security and privacy urged at ASU Biodesign presentation Where is the U.S. most vulnerable to cyber-security attack? And, what is the greatest need that we have regarding cyber-security, privacy and cyber-warfare? Those non-trivial questions were recently addressed by a distinguished military cyber-security expert, U.S. Navy Commander, Zachary Staples. Commander Staples, who is the Director of the Naval Postgraduate School, Center for Cyber Warfare, in Monterey, California, spoke as an invited guest April 12, 2017, at the ASU Biodesign Institute. I was invited by a friend at the institute and decided to attend, hoping…

READ MORE

The Rise of Ransomware & How to Protect Your Business

Ransomware on the Rise In June 2016, our CEO, Carl Mazzanti, stated in an interview that ransomware was “the #1 growing IT security threat” to businesses. For those who aren’t familiar, ransomware is malicious software criminals use to block access to computer systems—or hold your data hostage—until you pay them. As we work our way into 2017, the threat of ransomware is still growing. Take the St. Louis City Public Library, for example. In January, 700 computers throughout the library’s 16 branches fell victim to ransomware. As of publishing, it is uncertain when the devices will be available again for…

READ MORE

Protecting Your Business with e-Discovery

During litigation, there is a process called “discovery,” in which individuals or businesses exchange information relevant to their case. Before the digital era, this was a costly, cumbersome ordeal that mainly depended on paper documents that were not always readily available. Nowadays, discovery usually takes place electronically, and is referred to as “e-discovery.” Important information can be organized and arranged in a variety of media, including word processing files, spreadsheets, videos, PDFs, and emails. These types of documents are known as Electronically Stored Information (ESI) and play a crucial role during trial. Why should businesses be prepared? Like most technology,…

READ MORE

5 Email Security Tips for Employees and Organizations

We send an astonishingly huge amount of email: over 205 billion emails per day. And the number is still growing. Email is a critical communication tool for businesses. It’s also a gateway for hackers, viruses, and other nasties. Convey sensitive information, Here are 5 email security tips for keeping your email and your information secure. 1. Stay watchful and cautious It’s easy for an unauthorized person to email you and pretend to be a vendor or business partner. Be cautious and double-check before responding to sensitive requests. 2. Understand junk and spam filters Learn how to use your junk email folder…

READ MORE

10 Ways to Keep Your Mobile Devices More Secure

used with permission from SBA.gov by Anita Campbell Mobile devices pose heightened security risks. Those risks come in several forms. Devices — including business data saved on them such as call records, contacts, images, videos, documents and email messages — can be lost or stolen. If you use mobile apps or cloud software accounts with saved logins, anyone could conceivably access your business data through those apps or accounts via a stolen or lost mobile device. Devices used over insecure connections such as public Wi-Fi, can expose data to hackers and eavesdroppers who steal login credentials, banking and credit card…

READ MORE

NYC Area Companies to Explore Network Security Solutions at Manhattan Cyber Security Summit

eMazzanti Technologies partners with WatchGuard Technologies to demonstrate IT security at top industry event Hoboken, New Jersey ­- (Cision) September 15, 2016 – eMazzanti Technologies, a New York City area IT security expert, computer consultant, and 5X WatchGuard Partner of the Year, announced today that it will be exhibiting at the 2016 Cyber Security Summit in tandem with WatchGuard Technologies, a network security industry leader. The Cyber Security Summit is an influential conference series sponsored by Darktrace. It connects senior business leaders responsible for protecting their companies’ critical IT infrastructures with innovative technology providers and prominent information security experts. The New York 2015…

READ MORE

eMazzanti Technologies Issues US-Cert Ransomware Warning

NYC area IT security consultant urges organizations to take preventative measures to guard against recent variants of ransomware Hoboken, New Jersey ­- (Cision) April 8, 2016 — eMazzanti Technologies, a NYC area IT consultant and MSP, issued a security warning today regarding threats to computer networks from recent ransomware variants. The warning was prompted by an alert from the Department of Homeland Security, US-CERT or United States Computer Emergency Readiness Team on March 31, 2016. According to the US-Cert Alert (TA16-091A), “In early 2016, destructive ransomware variants such as Locky and Samas were observed infecting computers, which included healthcare facilities worldwide.”…

READ MORE