Got ransomware? These tools may help

There may be a way to get those files back without paying a ransom. But first a couple of basic questions…

infoworld.com click the link to read the rest of the story.

Have you been hit with ransomware?  How did you recover?Join the conversation on our Facebook Page!

How to spot fake, scam or fraudulent websites

This guide will teach you how to recognize secure websites you can trust and how to spot fake ones run by fraudsters looking to scam you.

comparitech.com click the link to read the rest of the story.

What was the most valuable lesson here for you ?Join the conversation on our Facebook Page!

Passwords Might (Finally) Go Away Soon, Here is why

There’s hope that we can finally ditch long, complex passwords thanks to a series of regulations and open standards that ease and encourage the implementation of passwordless authentication methods in online applications.

“The vast number of passwords needed in our daily lives have become a burden, which is why we see so many reused or weak static credentials,” says Stina Ehrensvard, CEO and Founder of Yubico, which manufactures physical security keys like the Yubikey 5 NFC. “We needed to think about how to address this problem in a way that simplifies the login process while adding the highest level of security. Up until now, there hasn’t really been a way to do both of those things successfully.”

pcmag.com click the link to read the rest of the story.

Are you using or thinking of using a Yubikey?Join the conversation on our Facebook Page!

Identity Theft 101 – What is Identity Theft?

What is identity theft? It is simply when someone uses your identity as their own. But there’s nothing simple at all about the damage left in their wake. There are close to 10 different types of identity theft, which we’ll detail below. …

I will dig into the identity theft basics, including how it happens, some of the most common types of identity theft, and what you can do to protect yourself.

Libertyid.com click the link to read the rest of the story.

Has your identity been stolen?  What happened as a result?Join the conversation on our Facebook Page!

6 STEPS TO REPAIR CUSTOMER RELATIONSHIPS

First, it’s happened to all of us (and we’re here to help).

Second, it is impossible to understand all the contextual and environmental factors that led to the customer disengaging. It is easy for founders to believe they are the singular point of failure (which is exacerbated by processing the event of loss by themselves in an echo-chamber). The reality is that this is often not the case.  And third, some customer relationships cannot be repaired. Be OK with this.

Here are the six battle-tested steps I shared with the founder whose business had been impacted.

philhsc.com click the link to read the rest of the story.

Could any of these suggestions have helped you recover a former customer?Join the conversation on our Facebook Page!

How to Spot and Avoid Fake Virus & Malware Warnings

As you use your computer and browse the Web, you may occasionally run into infection warnings that appear to be legitimate but aren’t. These anti-malware warning messages — appropriately called “scareware” — are designed to scare you into installing fake anti-malware programs that are actually malware in disguise.

So how can you tell between real and fake warning messages? It can be tough, but as long as you stay calm and take your time, there are a few signs you can look for that will help you distinguish between the two.

makeuseof.com click the link to read the rest of the story.

Have you been scammed?Join the conversation on our Facebook Page!

Best tech gadgets of 2018

Time to take a tour of what I consider to be the best tech gadgets of 2018. There are some that you’ll no doubt expect to find in this list, and others that will probably come as a surprise. All have been personally tested for quality, performance, and durability.

ZDnet.com click the link to read the rest of the story.

Are you buying tech gifts this Christmas?

Join the conversation on our Facebook Page!

Hackers Aren’t Afraid of Us – This is why

Commander of the United States Cyber Command, Gen. Paul Nakasone was asked whether our adversaries think they will suffer if they strike us with cyberweapons. “They don’t fear us,” General Nakasone replied.  So while the United States remains the greatest cyberpower on earth, it is increasingly losing daily cyberconflicts. The range of American targets is so wide and deep that it is almost impossible to understand all of the vulnerabilities. And because most of those targets don’t belong to the government…

NYTimes.com click the link to read the rest of the story.

Are you concerned that hackers could destroy your business?

Join the conversation on our Facebook Page!

How to Configure Your iPhone to Work for You, Not Against You

The iPhone could be an incredible tool, but most people use their phone as a life-shortening distraction device.
However, if you take the time to follow the steps in this article you will be more productive, more focused, and — I’m not joking at all — live longer.

betterhumans.coach.me click the link to read the rest of the story.

What was the most helpful recommendation, you found in this article?

Join the conversation on our Facebook Page!

SplitSpectre – new Spectre-like CPU attack discovered

A SplitSpectre attack is far easier to execute than an original Spectre attack. Researchers explain:

Although Spectre v1 is powerful and does not rely on SMT (Simultaneous Multithreading), it requires […] a gadget to be present in the victim’s attack surface. Google Project Zero writes in their original blog post on Spectre v1 [46] that they could not identify such a vulnerable code pattern in the kernel, and instead relied on eBPF (extended Berkeley Packet Filter) to place one there themselves.  In this point lies the strength of our new Spectre v1 variant, SplitSpectre. As its name implies, it splits the Spectre v1gadget into two parts Researchers say the second half of this improved exploitation scenario can be run within the attacker’s own malicious code, instead of the target’s kernel, simplifying the exploitation procedure.

ZDnet.com  click the link to read the rest of the story.

How are you protecting your computers from this attack?Join the conversation on our Facebook Page!

How to drastically simplify your workflow and get more done

“Life is simple,” wrote Confucius, “but we insist on making it complicated.”

Good advice … and timely.

In fact, Retired Navy SEAL officer and “Extreme Ownership” co-author Jocko Willink recently identified simplicity as the key to not just to effective leadership, but success itself.

The trouble is that we’re terrible at simplicity.

BusinessInsider.com  click the link to read the rest of the story.

How could you simplify your work day?Join the conversation on our Facebook Page!

Cybercrime and cyberwar: A spotter’s guide to the groups that are out to get you

The bulk of cybercrime is carried out by the equivalent of real-world opportunist thieves. These are the petty criminals of the online world, the crooks you’re most likely to come across, or at least feel the impact of, as an individual.

ZDnet.com  click the link to read the rest of the story.

Which type of hacker has caused you the most damage?Join the conversation on our Facebook Page!

A Cybersecurity Moonshot – Inside Chronicle & Alphabet and Project Lantern

Fifteen years ago, cybersecurity could be boiled down to a simple strategy: Secure the perimeter. [Today]…

Many businesses use 10, 20 or 30 different security products to protect their systems. They all have advantages, and security practitioners will use different combinations to investigate a potential threat. If a team has access to 15 tools, for instance, one engineer might think to use three of them while another tries a completely different subset. There isn’t enough time to try them all, so experts pick products based on their experience and what they believe will be best suited to the task.

It’s a messy problem that doesn’t have a simple answer.

Engadget.com  click the link to read the rest of the story.

How many layers of cyber security does your business have?Join the conversation on our Facebook Page!

New online service will hack printers to spew out spam

A new service has spawned over the weekend advertising the same type of functionality, but for everyone.

Going under the generic term of “Printer Advertising,” this new service claims it can hack printers all over the world to print out messages on demand, similar to the PewDiePie promo hack that took place over the weekend.

“We have the ability to reach every single printer in the world,” claims a website launched on Sunday. “Reservations are limited.”

ZDnet.com  click the link to read the rest of the story.

Have you been hit yet?Join the conversation on our Facebook Page!

5 Self-evident Pieces of Advice From Top Achievers

There is so much wisdom out there and so few putting it into practice. “That’s not for me”, “It doesn’t fit my context”… are familiar alibis. Reality is, wisdom shake us. If we had to accept it, we’ll have to act on it; generating a very uncomfortable domino effect…

Medium.com  click the link to read the rest of the story.

What is the best advice you have heard?Join the conversation on our Facebook Page!

Data Breaches Keep Happening. So Why Don’t You Do Something?

Experts caution that the stream of news about such breaches can set a new normal and instill a sense of fatalism — and complacency — in consumers.

Anthony Vance, an associate professor and director of the Center for Cybersecurity at the Fox School of Business at Temple University, said last year’s breach of information held by the credit reporting company Equifax, which affected 145 million Americans, was “a game-changer.”

The information gleaned could be used to fraudulently open new credit accounts, he said, adding, “That should give even the most jaded American consumer pause and prompt them to do something.”

But evidence suggests that high-profile breaches don’t typically change consumers’ behavior.

NYTimes.com  click the link to read the rest of the story.

What should we do?Join the conversation on our Facebook Page!

How Do Customers View Businesses After a Data Breach?

Nothing can be quite as devastating to a business’s customer base than a data breach.

How do customers perceive businesses after a data breach? What was once a highly-trusted, well-regarded company could be quickly downgraded to an untrustworthy, irresponsible company after a data breach.

RevisionLegal.com  click the link to read the rest of the story.

If you have been breached, what did it cost your firm?Join the conversation on our Facebook Page!

What will follow the Bitcoin Bubble?

The paradox about Bitcoin is that it may well turn out to be a genuinely revolutionary breakthrough and at the same time a colossal failure as a currency. As I write, Bitcoin has increased in value by nearly 100,000 percent over the past five years, making a fortune for its early investors but also branding it as a spectacularly unstable payment mechanism. The process for creating new Bitcoins has also turned out to be a staggering energy drain.

NYTimes.com  click the link to read the rest of the story.

Have you purchased Bitcoins?Join the conversation on our Facebook Page!

The Essential 2018 Internet Trends Report

Legendary venture capitalist Mary Meeker  has just released the 2018 version of her famous Internet Trends report. It covers everything from mobile to commerce to the competition between tech giants. Check out the full report below, and we’ll add some highlights soon. Then come back for our slide-by-slide analysis of the 20 most important parts of the 294 page report.

TechCrunch.com  click the link to read the rest of the story.

What was most surprising to you in her report?Join the conversation on our Facebook Page!

19 Daily Habits That Make You Less Productive (And What to Do)

What follows are 19 daily unproductive habits, and solutions to replace them with productive habits.

These are prioritized from the most distracting things that constantly put people in a reactive versus proactive state, to more granular things that can supersize and sustain productivity.

SearchEngineJournal.com  click the link to read the rest of the story.

What habit did you choose that made the biggest difference in your life?Join the conversation on our Facebook Page!

Amazon Web Services Reinvented the Internet into a Cash Cow

In the summer of 2003, there was an off-site meeting at Jeff Bezos’s house. We were doing this exercise, looking at what we thought our core competencies were as a company. We started off with fairly obvious things, like we were good at having a lot of selection in retail, and we were good at fulfilling that selection.

But when we looked into it more deeply, we realized that in building Amazon’s consumer business as fast as we had in the first eight years, we’d gotten really good at operating infrastructure services, things like computing and storage and database. And because our retail business was a very low-margin business…

NYmag.com  click the link to read the rest of the story.

Will we all work for Amazon in the future?Join the conversation on our Facebook Page!

Platforms Are Making You Vulnerable

It’s been over a week since Facebook announced that, thanks to a coding vulnerability, access tokens for at least 50 million* accounts were stolen. Access tokens are important. As Facebook explained in its blog detailing the hack, they are “the equivalent of digital keys that keep people logged in to Facebook so they don’t need to re-enter their password every time they use the app.”

The hack also impacted Facebook’s Single Sign-On, which lets people use one account to log into other sites, meaning the impact of the breach is perhaps wider than even Facebook initially reported. Still, at the moment, there’s no way to know how big of a problem it is, or will be. Nor do we know who did it. We’re in the dark for one simple reason: Facebook has said next to nothing about what it knows — or if it knows much at all.  Ad-driven platforms tend to succeed thanks to one thing: our vulnerability.

Medium.com  click the link to read the rest of the story.

Does your vulnerability, concern you?Join the conversation on our Facebook Page!

Cybersecurity Is About Much More Than Hacking

There is growing concern among professionals that cybersecurity firms are seriously understaffed, and there aren’t nearly enough of them to combat the growing number of cyberattacks. Making matters worse, the continued drive toward accelerated training programs for software developers means that more developers are deploying code who have not had any formal security training.

Medium.com  click the link to read the rest of the story.

Are you ready for the new security challenges?Join the conversation on our Facebook Page!

How to Shop Online Like a Security Pro

So here’s a quick refresher course on how to make it through the next few weeks without getting snookered online.

Adopting a shopping strategy of simply buying from the online merchant with the lowest advertised prices can be a bit like playing Russian Roulette with your wallet, for the simple reason that there are tons of completely fake e-commerce sites out there looking to separate the unwary from their credit card details.

krebsonsecurity.com  click the link to read the rest of the story.

Have you planted your flag, yet?Join the conversation on our Facebook Page!

The Ultimate Guide to Facebook Ad Campaign Objectives 2018/2019

Are your Facebook ads hitting your targets?  In this ultimate guide to Facebook ad campaign objectives, we analyse EVERY objective with examples, tips, tricks and a whole heap of avoidable mistakes…

einsteinmarketer.com  click the link to read the rest of the story.

Are you planning on a Facebook Campaign next year?Join the conversation on our Facebook Page!

AWS new RoboMaker – you build intelligent robotics apps

Amazon Web Services is rolling out a new cloud service designed to help developers build, test and deploy intelligent robotics applications. The cloud juggernaut said the new AWS RoboMaker service works on top of the open-source robotics middleware Robot Operating System, and extends the framework with connectivity to AWS services for machine learning, monitoring, and analytics.

zdnet.com  click the link to read the rest of the story.

What will Amazon not control, in the near future?Join the conversation on our Facebook Page!

Why Cyber Monday is just the beginning of the festive hacking season

Attackers will always attempt to go for the low-hanging fruit by targeting individual consumers for a quick payday by clearing out their bank accounts or by selling fake or non-existent goods, but more organised hacking groups will also use the holiday period in an attempt to win bigger scores.

zdnet.com  click the link to read the rest of the story.

How many attacks have you avoided so far, this season?Join the conversation on our Facebook Page!

Why AWS re:Invent is arguably more important than Amazon’s Black Friday

Yes, everyone shopped their wallets dry on Amazon during the big holiday sales push. But don’t forget that the AWS public cloud side of Amazon is likely to drive valuation and operating income going forward.

zdnet.com  click the link to read the rest of the story.

Are you using AWS, yet?Join the conversation on our Facebook Page!

Stand out on LinkedIn – 18 Research based Tips

The starting point for deriving value from LinkedIn is creating a profile that not only shows off your experience and talents, but also makes it easier for people to discover you in search. Here we’ll present you with research-backed LinkedIn profile tips that will help you optimize your LinkedIn presence.

First Pro Tip: If you don’t want your existing connections to get multiple updates announcing your profile changes, temporarily turn off profile change notifications. Click the Me dropdown, choose Settings & Privacy, open the Privacy tab, scroll down to Sharing profile edits, and toggle the setting to No. You can turn these back on when you’re finished updating your profile if you want your connections to see future updates (e.g., new job announcements).

Zapier.com  click the link to read the rest of the story.


Are you using LinkedIn to help build your business?
Join the conversation on our Facebook Page!

Why do we ignore up to 90% of computer security alerts?

If your focus is elsewhere when an important security warning pops up, there’s a good chance (up to 90%) it will be dismissed and completely ignored.  For instance, if a security alert appeared while a user was closing a web page, 74% would dismiss the warning dialog. … Interestingly, the researchers found that users were less likely to ignore/dismiss security warnings if they were timed to appear between primary tasks, rather than interrupting what the user was trying to do.

TripWire.com  click the link to read the rest of the story.

Do you ignore alerts?Join the conversation on our Facebook Page!