November 2024 Technology Times Newsletter

Page 1


TECHNOLOGY TIMES

ARE

P. 1 Give The Gift Of Your Undivided Attention With Notification grouping P. 4 What Every Small-Business Owner Must Know About Protecting And Preserving Their Company’s Critical Data And Computer Systems P. 2

“As

To

SafetyTipsForBefore,During AndAfterATrip

Asholidaytravelpicksup,hackersseea primeopportunitytoexploittravelers whomaylettheirguarddownontheir digitalsecurity.Securityriskslike phishing,publicWiFiandlostdevices caneasilycompromiseyourpersonal informationduringtravel.Butit’snot justyourdataatstake–whenemployees lettheirguarddown,theycan unknowinglyopenthedoortothreats fortheirentirecompany.

AccordingtoWorldTravelProtection, onlyabout30%ofcompaniesrequire employeestofollowbasiccyber securitymeasureswhiletraveling.This leavesasignificantgapinprotection, potentiallyexposingentireorganizations toseriousrisks.Here’showtosafeguard yourselfandyourbusinessduringbusy holidaytravel.

Toavoidthestressoflostdevices,stolen dataorasecuritybreachthatcouldruin yourtrip,makecybersecurityapriority bytakingafewsimplestepsbefore, duringandafteryourjourney.

1.UpdateAllDevices

Softwareupdatesoftenincludepatchesfor securityvulnerabilities.

2.BackUpImportantData

Ifyourlaptopcontainingvitalclient presentationsisstolen,acloud-based orothersecurebackupwillallowyou togetyourdatabackwithout significantdisruption.

3.UseMultifactorAuthentication(MFA)

MFAaddsanextralayerofsecurityby requiringmorethanjustapasswordtoaccess accounts.Thismakesitmuchharderfor hackerstogainaccess,eveniftheyhave yourpassword.

4.RestrictAccessToSensitiveData

Ifyoudon’tneedcertainfilesorapplications whileontheroad,temporarilyremoveaccess. Thisreducestheriskofcompromisedsensitive informationifyourdeviceisstolenorhacked.

5.SecureYourDevices

Ensurealldevicesarepassword-protectedand encrypted.Encryptionscramblesyourdata, makingitunreadabletounauthorizedusers.

SAFE PRACTICES WHILE TRAVELING

1.AvoidPublicWiFi

Ifyoumustconnect,useavirtualprivate network(VPN)toencryptyourInternettraffic. Thisactsasasecuretunnelbetweenyour deviceandtheInternet,protectingyourdata frompryingeyes.

2.BeCautiousOfPublicChargingStations

PublicUSBchargingstationscanbe

compromisedbyattackerslookingtostealdata orinstallmalwareonyourdevice–apractice knownas“juicejacking.”Plugyourcharger intoanelectricaloutletoruseaUSBdata blocker,whichpreventsdatatransfer.

3.NeverLeaveDevicesUnattended

Alwayskeepyourdeviceswithyouorsecurely lockedaway.Ifyoumustleaveyourlaptopin yourhotelroom,useaphysicallocktostoreit. Neverhandyourdevicetostrangers,evenif theyappeartobeofferinghelp.

4.DisableBluetooth

TurnoffBluetoothwhennotusingit, especiallyinpublicplaces.Hackerscanexploit openBluetoothconnectionstogainaccessto yourdevices.

5.PayAttentionToOnlineActivity

Phishing,businesse-mailcompromiseand onlineshoppingscamsarecommonduringthe holidayseason.Alwaysverifytheauthenticity ofe-mails,especiallythoserequestingsensitive informationorurgentaction.

RETURNING HOME: POSTTRAVEL SECURITY CHECK

Securityawarenessdoesn’tstoponceyouget home.Sometimes,youdon’tknowuntilyou returnthatyou’vebeenhacked.

Thisreportwilloutlineinplain,nontechnicalEnglishthe commonmistakesthatmanysmall-businessownersmake withtheircomputernetworksthatcostthemthousandsinlost sales,productivityandcomputerrepairbills,andwillprovide aneasy,provenwaytoreduceorcompletelyeliminatethe financialexpenseandfrustrationcausedbytheseoversights.

1.ReviewAccountActivity

Onceyou’rebackhome,reviewyouraccounts andlookforunusualloginsortransactionsyou didn’tinitiate.

2.ChangePasswords

Ifyouaccessedsensitiveinformationwhile traveling,it’sagoodideatochangeyour passwordswhenyougethome.Thisensures thatanypotentialcompromisesduringyour tripdon’tleadtolong-termissues.

ConsiderACompany-Wide TravelPolicy

Tofurtherprotectyourbusiness,consider implementingacompany-widetravelcyber securitypolicy.Thispolicyshouldoutlinethe expectationsandproceduresforemployees travelingonbusinessorworkingremotely.Key elementstoincludeare:

Guidelinesforusingpublicnetworks Reportinglostorstolendevices Respondingtopotentialsecurityincidents

Followingthesesimple stepswillsignificantly reducetravel-related cybersecurityrisks andensurethatyou cantravelwithpeace ofmind.

AfterafailedattempttoselltoBlockbuster, NetflixfounderMarcRandolphmadealifealteringdecision:ifyoucan’tjoin’em,beat ’emDespitebeing$50millionindebt, Netflixultimatelysucceededintopplingthe videorentalgiantwithinadecade.Whilethis storyisoftenseenasabeaconofhopefor start-ups,itteachesestablishedcompaniesa differentlesson:therealthreatmaycomefrom anunexpectedcompetitorwhotargetsyour weaknesses,notyourstrengths.Randolph says,“Ifyou’renotwillingtodisruptyourself, you’releavingitwide-openforsomeoneto disruptyourbusinessforyou"

Havingworkedwithnumerousearly-stage companies,Randolphhasidentifiedfivekey elementsthatfosterinnovationandhelp companiesdisrupttheirmarkets–ordefend againstthosedisruptions.Theseideasprovide aroadmapforthinkinglikeastart-up,no matterthesizeofyourcompany

1.InnovationCanHappenAnywhere

Youdon’tneedtobeinSiliconValleyto innovateRandolphnotes,“Ijustgotback fromAustralia,whereIsawacompanyusing dronestoimplantseedsforreforestationby firingthemintothegroundfrom60feetup.” TheInternethasleveledtheplayingfield, makingitpossibleforanyone,anywhere,to developgroundbreakingideas

2.YouDon’tNeedToBeAGeniusOr HaveSpecialSkills

Randolphknowsentrepreneursfromallwalks oflife.Onedroppedoutofcollegeand transitionedfromdrivinganambulanceto fightingforestfiresbeforestartinghisown companyAnother,amusicianwhospenta decadeinaskaband,createdandsolda

music-streamingserviceEventeenagersare makingwavesinthebusinessworld“I’ve foundthatthemostdisruptivepeoplearenot theAorBstudents,”Randolphsays.“They’re theCstudentswhomanagedtonavigatethe educationsystemwithouthavingalltherisktakingsqueezedoutofthem”

3.EmbraceRisk,ButNotRecklessness

Asuccessfulinnovatorembracescalculated risksthatcomefromstartingdownapath withoutknowingexactlywhereitleads.“If youwaituntilyou’vefiguredoutwhat’s aroundthecornerthroughanalysisand research,someone’salreadybeatenyouthere,” Randolphadvises

4.GenerateIdeas–LotsofThem

Toinnovate,youneedmorethanjustone goodidea–youneedhundreds“Itdoesn’t matterifthey’rebigideasorevenparticularly originalones,”Randolphsays.ThePost-it Note,forexample,whichsellsnearlyabillion dollars’wortheveryyear,wasn’t groundbreakingbutprovedimmensely successful.Knowinginadvanceifanideais goodorbadisimpossible.Theonlywayto findoutistotakethatrisk,buildsomething andputittothetest

5.ConfidenceIsKey

Finally,youneedconfidenceinyourideas, evenwhenlifegetsinthewayorothers doubtyou”Everyonewhohasevertakena showerhashadanidea,”Randolphquotes NolanBushnell,founderofAtari.“Butit’s thepersonwhogetsoutoftheshower,towels offanddoessomethingaboutitwhomakes thedifference.”

The Portable-Charger-Power-Bank 40000mAh is a powerful solution for travelers who need reliable, fast charging on the go Its 30W PD and QC 4 0 quick-charging capabilities can charge an iPhone 13 from 20% to 80% in just 30 minutes! Charging three devices simultaneously through its Type-C and dual USB ports is ideal for multitasking professionals

Its large 40000mAh capacity ensures a week’s worth of power, eliminating battery anxiety during travel. The built-in LED display and practical brig flashlight bonus feature make this power bank a dependable tool for every traveler

SHINY NEW GADGET OF THE MONTH

TECH GIFTS TO AVOID BUYING

Whileaplayfulrobotthatusesfacial recognitiontoanalyzeachild’smoodsmight seemlikeanawesomegiftforyournephew,it’s notsogreatwhenyoulearnthatdatacanbe hackedbycybercriminalsorsharedforthirdpartyadvertising.

TRIVIA

In which year did the first online shopping transaction occur, marking the beginning of e-commerce?

A. 1994 B. 1995

C. 1996 D. 1997

UNREASONABLE HOSPITALITY

Will Guidara was only 26 when he took over the run-down brasserie Eleven Madison Park and transformed it into a Michelin three-starwinning, world-class restaurant within 11 years. His secret sauce? Over-thetop, out-of-the-box and exceptional hospitality that customers couldn’t forget Unreasonable Hospitality by Will Guidara offers valuable insights for business leaders who don’t want to provide simple customer service but rather an extraordinary customer experience. His innovative strategies, like creating bespoke guest experiences and fostering a culture of thoughtful communication within his team, provide practical takeaways for any industry This book encourages leaders to rethink how they engage with customers and employees, illustrating that extraordinary service can turn routine interactions into powerful, memorable experiences that drive long-term success

Atthe2023CESelectronicsexhibition,Jen Easterly,directoroftheCybersecurityand InfrastructureSecurityAgency,toldthe WashingtonPostthatmosttechcompanies addresssafetyproblemswhentheyhappenrather thandevelopingsafetyfeaturesproactively. Companiesare“reallyfocusedoncost, capability,performanceandspeedtomarket,not onbasicsafety,”shesaid.

Nomatterhowwelltheypromisetocleanyour floorsorentertainyourchildren,sometech productsarenotworththesecurityrisks.Here areafewtechgiftstoavoidandtipsforwiser techshopping.

Beware These Tech Gifts

Camera-EnabledDevicesWithBad

PrivacyPolicies

Doorbellcamshaveonepurpose:toseeand heareverythingaroundyourhomeand neighborhoodThenitsendsthatdatato thecloudPoorlysecuredcamerascould allowhackerstoaccesslivefeeds, potentiallygivingtheminsightintowhen you’rehomeandwhenyou’reaway Alwayschoosedeviceswithend-to-end encryptionandtransparentprivacypolicies

AI-IntegratedDevices

In2022,imagesfromiRobot’sAI-enabled Roombawereleakedonline.Althoughthe companyclaimedtestusersconsentedto

sharedata,itunderscorestheriskofAI devicescollectingextensiveinformation aboutyou.Readtheprivacypolicy closely.Ifyoucan’tcustomizedata settingsorcompaniesaren’tclearabout howtheyuseyourdata,shopelsewhere.

TrackingDevicesForKids

Trackingdevicesforchildrenmight seemlikeathoughtfulgiftforfamilies, butthesedevicescanexposechildren’s real-timelocationtohackers,stalkersor thirdparties.In2021,thepopularfamily safetyappLife360wasfoundtobe sellinguserlocationdatatodatabrokers, accordingtoreportingbyTheMarkup Asaferapproachistodiscusslocation sharingopenlywithyourkidsanduse built-infeatureslikeGoogle’sFamily LinkorApple’send-to-endencrypted locationsharing

GeneticTestingKits

In2023,nearly7million23andMeusers hadtheirancestrydatahacked–astark reminderoftherisksofgenetictesting. Criminalsaredrawntothishighly sensitivedata,andcompanieslikeVeritas andAncestry.comhavealsofaced breaches.Beyondtheft,there’stheissue oflawenforcement’sabilitytoaccessthis information.Remember,onceyouspit intoatesttube,yougiveawayyour geneticinformation,thatofyourclose relativesandevenfuturegenerations.

Constantnotificationscanbearelentless distraction,pullingyououtofmeaningful conversations.Thisholidayseason,groupyour notificationstocollapsemultiplenotificationsand insteadreceiveasummaryandturnofftopicsyou actuallydon'twanttosee.Thendevotethatfree timetoyourfamilyandfriendsasyoucelebrate!

InyouriPhone,gotoSettings->Notificationand choosetheappyouwanttogetnotificationsfrom. Next,tapNotificationGrouping.Thenyoucan

pickfromAutomatic, ByApporOff.Togroup notifications,chooseBy App.ForAndroidusers:Goto Apps&NotificationsinSettings.Taptoseethelist ofallyourappsandpicktheonesyouwantto groupnotificationsfor.Next,tapNotifications. Then,lookforanoptioncalledNotification GroupingorBundledNotificationsandturnthis featureonorcustomizeitbasedonhowyouwant appnotificationsgrouped.Voilà!

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.