The New Normal COVID-19 Office Security

With continued WFH policies and multiplied COVID-19 scams and threats, the importance of good cyber security stands out. Indeed, with a workforce that is highly dependent on digital services for the foreseeable future, the new normal COVID-19 office security is necessarily stronger, more vigilant, and more dispersed. Yet, a lot of questions remain unanswered. For example, will behavioral surveillance be part of the new normal? As organizations plan to implement contact tracing, privacy advocates voice their concerns. Given the uncertainty, we expect to see these non-intrusive measures with clearly defined benefits coming to the new normal. Thermal Cameras for Passive…

READ MORE

Encrypt or Die: Why Google Chrome Listing Your HTTP Site as Insecure Is a Disaster

If you’re still using an unencrypted HTTP site rather than an HTTPS, we’ve got some bad news. Google Chrome will now alert visitors via the URL bar that your site is “not secure.” In other words, if you don’t want to lose visitors, you might want to think about encrypting. Here’s what you need to know. HTTP vs. HTTPS: what’s the big deal? HTTP and HTTPS are essentially the same, with one important difference: HTTPS is encrypted. The “S” stands for “secure.” HTTPS sites encrypt all the communication between a visitor and a site, which means the visitor’s information and…

READ MORE

3 Tips for Maintaining a Highly Functioning Firewall

“I’ve updated the user interface to make it cluttered and complex,” said no software designer ever. “I’d like the font on our wedding invitation to be messy and hard to decipher,” said no bride to be ever. Clean and simple is the way to go. Your firewall is no exception. A complicated firewall is not only convoluted, but dangerous. Unnecessary objects and rules open the door for misconfigurations, performance degradation, and compliance gaps that hike up operational costs and raise cybersecurity risk. To help you simplify your firewall for optimal performance, here are three easy, safety-conscious tips you can follow….

READ MORE

eMazzanti Technologies Helps Business Owners Identify Network Security Threats with No-cost Security Assessment

NYC metro area IT consultant shows business, government and education organizations how to reduce business disruption, minimize the risks of non-compliance, and prevent the loss of proprietary information Hoboken, New Jersey ­- (Vocus) July 1, 2014 – eMazzanti Technologies, IT support and computer consultant in the New York City Metro area is now conducting Complimentary Network Security Assessments that show business leaders how they can improve business performance by using cloud-based email protection, email message oversight and archiving, and easy-to-use web security. Through eMazzanti’s MXwebinspect website, visitors can explore the benefits of state-of-the-art email and web security and may request…

READ MORE

CryptoWall Epidemic is Here

A New Version of Cryptolocker is back… THE CRYPTOWALL EPIDEMIC is HERE! What is CryptoWall? Cryptowall is a ransomware Trojan virus similar to Cryptorbit and CyrptoLocker. The virus infects a computer and encrypts crucial files. Users may not be able to access their data which will be hidden once CryptoWall has taken its toll. Cryptowall can affect files including *.doc, *.docx, *.xls, *.ppt, *.psd, *.pdf, *.eps, *.ai, *.cdr, and *.jpg. Who is vulnerable to a CryptoWall? CryptoWall is designed to infect all versions of Windows including XP, Vista, Windows 7 and Windows 8. If you are still using XP, you…

READ MORE