eMazzanti Technologies Urges Customers to download KRACK Wi-Fi Vulnerability Patch | | November 1, 2017, by Cloud Services New York City | NYC area IT security consultant also warns the public to take extra precautions to avoid data loss from new KRACK Wi-Fi data security threat Hoboken, New Jersey - (Cision) November 2, 2016 — eMazzanti Technologies, a NYC area IT consultant and MSP, issued a warning today regarding several recently revealed WPA/WPA2 encryption protocol vulnerabilities that affect countless Wi-Fi enabled devices worldwide. Read more → | eMazzanti Presents | Missed our 16th Anniversary? Watch below! eMazzanti Technologies Celebrates 16th Anniversary | SharePoint and OneDrive: security you can trust, control you can count on | | used with permission from Microsoft Secure by Bill Baer, Senior Product Marketing Manager, SharePoint and OneDrive Team | In today’s complex and regulated environment, businesses need to focus on building more secure solutions that deliver value to their customers, partners, and shareholders—both in the cloud and on-premises. Read more → | | Tech News | | Scary Tech: The Stuff of Nightmares | October 30, 2017, by Cloud Services New York City | Forget the haunted house and bloody claw this Halloween. Your computer screen and smartphone offer plenty to keep you wide-eyed and shivering with fear in the middle of the night. From the truly bizarre to horrors that fail to frighten you nearly as much as they should, scary tech gives you ample reason to scream. Here are just a few examples. Read more → | | The dark web: What your business needs to know | used with permission from FTC.gov by John Krebs | You’ve heard about the “dark web” and wondered how it affects businesses — including small businesses. That was one of the topics addressed at an FTC conference earlier this year on identity theft. Recent headlines about high-profile data breaches have added even more urgency to the discussion. So why should the dark web matter to your company? Unfortunately, when a business suffers a breach, the dark web is often the next stop that sensitive data makes after it’s been stolen. Read more → | | |