You can’t be productive without routines and rituals & here’s why

We are what we repeatedly do.   According to research, up to 40% of our daily actions are powered by habits–the unconscious actions and routines we’ve developed over time.

FastCompany.com click the link to read the rest of the story.

Can you think of new daily rituals you can build into your work day?Join the conversation on our Facebook Page!

WordPress sites under attack via zero-day in abandoned plugin

WordPress site owners using the “Total Donations” plugin are advised to delete the plugin from their servers… This affects all versions of Total Donations, a commercial plugin that site owners have bought from CodeCanyon over the past years, and have used to gather and manage donations from their respective user-bases.

ZDNet.com click the link to read the rest of the story.

Were you using it?Join the conversation on our Facebook Page!

 

How to Spot Phishing: It’s the Most Common Cyber Attack

One percent of emails sent today are phishing attempts. And it often represents a more serious threat than the nuisance offers for free money we’ve all seen in our inboxes. Phishing is about stealing your password.

Medium.com click the link to read the rest of the story.

Take their quiz?  How did you do on it?Join the conversation on our Facebook Page!

Battle of the Note Taking Apps – Google Keep vs. Evernote: The best is …

If you’re in the market for a note-taking app and are trying to decide between Google Keep and Evernote, defining exactly what you plan to do with the app is an important first step. Each app is designed for very different purposes:

  • Google Keep functions like a digital bulletin board covered in sticky notes. Its lightweight interface and minimal features make it perfect for capturing ideas and to-dos quickly and easily.
  • Evernote is more like a multi-subject notebook or digital filing cabinet. It’s better for writing detailed notes, saving a variety of types of multimedia, and building an archive of information you can reference well into the future.

Zapier.com click the link to read the rest of the story.

Do you have a favorite?  What make it useful to you?Join the conversation on our Facebook Page!

How to 10X Your Results, One Tiny Tweak at a Time

If you’ve enjoyed my previous in-between episodes, then this might be your favorite episode ever. It’s one of the most actionable, information-packed interviews I’ve ever done. … Joel wanted me to help him figure out 5 areas he could upgrade in his own life… we discuss a wide variety of topics, including:

  • How I choose what to improve from infinite options
  • How you can subtract your way to success
  • Why self-improvement doesn’t mean self-centered
  • How I say no to time-consuming lunches, coffees, and other meetings
  • How I tackle cold introductions
  • Tools and tactics for reversing email overwhelm

TimBlog.com click the link to read the rest of the story.

Would you like to hear more podcasts like this?Join the conversation on our Facebook Page!

The Best Leaders Aren’t Afraid to Ask for Help

As a leader who advocates vulnerability as a strength, I am surprised to realize that I have, somehow, bought into the notion that I need to be super-human and that any weakness diminishes my leadership.  In fact, I see clearly now that it is precisely the opposite. … hiding our weaknesses in an attempt to be strong leaders makes us weak leaders. …

HBR.org click the link to read the rest of the story.

How vulnerable ought we to be?Join the conversation on our Facebook Page!

How to Debate Ideas Productively at Work

Arguing could be a very good thing — perhaps the key to their success —  if they could train people to do it in a healthy way.

Research tells us that cognitive diversity makes a group smarter. Two heads are, indeed, better than one, and many heads are even better, especially when everyone is willing to share their expertise and opinions.

HBR.org click the link to read the rest of the story.

How do you make sure your office has healthy debates?Join the conversation on our Facebook Page!

Security researchers take down 100,000 malware sites last year

Over the last ten months, security researchers filed abuse reports with web hosting providers and have taken down nearly 100,000 URLs that were used to distribute malware … the organization noted that recent numbers indicate that the average take-down time has now increased to more than a week, to 8 days, 10 hours, and 24 minutes, giving malware authors more than enough time to infect thousands of device every day. …

ZDNet.com click the link to read the rest of the story.

How much damage could this cause your customers if your site were infected?Join the conversation on our Facebook Page!

What Sales Leaders Need to Excel Over Time

We are not aware of any companies that have term limits for sales leaders, such as the vice president of sales. But should they? Term limits could help ensure that once-effective sales leaders are replaced before situations such as the following arise. …  The sales leader gets out of touch. … The sales leader develops blind spots. …  Subordinates cower as the sales leader’s personal power grows. … The sales leader locks in on favorite team members. …

HBR.org click the link to read the rest of the story.

Does your sales effort need a fresh review?Join the conversation on our Facebook Page!

Free Online Whiteboard for Small Teams

Collaborate as a Dream Team — All of you — managers, designers, developers, coaches, marketers and other talented professionals — work together to build great things. Team members are all different and speak many “languages” — data, pictures, spreadsheets, tasks, charts and more. RealtimeBoard combines all these pieces in one place to let your team or whole organization collaborate beyond formats, tools, locations and timezones.

TheRealTimeBoard.com click the link to read the rest of the story.

Could your team use a good Real Time Whiteboard?Join the conversation on our Facebook Page!

Windows 7 versus Windows 10: the final showdown

After January 14, 2020, Microsoft will no longer provide security updates or support for PCs running Windows 7 — unless you want to pay extra, of course. … According to Forrester’s survey of infrastructure decision-makers, 56 percent of company-issued PCs are currently running Windows 10 — up eight percent from last year, and 18 percent from the year before. “This shift is happening at a quick rate …

ZDNet.com click the link to read the rest of the story.

Are you on Windows 10?  When will you upgrade?Join the conversation on our Facebook Page!

3 Timeless Rules for Making Tough Decisions

I have three methods that I use… The first method is to use habits as a way to reduce routine decision fatigue…  The second method is to use if/then thinking to routinize unpredictable choices. … my third decision-making method: use a timer. …

HBR.org click the link to read the rest of the story.

What rules do you have for making the tough decisions?Join the conversation on our Facebook Page!

Hacks to clean and de-clutter your computer inside and out

How does one tackle this two-fold cleaning mission to get their computer in pristine shape inside and out? We consulted cleaning and tech experts to learn.

PHASE ONE: DE-CLUTTERING HACKS  Just as physical clutter can impact our performance, digital clutter can impact a computer’s. Here’s how to get your laptop to work its best and free up digital space, which should in turn boost your productivity. …

NBCNews.com click the link to read the rest of the story.

If you tried the hacks, which helped you the most?Join the conversation on our Facebook Page!

PC security warning: That out-of-date software is putting you at risk

Over half of applications installed on Windows PCs are out-of-date, potentially putting the security of users at risk through flaws in software that have already been patched by vendors. … running out-of-date software can provide an open door for hackers to take advantage of holes left in programs that haven’t had critical security updates applied….

ZDNet.com click the link to read the rest of the story.

How do you make sure your computer software is up to date?Join the conversation on our Facebook Page!

Facebook entering Crypto: plans to issue a stable coin

Facebook has been actively pursuing the blockchain space for the past few months, with the news of fiat-backed Crypto being recent in a string of initiatives taken to explore & eventually harness the DLT. Stable coins have been the latest buzz word for the Cryptoverse with a bunch of them launched this year alone…

Medium.com click the link to read the rest of the story.

Will you purchase a stable-coin from Facebook?Join the conversation on our Facebook Page!

Configuring Your iPhone for Maximum Privacy and Security

In this article, it’s my goal to help you focus on security and privacy (two different but equally important matters) on the iPhone, specifically with regard to your phone’s data connection—the internet connection you use for surfing the web or using apps. … there is no such thing as perfect security or perfect privacy online, only best practices and best tools. Anyone who promises you otherwise is lying or ignorant….

betterhumans.coach.me click the link to read the rest of the story.

Which of his suggestions are you going to try first?Join the conversation on our Facebook Page!

Intellectual humility: the importance of knowing you might be wrong

Intellectual humility is simply “the recognition that the things you believe in might in fact be wrong,” as Mark Leary, a social and personality psychologist at Duke University, tells me. … it’s a method of thinking. It’s about entertaining the possibility that you may be wrong and being open to learning from the experience of others. Intellectual humility is about being actively curious about your blind spots. … It’s about asking: What am I missing here?

Vox.com click the link to read the rest of the story.

How willing are you to be wrong?Join the conversation on our Facebook Page!

Office 365 vs G Suite: Which productivity suite is best for your business?

Question: Have you moved to one of these platforms?

Microsoft and Google are engaged in a pitched battle to win over your business with suites of cloud-based productivity software and services. Here’s a look at the many different editions of Office 365 and G Suite, along with what you can expect to pay for each one.

ZDNet.com click the link to read the rest of the story.

Have you moved to one of these platforms?Join the conversation on our Facebook Page!

The most powerful person in Silicon Valley

Question: Can anyone challenge him?

Billionaire Masayoshi Son–not Elon Musk, Jeff Bezos, or Mark Zuckerberg–has the most audacious vision for an AI-powered utopia where machines control how we live. And he’s spending hundreds of billions of dollars to realize it. Are you ready to live in Masa World?

FastCompany.com click the link to read the rest of the story.

Can anyone challenge him?Join the conversation on our Facebook Page!

Chinese Facial Recognition Will Take over the World in 2019

The best facial recognition startups are in China, by a long-shot. As their software is less biased, global adoption is occurring via their software. … A computer system that can track and identify any face anywhere is coming to global citizens. This is because capitalism isn’t regulated, it’s bullish on AI in an exaggerated sense where profits matter and efficiency fits the crime. As Chinese innovation start to get ahead, so too will Chinese ethics infiltrate the rest of the world. …

Medium.com click the link to read the rest of the story.

What should be done to protect our privacy?Join the conversation on our Facebook Page!

Reach Any Goal This Year with a Spreadsheet, a Calendar, and the SMART System

Achieving big goals isn’t easy, which is why most people don’t accomplish most of theirs. But with the proper framework, you can do just about anything.

Here’s how to go from goal setting to celebrating your goal accomplishment. All you need is your favorite to do app, a spreadsheet, and Google Calendar.

Zapier.com click the link to read the rest of the story.

Will you try this?Join the conversation on our Facebook Page!

Cyberattacks now cost $1.1M for the average business

The report found… the top impacts being operational/productivity loss (54%), negative customer experiences (43%), and brand reputation loss (37%).  … These IT leaders perceive the goals of the attacks to be service disruption (45%), data theft (35%), unknown reasons (11%), or espionage (3%). …Some 21% of businesses experience daily cyberattacks, up from 13% last year, the report found. Another 13% said they were attacked weekly, 13% said monthly, and 27% said once or twice a year. Only 7% of organizations said they have never been attacked…

TechRepublic.com click the link to read the rest of the story.

How much would it cost your business?Join the conversation on our Facebook Page!

Microsoft’s Windows 7 has one year of free support left

One year from today — on January 14, 2020 — Microsoft’s support for Windows 7 will cease. That means no more updates or fixes, including security fixes after that date, which is the first Patch Tuesday of 2020, unless a customer pays.

ZDNet.com click the link to read the rest of the story.

Have you upgraded to Windows 10 yet?Join the conversation on our Facebook Page!

How Much is Your Privacy Worth To You?

The price for our privacy is surprisingly low.

This first hit me quite some years ago, while I was working with a very successful restaurant group. I was conducting an experiment in customer service…

Hackermoon.com click the link to read the rest of the story.

How much is your privacy worth?
Join the conversation on our Facebook Page!

Amazon Is Becoming More Powerful Than You Realize

Amazon’s ambition goes far beyond dominating markets, says Stacy Mitchell, an economics researcher and co-director of the Institute for Local Self-Reliance. “Its intention is to control the basic infrastructure that commerce runs on.”  Thus far it’s been smooth sailing for the company …

Medium.com click the link to read the rest of the story.

Are you concerned about Amazon’s growing power?Join the conversation on our Facebook Page!

‘Apple support’ phishing scams are getting really good

You know those voice mails you get claiming to be from “Windows support”? It looks like scammers are upping their game with convincing phishing calls claiming to be from Apple, security expert Brian Krebs said in a report Thursday.

The scam starts an automated call showing Apple’s logo, address and legitimate Apple phone number that warns the user to return the call because of a data breach, according to the security website. The message then gives a 1-866 number to call back. That number is “a known phishing source,” the security analyst said.

CNet.com click the link to read the rest of the story.

Have you been hit with this scam?Join the conversation on our Facebook Page!

New Trojan attack adds a backdoor to your Windows PC to steal data

A well-resourced and prolific hacking group is distributing a new strain of malware that gives the hackers remote desktop access as part of an information-stealing campaign targeting banks, retailers and businesses. … The remote access trojan capabilities of FlawedGrace mean it allows attackers to gain almost full control over an infected device. Given how the campaign targets banks and retailers, it’s likely that acquiring money is the ultimate goal of the attacks…

ZDNet.com click the link to read the rest of the story.

How are you protecting yourself from these attacks?Join the conversation on our Facebook Page!

How Amazon knows so much about you – and how to regain your privacy

If you are not happy with the amount of information Amazon holds about you, click through this gallery to find out what you can do to control how much of your private data it has.

ZDNet.com click the link to read the rest of the story.

Wish you knew simple ways to protect your online privacy?Join the conversation on our Facebook Page!

The biggest tech trends of 2019, according to top experts

A new paradigm in personal computing is around the corner. That will be helped along by enabling technologies such as 5G networks, which will be stretching far and wide by the end of 2020. And, artificial intelligence will become infused in all kinds of products, allowing gadgets and services to subtly begin to anticipate our wants.

These tectonic shifts are already creating opportunity and chances for innovation.

FastCompany.com click the link to read the rest of the story.

Are you preparing to take advantage of these new opportunities?Join the conversation on our Facebook Page!

Five emerging cyber-threats to worry about in 2019

We’re going to see more mega-breaches and ransomware attacks in 2019. … But cyber-defenders should be paying attention to new threats, too.  Here are some that should be on watch lists:

Thanks to advances in artificial intelligence, it’s now possible to create fake video and audio messages that are incredibly difficult to distinguish from the real thing. These “deepfakes” could be a boon to hackers in a couple of ways. AI-generated “phishing” e-mails that aim to trick people into handing over passwords and other sensitive data have already been shown to be more effective than ones generated by humans. Now hackers will be able to throw highly realistic fake video and audio into the mix, either to reinforce instructions in a phishing e-mail or as a standalone tactic.

MITTechnologyReview.com click the link to read the rest of the story.

Are you taking security more seriously this year?Join the conversation on our Facebook Page!