Severe vulnerabilities uncovered in popular password managers

Passwords stored in RAM could lead to theft, but the report has to be considered in a risk-based context. …

Independent Security Evaluators (ISE) published an assessment on Tuesday which documented the results of tests involving 1Password, Dashlane, KeePass and LastPass, all of which are popular password managers available today.

ZDNet.com click the link to read the rest of the story.

Do you use a password manager?  Are you concerned?Join the conversation on our Facebook Page!

You have around 20 minutes to contain a APT attack

Governments and private organizations have around 20 minutes to detect and contain a hack…

New statistics published today by US cyber-security firm Crowdstrike ranked threat groups based on their “breakout time.”  “Breakout time” refers to the time a hacker group takes from gaining initial access to a victim’s computer to moving laterally through its network. This includes the time the attacker spends scanning the local network and deploying exploits in order to escalate his access to other nearby computers.

According to data gathered from 2018 hack investigations, CrowdStrike says Russian hackers (which the company calls internally “Bears”) have been the most prolific and efficient hacker groups last year, with an average breakout time of 18 minutes and 49 seconds.

ZDNet.com click the link to read the rest of the story.

How quickly can your business respond to an attack?Join the conversation on our Facebook Page!

The Best Mind Mapping Software in 2019

Mind mapping is a creative exercise that begins when you write down a central idea or theme, then draw lines that branch out into new “nodes,” each with a new word or idea that’s related to the first. … Mind mapping is a creative exercise that begins when you write down a central idea or theme, then draw lines that branch out into new “nodes,” each with a new word or idea that’s related to the first.

Zapier.com click the link to read the rest of the story.

Have you used mind mapping tools, before?Join the conversation on our Facebook Page!

42 Productivity Habits to 10x Your Workflow

I was asked how many productivity tips, tricks, hacks, and tools do I know. And as I began to think through all of the things I have learned, this list was born. …This is my exhaustive list from my own research, experience, and conversations with others. There are bound to be more tips and tricks, and I hope you will share them after this list.

Medium.com click the link to read the rest of the story.

Have you learned to make new habits like these?Join the conversation on our Facebook Page!

Why Online Privacy Matters and 5 Ways to Reclaim It

It’s the most common argument against privacy: “If you’ve got nothing to hide, you’ve got nothing to fear.” It’s also the silliest argument against privacy.

Privacy expert and author Daniel Solove has torn down this fallacy in his paper on the subject. But Solove’s essay is a complex take on a nuanced subject. Instead, the simple rhetoric of the “nothing to hide” argument is easier to repeat.

But no matter how little you have to hide, the implications of online privacy breaches are major. These few resources explain the pitfalls clearly and concisely.

MakeUseOf.com click the link to read the rest of the story.

What steps have you take to regain your online privacy?Join the conversation on our Facebook Page!

The Best Screen Recording Software in 2019

Text isn’t always an efficient way to deliver instructions, describe problems, or share knowledge. Writing out descriptions can take significantly longer than just showing someone your screen. But you’re usually not standing next to the person or people who need to see your screen.

Screen recording software solves this problem by recording whatever is happening on your screen, including the movement of your cursor. We evaluated more than 30 screen recording apps, and here we’ll present the 10 best.

Zapier.com click the link to read the rest of the story.

Have you tried Loom?Join the conversation on our Facebook Page!

Microsoft security chief: IE is not a browser, so stop using it

Is Internet Explorer (IE) a browser? According to Microsoft, no. Today, it’s a ‘compatibility solution’ for enterprise customers to deal with legacy sites that should be updated for modern browsers.  … Chris Jackson, Microsoft’s worldwide lead for cyber-security, … that habit needs to stop … ‘The perils of using Internet Explorer as your default browser’.

ZDNet.com click the link to read the rest of the story.

Are you still using IE because it’s cheaper?Join the conversation on our Facebook Page!

4 Ways Every Business Needs To Use Artificial Intelligence

What makes artificial intelligence systems so powerful is that, unlike purely statistical approaches, they can learn. That allows them to adapt when market behavior changes as well as continually improve performance as more data comes in.

Forbes.com click the link to read the rest of the story.

Are you using or considering using AI soon?Join the conversation on our Facebook Page!

I like Windows 7: Why should I pay to move to Windows 10?

Actually, you don’t have to pay.  Read the article to find out why. But you really should move to Windows 10!

There’s one key feature that makes Windows 10 a must-do upgrade: Security. Windows 10 has far better intrinsic security features than Windows 7. This makes sense, because when Microsoft introduced Windows 10, it had six years more experience fighting off cyberattacks than it had when Windows 7 was introduced.

ZDnet.com click the link to read the rest of the story.

If you haven’t migrated to Windows 10 yet, why not?Join the conversation on our Facebook Page!

Should I Upgrade My Device?

We live in an era of upgrades. Every year, companies come out with new versions of their products rolling out improved features with each release attempting to provide something irresistible better than the last.

Medium.com click the link to read the rest of the story.

Are the annual upgrades worth it?Join the conversation on our Facebook Page!

New Google Chrome Add-On Warns When Your Password Isn’t Private

If someone else has used the same password as you and it’s listed in a dump, guess what? Your own account is also at risk. It doesn’t even matter if you used that password on a different website. Once it’s exposed, it’s just not safe to use any more.

With leaks and hacks happening more or less non-stop it’s a difficult task to keep your accounts secure.

Forbes.com click the link to read the rest of the story.

Did you know how easy it was to have a risky password?Join the conversation on our Facebook Page!

Facebook Messenger users: You now have 10 minutes to unsend a message

With the new Facebook Messenger app, users have “up to 10 minutes” to remove a message for everyone on a chat.

After the 10 minutes is up, users will only be able to remove a message from their own chat, which leaves it visible to everyone else.

ZDnet.com click the link to read the rest of the story.

Have you ever wished you had this before?Join the conversation on our Facebook Page!

Billions of Hacked Passwords and Usernames now Free: on the Dark Web

More than 600 gigabytes of hacked accounts from years ago have been compiled and are free to download.

You can check if you were affected by the massive data set with the HPI’s search tool.

Cnet.com click the link to read the rest of the story.

Have you checked to see if your accounts have been hacked?Join the conversation on our Facebook Page!

Microsoft: its time for Internet Explorer 10 Rest In Peace

Microsoft is giving commercial customers until January 2020 to transition to IE 11.  “After this, we will not release any security or non-security updates, free or paid assisted support options, or online technical content changes for IE10,” Microsoft says.

ZDNet.com click the link to read the rest of the story.

Is your office still using Internet Explorer?Join the conversation on our Facebook Page!

Simple changes that Minimize Risk While Surfing the Web on Your Phone

Here are a total of 10 simple and mostly free solutions to help you take better control of your mobile security. Take it slow, but by all means: Do take it. It’s worth the effort.

Medium.com click the link to read the rest of the story.

Have you taken the time to secure your phone?Join the conversation on our Facebook Page!

Not All Marketplaces are Created Equal: What a Founder Discovered

The evolution of marketplaces is tied closely to distribution and closing the information asymmetry gap between supply and demand (aka lead generation). Technology and new business models have essentially created transparency of opportunities. The first evolution was moving from traditional brick-and-mortar transactions…

Medium.com click the link to read the rest of the story.

Are you looking for the right marketplace?Join the conversation on our Facebook Page!

12 Free Tools to Scan Your Website’s Security

If you or your business has a website website you really should take a few minutes and check to make sure it is malware free.  People visiting sites with malware remember to avoid them in the future.  Here is a list out free tools to scan your site for security vulnerabilities, malware.

geekflare.com click the link to read the rest of the story.

Have you been alerted of malware when visiting a local business website?Join the conversation on our Facebook Page!

Fake meeting request from the boss steals passwords

Called to a meeting with the CEO? Don’t be so sure.

A widespread phishing campaign is targeting executives across a number of industries with messages asking to reschedule a board meeting in an effort to steal logins and passwords.

ZDNet.com click the link to read the rest of the story.

Has your office received on of these yet?Join the conversation on our Facebook Page!

The Best Screen Sharing Software in 2019

Screen sharing software can be used for anything from webinar presentations, to live customer support interactions, to a quick gut check on a design with a colleague. At its most basic, it’s software that allows two or more users to share their screens with other people online. But the best software offers more…

Zapier.com click the link to read the rest of the story.

Have you been looking for better screen sharing options?Join the conversation on our Facebook Page!

10 In-Depth Strategies to Improve Your Focus and Produce High-Quality Work

Our ability to be selective with our attention is not due to demographics, media consumption, or social media use, but rather it’s the intentional environment that we make for ourselves for when we focus on a task/activity. … there are 10 highly-specific strategies that I incorporate into my work life that have helped me produce high-quality work amidst both digital (i.e. social media) and analog (i.e. meetings) distractions.

Medium.com click the link to read the rest of the story.

Do you do better focusing on a single task at a time?Join the conversation on our Facebook Page!

How to use Google’s Password Alert tool to thwart phishing attacks

Google’s built a new tool in the fight against phishing. The free Password Alert Chrome extension keeps track of where you enter your Google account password and alerts you when you’ve entered it someplace other than accounts.google.com. This does two things: it prevents you from re-using your Google password on other sites, and it protects you if you’ve entered your password on a site that’s pretending to be Google to collect your private information, a practice also known as phishing.

Cnet.com click the link to read the rest of the story.

Have you been scammed into giving up your gmail password?Join the conversation on our Facebook Page!

4 Things Managers Need To Know About Data

Data has been called the new oil and for good reason. While as recently as a decade ago our ability to use data effectively was limited by technology, today our access is nearly unlimited. New platforms like Hadoop and Spark allow us to analyze hundreds —or even thousands — of databases at once. … Many managers pride themselves on being “data driven,” but that’s a fairly meaningless term. Data, by itself, tells you nothing. That’s why the first thing … to do is ask the right questions, form hypotheses and use data to test them.

Forbes.com click the link to read the rest of the story.

What story is your data telling you?Join the conversation on our Facebook Page!

The market for cyber-insurance is growing

A survey in 2018 by KPMG found that only a fifth of it bosses thought their firm was well prepared for an attack. … The market is most developed in America, says Robert Hannigan, one of those ex-gchq bosses, thanks in part to Californian laws passed in 2003 that compel firms to confess to large data breaches.

The Economist click the link to read the rest of the story.

Is you firm covered by cyber-insurance?Join the conversation on our Facebook Page!

Windows 7 migration warning: Plan now to avoid security worries later

Malware can spread much more easily on obsolete platforms, warns security body. With less than a year until the end of Windows 7 support, don’t get caught out. …Keeping software up to date is one of the most effective ways of keeping your networks and devices secure, it said in a blog post: “This is why planning your upgrades far in advance is especially important.

ZDNet.com click the link to read the rest of the story.

Have you planned the upgrade with your techs yet?Join the conversation on our Facebook Page!

Mac Users Beware: New Ad Technique Infects You With Trojans

Recent months have seen an uptick in reports of JavaScript malware that hides in image files. This is often referred to as “image based malware” or “steganography malware” in more technical contexts. …

Medium.com click the link to read the rest of the story.

Have you been hit by this attack?Join the conversation on our Facebook Page!

8 Ways to Keep Spam and Promotional Emails from Filling Your Inbox

Most of us can’t last more than six minutes without a quick glance at our email or IMs. And unfortunately, these constant interruptions have a serious, negative impact on both our productivity and mental acuity. The simplest solution is to close your email app so you don’t get distracted by incoming mail notifications. But most of us just aren’t willing—or able—to do that.  There is another solution: Get fewer emails.

Zapier.com click the link to read the rest of the story.

How big a time waster is wading through all the junk email?Join the conversation on our Facebook Page!