How To Conquer Your Overwhelming Email Inbox

Part of the problem is that we were never given any training on email. We were just given an email address and no operating instructions. Can you imagine the result of giving people the keys to a car, without telling them how it works or how to drive responsibly? We’d all end up driving on the wrong side of the road and honking at green lights.

That’s what we are doing with email.

Medium.com click the link to read the rest of the story.

How many emails are in your inbox?Join the conversation on our Facebook Page!

Hackers peddle thousands of air miles on the Dark Web for pocket money

Air miles are easily available online which are issued by airlines including Delta, British Airways, Emirates, and Alaska Air, among others.  After investigating Dark Web marketplaces including Dream Market, Olympus, and the Berlusconi Market, Bischoff found that sellers are flogging hundreds of thousands of frequent flier points.

ZDnet.com click the link to read the rest of the story.

Have you checked to see if your rewards are on the darkweb?Join the conversation on our Facebook Page!

8 Smart Ways To Maintain Your Digital Privacy

Regardless of how you use the internet, it’s nearly guaranteed that you are being tracked in some way. Natalie Triedman recently shared how people, often unknowingly, are sharing their location. We aren’t saying that you should freak out and stop using the internet, but it’s a good idea to be smart about your browsing.

Follow these tips to start protecting your information online. We’ve included some quick steps that everyone can do, as well as some more difficult and advanced methods for keeping your web data secure.

Hackernoon.com click the link to read the rest of the story.

Are you concerned about your browser tracking you?Join the conversation on our Facebook Page!

This new tech makes it harder for ISPs to spy on you

With the exception–perhaps–of your therapist or significant other, no one has more power to learn your secrets than your internet service provider. An ISP can see every website that you choose to access. …But new tech fixes are plugging the privacy holes that the government won’t.

fastcompany.com click the link to read the rest of the story.

Are you concerned about your ISP tracking you?Join the conversation on our Facebook Page!

 

This powerful off-the-shelf phone-hacking tool is spreading

Researchers at internet watchdog Citizen Lab have found that a sophisticated piece of spyware designed to break into most commercially available smartphones is now in use in 45 countries. Pegasus, designed by Israeli security firm NSO Group, has been pitched as a so-called “lawful intercept” tool for governments with highly questionable human rights records like Bahrain, United Arab Emirates, and Saudi Arabia.

fastcompany.com click the link to read the rest of the story.

Are you concerned about someone hacking your phone?Join the conversation on our Facebook Page!

Cyber security: Your boss doesn’t care and that’s not OK anymore

So why do the upper echelons of many organisations still not understand the risks they face or know what they should be doing to counter them?

One issue is that within many organisations, cyber security is still viewed as an issue for the IT department, rather than the business as a whole.

ZDnet.com click the link to read the rest of the story.

Can you answer the questions above?Join the conversation on our Facebook Page!

Want to Lead? Learn to Ask the Right Questions

Have you ever walked away from a sales meeting wondering what you could have said differently to a potential client? Or do you feel as though you’re only wasting your breath trying to convince your employees to believe in a new initiative or direction? Are you tired of telling your children to clean up their rooms? Convincing others can’t come from you—it has to come from them. How does this happen? Learn to ask the right questions.

BigThink.com click the link to read the rest of the story.

What questions lead you to where you are?Join the conversation on our Facebook Page!

Need More Hours Every Day to Grow Your Business? Then Quit These 7 Time Wasters

Successful founders know how to manage their time well. They make room for work and play, limiting their stress levels by staying focused on the things that matter. When they run into unexpected obstacles, they don’t need to rearrange their lives to tackle the problem.

Entrepreneur.com click the link to read the rest of the story.

What can you cut out of your day?Join the conversation on our Facebook Page!

Small business servers: Why and how you can say ‘no’ to the cloud

Even in this cloud-centric world, there remain good reasons to own and run a physical server out of your office (or even home). Which server? That depends entirely on what you’ll be using it for.

ZDnet.com click the link to read the rest of the story.

Are you moving to an all cloud network?Join the conversation on our Facebook Page!

5G is almost here — here’s how everyone’s getting ready

5G is coming, and it’s going to have a massive impact on almost every facet of how we use technology, with faster speeds and lower latency theoretically opening up huge new frontiers in everything from smartphones to self-driving cars.  But the future of mobile networks isn’t here yet.

TheVerge.com click the link to read the rest of the story.

Are you waiting for 5G?Join the conversation on our Facebook Page!

No, that “Google Business Manager” isn’t actually Google Calling

Taken verbatim from Google’s own Safety Center “Google does not make unsolicited sales calls from an automated system. However, we may place automated phone calls to your business, as a service to Google users, for non-sales tasks like making reservations or confirming your business hours. These calls are only enabled for businesses that offer public phone numbers for the purpose of receiving calls from the general public, and use the automated voice-calling service Duplex.”

Lemacksmedia.com click the link to read the rest of the story.

Has someone from “Google” called you?Join the conversation on our Facebook Page!

The 10 Best Note Taking Apps in 2018

Note taking apps can store your notes in the cloud and sync them across multiple devices. As long as you have the internet, you have your notes. Second, note taking apps have search functionality. In a matter of seconds, you can find whatever notes you need, even if they are years old. Third, the best note taking apps let you snap pictures and save them as notes, upload files, record audio, and clip pages from the web. I’ve never seen a paper notebook that lets you dictate notes using your voice, either.

Zapier.com click the link to read the rest of the story.

Do you use one of these apps?Join the conversation on our Facebook Page!

The WannaCry virus was just the beginning

WannaCry swept around the globe in what may have been the most extensive cyber attack in history. The ransomware, which gets its name from how it held a user’s data hostage, affected at least 200 000 computers in more than 150 countries, disrupting the operations of FedEx, Renault-Nissan, Russia’s interior ministry, Chinese universities, and the UK’s National Health Service (NHS).

Medium.com click the link to read the rest of the story.

Are you prepared?
Join the conversation on our Facebook Page!

The Decision Matrix: How to Prioritize What Matters

Not all decisions need the same process. Sometimes, trying to impose the same process on all decisions leads to difficulty identifying which ones are most important, bogging us down and stressing us out.

FSblog.com click the link to read the rest of the story.

Do you spend too  much time on the wrong decisions?Join the conversation on our Facebook Page!

The power of culture: how to hire and attract amazing people

Talented people want to work in organizations that make an impact. They want to change the world — even just a little. And there are many ways to become world class.

JotForm.com click the link to read the rest of the story.

Are you attracting the talent your company deserves?Join the conversation on our Facebook Page!

Why a Leading Venture Capitalist Is Betting on a Decentralized Internet

Today the internet is much more like Disneyland. If I’m building a restaurant in Disneyland and Disneyland thinks I’m making too much money, they may raise the rent or change the rules.  That’s what building on Facebook or Google and Apple is right now.

Medium.com click the link to read the rest of the story.

Would you prefer a decentralized internet?Join the conversation on our Facebook Page!

IN CYBERWAR, THERE ARE NO RULES

It won’t be cutting-edge cyberattacks that cause the much-feared cyber-Pearl Harbor in the United States or elsewhere. Instead, it will likely be mundane strikes against industrial control systems, transportation networks, and health care providers—because their infrastructure is out of date, poorly maintained, ill-understood, and often unpatchable. Worse will be the invisible manipulation of public opinion and election outcomes using digital tools such as targeted advertising and deep fakes—recordings and videos that can realistically be made via artificial intelligence to sound like any world leader.

ForeignPolicy.com click the link to read the rest of the story.

How secure is your business to cyber warfare?Join the conversation on our Facebook Page!

Everything in your home is about to get smart. Here’s what to watch out for.

Smart devices can improve daily life by being aware of what you’re doing, so they can predict what you want them to do. For example, smart lights can learn when it’s bedtime and use that information to only use low brightness after that if you wander to the bathroom.   That convenience comes at a price, however: IoT devices generally require an internet connection to function, and harvest your information in return for helping improve your day.

ThinkGrowth.org click the link to read the rest of the story.

Are you using iot devices in your home?Join the conversation on our Facebook Page!

Chrome vs Edge vs Firefox: Is Microsoft’s browser really faster?

To what extent should you believe Microsoft’s claims that its Edge browser is both “safer” and “faster” than the competition?  TechRepublic put recent versions of Chrome, Edge and Firefox browsers to the test.

TechRepublic.com click the link to read the rest of the story.

Which browser do you use?Join the conversation on our Facebook Page!

Online security 101: Tips for protecting your privacy from hackers and spies

People often don’t think about their rights until they need them — whether it’s when they’re arrested at a protest or pulled over for a routine traffic stop.


Zdnet.com click the link to read the rest of the story.

Do you still care about your privacy?Join the conversation on our Facebook Page!

Ultimate guide to finding and killing spyware and stalkerware on your smartphone

This guide will run through what spyware is, what the warning signs of infection are, and how to remove such pestilence from your mobile devices.

Zdnet.com click the link to read the rest of the story.

Have you removed stalkerware?Join the conversation on our Facebook Page!

4 Reasons It’s Time to Outsource Your Finance Department

Most people don’t become entrepreneurs because they like accounting, but you don’t want to be one of the many failings to accurately keep track of numbers. An experienced outsider with knowledge of your industry will be able to identify areas of your business model that are ripe for improvement. According to a 2016 survey by Deloitte, more than a third of companies are planning to take advantage of this by outsourcing more of their financial activities.

Paro.io, a vetted network of CFOs and financial analysts, says that outsourced financial analysts “are willing to explain things to you and can discuss complex financial concepts and metrics in a way that makes sense to a non finance person. The models they’ve built provide you with insightful information about your business and help to frame and answer questions you have.”

Inc.com click the link to read the rest of the story.

Would you consider outsourcing your finance dept?Join the conversation on our Facebook Page!

8 Ways to Keep Spam and Promotional Emails from Filling Your Inbox

Most of us can’t last more than six minutes without a quick glance at our email or IMs. And unfortunately, these constant interruptions have a serious, negative impact on both our productivity and mental acuity. The simplest solution is to close your email app so you don’t get distracted by incoming mail notifications. But most of us just aren’t willing—or able—to do that.

There is another solution: Get fewer emails. Fewer emails means fewer notifications, and fewer notifications means fewer distractions throughout the day. And while you might not be able to ask your boss to stop emailing you, you can use the following eight tips to prevent spam, promotional emails, and other messages you don’t need from distracting you while you work.

Zapier.com click the link to read the rest of the story.

How do you deal with spam?Join the conversation on our Facebook Page!

Is It Really Possible to Use the Internet Privately?

According to USA Today, 75% of the world’s most popular websites have tracking code on their pages. I am not alone in my concern about maintaining some sort of privacy online.

Hackernoon.com click the link to read the rest of the story.

Are you concerned with about internet privacy?Join the conversation on our Facebook Page!

Using a truly private browser — Brave

One of the biggest leaks of privacy on your computer is your browser. Whether the leaks come from the website you browse to (tracking cookies, fingerprinting, etc), from the browser itself (diagnostic info, interest tracking, cloud-based history collection, etc), or from your ISP being able to observe everything you do.  Enter Brave, a browser specifically built from the ground up for privacy.

TheMedium.com click the link to read the rest of the story.

Are you concerned with your privacy?Join the conversation on our Facebook Page!

Beware: Hackers are trying to scam your company with this attack

Criminals use BEC attacks to gain access to a business email account and pretend to be the account owner to defraud the company and its employees, customers, or partners, the report noted. Scammers typically target employees with access to company finances or payroll data, and other personally identifiable information (PII).

TechRepublic.com click the link to read the rest of the story.

Has your firm had an BEC attack?Join the conversation on our Facebook Page!

How email can actually enhance your productivity

Email certainly isn’t perfect, but if you create reliable systems and take control of your inbox, it can actually enhance your productivity.
Before we get into the how, let’s talk about the why of email.

Jotform.com click the link to read the rest of the story.

What is your best email hack?Join the conversation on our Facebook Page!