eMazzanti Technologies to Show High-bandwidth Network Security Solutions at Manhattan Cyber Security Summit

NYC area IT consultant partners with network security provider, WatchGuard Technologies, to exhibit at top IT security industry event Hoboken, New Jersey ­- (Vocus) September 8, 2015 – eMazzanti Technologies, a New York City area IT security expert, computer consultant, and 5X WatchGuard Partner of the Year, announced today that it will be exhibiting at the 2015 Cyber Security Summit in tandem with WatchGuard Technologies, a network security industry leader. The Cyber Security Summit, a prestigious conference series sponsored by Palo Alto Networks, connects C-level and senior executives responsible for protecting their companies’ critical infrastructures with cutting-edge technology providers and…

READ MORE

5 Things Retailers Should Know about the Shift to EMV Card Technology

Conversions to EMV Card Technology go into overdrive as the merchant liability shift deadline approaches The U.S. conversion from mag-stripe credit cards to EMV chip-and-pin cards* is picking up speed as we get closer to an important deadline for merchants. Those who fail to make the switch will leave their customers more vulnerable to fraud and will incur an increased liability when fraud occurs. Here are five important things to know about the EMV technology changeover. 1. The Deadline Each of the four major credit card issuers in the U.S., VISA, MasterCard, American Express and Discover, have established October 1,…

READ MORE

What You Need to Know about Windows 10 features Discussed on Technology Talk Radio Program

eMazzanti Technologies CEO previews exciting Windows 10 features in blogtalkradio program July 28, 2015 Hoboken, New Jersey ­- (Vocus) July 29, 2015 — NYC area IT consultant Carl Mazzanti, CEO of eMazzanti Technologies, discussed exciting new features of Windows 10 on the blogtalkradio program, “Keeping Technology Simple” hosted by Jim Blue, technology advisor, speaker and President of BlueTutor.com. The program aired at 11:00 am (EDT) on Tuesday, July 28, 2015, just ahead of the Windows 10 launch date, July 29. Anyone can listen to the recorded program, “What You Need to Know about Windows 10” online. During the program, Mazzanti…

READ MORE

eMazzanti Technologies Combating POS Security Breaches with High-level PCI Expertise

NYC area retail IT consultant one of only 7 companies worldwide to achieve the QIR designation from the PCI Security Standards Council Hoboken, NJ (Vocus) July 10, 2015 – eMazzanti Technologies, a New York City area IT consultant and managed services provider, today announced that it has completed high-level retail data security training to prevent retail point-of-sale (POS) data theft. eMazzanti is currently one of only seven companies worldwide to be qualified as a PCI Qualified Integrator under the stringent certification standards of the PCI Security Standards Council Qualified Integrators and Resellers (QIR) program. “The QIR qualification demonstrates eMazzanti’s commitment…

READ MORE

Fixing the HTTPS Security Blind Spot

It’s time to secure network traffic you thought was secure Rapidly increasing encrypted HTTPS web traffic is creating a security blind spot in business computer networks, allowing destructive malware to slip by unnoticed by conventional network defenses. Although HTTPS encryption does a good job of protecting privacy, email and website user data, the security of the organization can be threatened. The problem exists because files downloaded and websites accessed over HTTPS may be transporting malicious content that is hiding behind TLS and SSL encryption. Network security appliances, such as unified threat management (UTM) firewalls are not concerned with the encrypted…

READ MORE

How to Protect your Business from a Dyre Wolf Attack

The evolution of a recent cyber-criminal threat illustrates how social engineering exploits the weakest link in data security Data security threats are constantly evolving to elude detection. A recent example, the Dyre Wolf campaign, highlights the use of social engineering techniques to obtain credentials and gain access to otherwise secure banking sites. People are the weakest link in any data security defense and Dyre Wolf illustrates perfectly why this is the case. What is Dyre Wolf? Dyre wolf is an iteration of the Dyre malware that surfaced last year. Well-funded and organized cyber criminals recently used Dyre Wolf to steal…

READ MORE

How to Protect your Business from a FREAK Attack

A recent NSA hack by researchers reveals a new network vulnerability that puts sensitive customer and business data at risk Recently a new type of hacker threat has come to light. The NSA had their thought-to-be-secure website compromised by researchers employing a FREAK attack to demonstrate how criminals might, with minimal effort, profit from the technique by stealing passwords, personal information and financial data. Hackers, now familiar with the technique, will be looking for susceptible targets. What is a FREAK attack? FREAK stands for Factoring RSA Export Keys. It’s a way of forcing a lower level of encryption on a…

READ MORE

eMazzanti Offers EMV Credit Card Technology Upgrade Services in Advance of Fraud Liability Deadline

NYC area IT consultant to help merchants, professionals and other businesses prepare to accept new chip-and-PIN technology cards Hoboken, New Jersey ­- (Vocus) March 25, 2015 — eMazzanti Technologies, a NYC area IT consultant and MSP, announced today that it is now offering EMV credit card technology upgrade services to retail merchants, doctors, attorneys, contractors and other businesses that accept credit cards. Retailers and others are looking to upgrade their point of sale (POS) systems to prepare for the October 15, 2015 deadline when the liability for credit card fraud shifts to the merchant if they do not have an…

READ MORE

What you’ll Love about Windows Server 2012

Like a lot of businesses, you might be asking the question, “Is it time to upgrade my servers?” You could be running short on performance or storage, or perhaps you have data security concerns. Organizations with aging servers and a variety of PC’s are good upgrade candidates. Others have cutoff dates to consider. With support ending this July, Windows Server 2003 users definitely need to upgrade to receive critical security updates. If you fit the above, or your current server technology feels like it may be holding you back, it’s time for a technology refresh. Your best option, upgrade to…

READ MORE

Why Retailers and SMBs Should Use a Managed Firewall Service

Why Retailers and SMBs Should Use a Managed Firewall Service With today’s increasing data security threats, small and medium-sized enterprises (SMEs) are faced with the usual cost versus reliability decision when purchasing data security. They may prefer one over the other, depending on their business requirements for uptime, their industry, and the potential effects of a data security breach. When it comes to protecting networks and data, companies can choose increased security, uptime, customer satisfaction and peace of mind by partnering with an IT security expert for a managed firewall service, or they can choose to go it alone to…

READ MORE