Cyber Security

5 Endpoint Security Best Practices When Remote Work Takes Center Stage

With the majority of employees working from home this spring, organizations have encountered new challenges. The increased burden on corporate…

4 years ago

Cloud-based Security Solutions Deliver Powerful, Scalable Protection for SMBs

The average small to medium business (SMB) has most likely migrated at least some essential data and operations to the…

4 years ago

Protect Your Business from COVID-19 Phishing Scams

The list of states implementing stay-at-home orders continues to grow while the world scrambles to curb the spread of COVID-19.…

4 years ago

Minimize the Cost of Small Business Data Breaches with Proactive Security

Last year, Marriott, Facebook, Capitol One and the Russian government all made headline news with devastating data breaches. However, between…

4 years ago

Voice Cloning Elevates Security Threats to the Next Level

Last year, scammers convinced a director at a British company to send them $240,000. Using voice cloning, they impersonated a…

4 years ago

Focusing on the Future of Authentication

Weak and stolen passwords result in data breaches that cost businesses millions of dollars each year. Biometrics and multi-factor authentication…

5 years ago

eMazzanti to Repeat on NJBIZ Cyber Security Panel

Keeping current with evolving rules across multiple jurisdictions, dealing with ransomware and countering internal threats topics of expert NJBIZ cyber…

5 years ago

Life Beyond Passwords: Biometrics and the Future of User Verification

Kingdoms once protected vast treasures of gold and jewels with secret vaults and well-armed guards. Now, computer networks and even…

5 years ago

Secure Your Business with Strong Passwords and Multi-factor Authentication

In the 1983 movie WarGames, Matthew Broderick’s character hacks into a powerful military supercomputer by correctly guessing a single password.…

5 years ago

Emotet Phishing Scam Targets Financial Institutions with Malicious Fake Invoices

Widespread malware evolves, spreading rapidly in the US and UK We’ve written a lot about phishing and spear phishing in…

5 years ago