SECURITY INSIGHT BLOG

Welcome to emt technology blog.
How to Securely Use USB Flash Drives

How to Securely Use USB Flash Drives

USB storage devices have long been a plague to companies’ data security. Since 2008 when a malware-infected USB flash drive caused the worst breach of US military computers in history, organizations have become more aware of the dangers USBs pose, but data...

read more
PASSWORD POLICY AND STRENGTH ENHANCEMENTS AND MORE IN V16.05.00

PASSWORD POLICY AND STRENGTH ENHANCEMENTS AND MORE IN V16.05.00

We are excited to announce the general availability of Device42 v16.05.00, which includes the following: Password Policy and Strength Enhancements Device42 administrators can now define user password policy requirements and expiration settings to increase password...

read more
5 Ways In Which Banks Secure Their Data

5 Ways In Which Banks Secure Their Data

Banks and banking functions as we know them have been around for centuries now. The history of money is tightly intertwined with the history of the banking industry. Even though the way we bank has changed considerably, the basic principles remain the same....

read more
What Are HTML Injections?

What Are HTML Injections?

HTML injections (HyperText Markup Language injections) are vulnerabilities that are very similar to Cross-site Scripting (XSS). The delivery mechanisms are exactly the same but the injected content is pure HTML tags, not a script like in the case of XSS. HTML...

read more
Getting smarter: IoT devices get some security standards

Getting smarter: IoT devices get some security standards

It looks like consumer smart devices might be getting a baseline set of standards, thanks to some collaboration between a UK government agency, a European Standards Organization, an industry association – and probably help from barrels and barrels of coffee. About...

read more
Hitachi and Ubisecure partner to deploy new frictionless biometrics for wide-scale customer authentication

Hitachi and Ubisecure partner to deploy new frictionless biometrics for wide-scale customer authentication

Hitachi’s pioneering Hand Gesture Technology solution is now available through Ubisecure Identity-as-a-Service (IDaaS) London UK, 30th January 2020 – Today at the Goode Intelligence Identity Summit 2020 London, Hitachi and Ubisecure announced their partnership to...

read more
4 Costly Data Science Mistakes

4 Costly Data Science Mistakes

From product development and marketing to staffing decisions, businesses are using data to fuel nearly every decision. This means that data itself is more valuable than just about anything – thus making data science a prominent focus in today’s business world. With...

read more
Install Free Let’s Encrypt SSL SAN Certificate For Exchange 2019

Install Free Let’s Encrypt SSL SAN Certificate For Exchange 2019

When an Exchange organization is made available for external and internal access, the proper SSL certificate must be installed on the server.  This is to ensure that the URL endpoints such as Outlook Web App and ActiveSync are properly identified (trusted...

read more
Version 3.0 of ESET Secure Authentication extends capabilities and introduces support for biometric authentication

Version 3.0 of ESET Secure Authentication extends capabilities and introduces support for biometric authentication

With the rise of remote and flexible working, it is increasingly common for businesses and organizations to have a range of devices and environments they need to protect from cyber threats. This, combined with the fact that businesses of all sizes are facing a...

read more
Safetica 8.3 – Reduce the risk of data leaks with the reinvented Web and Application control

Safetica 8.3 – Reduce the risk of data leaks with the reinvented Web and Application control

Let’s take a sneak peek at what Safetica 8.3 has in store for you. After introducing 3 ways to protect your data, we will now present how to stop malware and reduce the risk of data leaks by controlling website and application access. Risks for effective business...

read more
Looking out for you – top ranking protection

Looking out for you – top ranking protection

BullGuard has done it again. That’s right, it’s gained top ranking for its protection, sheer performance, and so easy-to-use usability. AV-Test, an independent lab that evaluates and rates antivirus and security software, gave BullGuard the highest possible scores...

read more
Optimizing Your IT Spend as You Move to the Cloud

Optimizing Your IT Spend as You Move to the Cloud

The move to cloud computing is gaining speed. The Flexera 2020 State of Tech Spend Report, an analysis of a recent Flexera survey of business leaders, reveals that nearly one-third of survey respondents already have workloads in the cloud. And that number is...

read more
RUNNING ON CISCO? TIME TO FIND YOUR VULNERABLE APPLICATIONS

RUNNING ON CISCO? TIME TO FIND YOUR VULNERABLE APPLICATIONS

As far as data center hardware is concerned, Cisco is nearly ubiquitous. You’d be hard-pressed to find a data center that doesn’t use at least one piece of Cisco equipment and a corresponding Cisco application. This is why it’s a good idea to pay attention when Cisco...

read more
3 Data Protection Tips for Insurance Companies

3 Data Protection Tips for Insurance Companies

Due to the sensitive nature of the data they collect, insurance companies are subject to strict data protection regulations, often more so than other businesses. Under the EU’s General Data Protection Regulation (GDPR), a significant chunk of the customer...

read more
Artificial Intelligence on smartphones – why it’s important

Artificial Intelligence on smartphones – why it’s important

Huawei Mate 10 was the first phone in the world to feature artificial intelligence. The Kirin home chip promised to increase computational capacity inside a very small device, but with much greater potential than many popular laptops on the market. Since then,...

read more
Dedicated DLP VS Integrated DLP

Dedicated DLP VS Integrated DLP

As data breaches and data loss become legal concerns companies must contend with the world over, Data Loss Prevention (DLP) solutions have emerged as essential tools in any comprehensive cybersecurity strategy, addressing one of the biggest threats to data...

read more
The implications of control over internet infrastructure via DNS-over-HTTPS on privacy

The implications of control over internet infrastructure via DNS-over-HTTPS on privacy

In the early days of the internet, it was quite common for local networks to run their own domain name service (DNS). DNS was invented as a solution for allowing internet users to query remote servers via friendly, easy-to-remember names like google.com. Names are...

read more