Work from home: Essential gadgets and gear for productivity

One thing that I’ve learned to do is to make technology work for me, and with that in mind, here’s a list of what I believe to be essential gadgets and gear if you find yourself working from home because of the coronavirus outbreak.

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

What devices have helped you the most, working from home?Join the conversation on our Facebook Page!

The Dos and Don’ts of Online Video Meetings

In the age of coronavirus, many of us have transformed overnight from office workers into telecommuters. And we are increasingly relying on videoconferencing apps like Zoom and FaceTime to correspond with our peers.  But inevitably, with our homes and workplaces merging into one, the boundaries between our personal and professional lives are beginning to erode — and awkward situations have ensued. …

NewYorkTimes .com click the link to read the rest of the story.  Get our free tools here.

What other do’s and don’t are there?Join the conversation on our Facebook Page!

New Study Finds: Working from Home Makes Workers More Productive

People no longer want to deal with the frustrations of driving to and from work: In fact, new research shows that one in four employees has quit a job because of a long commute. Many job seekers now rely on the flexibility of remote work to avoid these inconveniences. The real question: How do virtual and in-office workspaces differ?

Inc.com click the link to read the rest of the story.  Get our free tools here.

Are you more productive at home?Join the conversation on our Facebook Page! 

Routers hacked to point you to coronavirus-themed malware

For almost a week, a group of hackers has been breaking into people’s routers and changing DNS settings in order to point unsuspecting device users to coronavirus-related sites pushing malware. …

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

How do you protect your home from these threats?Join the conversation on our Facebook Page!

Half of firms have spotted a cyberattack – and here is the most common one you will face

Almost half of businesses have experienced a cyberattack or data breach in the past year – and almost all of the organisations that know they’ve been on the receiving end of attacks have reported being targeted by phishing and other fraudulent emails

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

How do you stop phishing attacks?Join the conversation on our Facebook Page!

How to Be Productive Working from Home (and anywhere else)

As coronavirus continues to spread, many of us are forced to work remotely to help reducing contagion. At first, working from home sounds like the dream: pajamas all day, working from the couch, slacking off… But it can quickly get unproductive if you are not indistractable enough. …

Medium.com click the link to read the rest of the story.  Get our free tools here.

How do you keep from distraction?Join the conversation on our Facebook Page!

‘Unfixable’ hole in Intel ROM exposes all but latest chips to attack

Security researchers have discovered a hole in Intel’s read-only memory that it believes cannot be fixed and leaves all but Intel’s latest 10th-generation devices exposed. The discovery, announced Thursday by security firm Positive Technologies…

Cnet.com click the link to read the rest of the story.  Get our free tools here.

How will your firm deal with this?Join the conversation on our Facebook Page!

Don’t Let Perfection Be the Enemy of Productivity

Productivity isn’t about getting more done. It’s about what you get done. Three aspects of perfectionism can interfere with your ability to prioritize the most important tasks.  1. You’re reluctant to designate decisions as “unimportant.”

HarvardBusinessReview.com   Click the link to read the rest of the story.  Get our free tools here.

How do you decide what is truly important?Join the conversation on our Facebook Page!

 

Password managers: A little pain for a lot better security

If you’re one of the countless people who unwisely use easy-to-guess passwords or reuse a password for several accounts, cybersecurity experts have a message for you: It isn’t your fault. Memorizing a unique, complex password for each account is impossible. … That’s why many cybersecurity experts suggest using a password manager.

Cnet.com click the link to read the rest of the story.  Get our free tools here.

Do you use a password manager? Join the conversation on our Facebook Page!

Microsoft case study: customer under attack by 6 hacker groups

Imagine discovering six threat actors all at the same time!  Recently, Microsoft’s Detection and Response Team (DART) was engaged by a large, multinational company that faced a sophisticated, state sponsored advanced persistent threat.

Microsoft.com click the link to read the rest of the story.  Get our free tools here.

How will you protect your business?Join the conversation on our Facebook Page!

Nasty phishing scams aim to exploit coronavirus fears

Cyber criminals are aiming to take advantage of fears over coronavirus as a means of conducting phishing attacks and spreading malware, along with stealing login credentials and credit card details.  Cybersecurity companies have identified a number of campaigns by hackers who are attempting to exploit concerns about the COVID-19 outbreak for their own criminal ends.

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Have you seen any of these attacks?Join the conversation on our Facebook Page!

2020’s Most common cyberattacks & how to defend against them

Protecting your business from cyberattacks is a never-ending challenge. But to make sure your security eggs are in the right baskets, here’s a look at the most common cyberattacks we’ll likely see this year and how to defend against them.

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Which has been a greater problem for your firm: phishing attacks or reansomware?Join the conversation on our Facebook Page!

People Who Achieve Their Goals Live By These 7 Habits

So, if this is something you’re looking to improve in yourself, here are 12 simple ways you can start practicing the art of self-discipline:  1. Don’t set a goal without knowing how you’re going to track its progress. …

Medium.com click the link to read the rest of the story.  Get our free tools here.

How important is discipline in your life?Join the conversation on our Facebook Page!

Ransomware victims are paying out millions a month. One has cost them the most

Over six-and-a-half years, ransomware victims have handed over vast amounts of bitcoin to crooks. Some variants of the malware have generated more ransom than others. …

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Has you company been hit with this?Join the conversation on our Facebook Page!

Coronavirus: Effective strategies and tools for remote work

Whether or not coronavirus becomes a full outbreak, the trend of working from afar is currently experiencing a major boost as businesses shift to digital channels and more people avoid physical gatherings. Here are key approaches and tools to get the most from remote work. …

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Do you have an emergency work remote from home plan?Join the conversation on our Facebook Page!

MIT’s 2020 – Top 10 Breakthrough Technologies

MIT’s  annual list of technological advances that they believe will make a real difference in solving important problems. They include: Unhackable internet, Hyper-personalized medicine, Digital money, Anti-aging drugs, AI-discovered molecules, Satellite mega-constellations, Quantum supremacy, Tiny AI, Differential privacy…

TechnologyReview.com click the link to read the rest of the story.  Get our free tools here.

How will these advances affect your business?Join the conversation on our Facebook Page!

“Shark Tank” star loses $388,700 in phishing scam

Barbara Corcoran of ABC’s “Shark Tank” has lost nearly $400,000 in a phishing scam this week. … “I lost the $388,700 as a result of a fake email chain sent to my company,” she told the magazine. “The scammer disappeared and I’m told that it’s a common practice, and I won’t be getting the money back.” …

CBS.com click the link to read the rest of the story.  Get our free tools here.

Is you team trained in how to spot these scams?Join the conversation on our Facebook Page!

Use This Simple Business Tool to Make Good Decisions Faster

It’s tempting with a long task list to spread yourself too thin. You can stay busy all day and still find you have not much progress to show for it by the end of the night. Now apply the 80/20 rule to your to-do list. …

Medium.com click the link to read the rest of the story.  Get our free tools here.

Will this help you make better decisions?Join the conversation on our Facebook Page!

ElectionGuard could be Microsoft’s most important product in 2020. If it works

ElectionGuard isn’t designed to make voting machines safe from hackers. It’s meant to make hacking them pointless. … With ElectionGuard, Microsoft isn’t setting out to create an unhackable vote — no one thinks that’s possible — but rather a vote in which hacks would be quickly noticed.

Cnet.com click the link to read the rest of the story.  Get our free tools here.

Do you think this will solve the problem?Join the conversation on our Facebook Page!

Iranian hackers planting backdoors in companies around the world

ClearSky research team has uncovered a widespread Iranian offensive campaign which we call “Fox Kitten Campaign”; this campaign is being conducted in the last three years against dozens of companies and organizations in Israel and around the world. Though the campaign, the attackers succeeded in gaining access and persistent foothold in the networks of numerous companies and organizations from the IT, Telecommunication, Oil and Gas, Aviation, Government, and Security sectors around the world. …

ClearSkySec.com click the link to read the rest of the story.  Get our free tools here.

How does your firm monitor such breaches?Join the conversation on our Facebook Page!

FBI: passphrases superior to complex passwords

The FBI says “Instead of using a short, complex password that is hard to remember, consider using a longer passphrase.”  “This involves combining multiple words into a long string of at least 15 characters,” it added. “The extra length of a passphrase makes it harder to crack while also making it easier for you to remember.” …

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Do you use pass Phrases?Join the conversation on our Facebook Page!

Women! Hackers are demanding nude photos to unlock files in a new ransomware attack

Ransomware typically encrypts files and demands payment in bitcoin or other cryptocurrencies, but security firm Emsisoft reported Wednesday that it had discovered a variant making another sort of demand: explicit photos. … In other cases, scammers on dating apps have requested nude photos from would-be suitors, then held them for ransom by threatening to leak the photos. …

FastCompany.com click the link to read the rest of the story.  Get our free tools here.

What would you do?Join the conversation on our Facebook Page!

Can’t Kick a Bad Habit? You’re Probably Doing It Wrong

I had just finished giving a speech on building habits when a woman in the audience exclaimed, “You teach how to create habits, but that’s not my problem. I’m fat!” The frustration in her voice echoed throughout the room. “My problem is stopping bad habits. That’s why I’m fat. Where does that leave me?” … The first step is to realize that starting a new routine is very different from breaking an existing habit. …

nirandfar.com click the link to read the rest of the story.  Get our free tools here.

What have you done to overcome bad habits?Join the conversation on our Facebook Page!

US Warns: Huawei Has ‘Back Door’ Access in Its Networks

Officials from the United States presented evidence to the United Kingdom and other allies that Huawei has the ability to secretly access information on mobile networks through “back doors” typically used by law enforcement agencies, leading to fears that the Chinese Communist Party (CCP) may use Huawei to spy on Western nations that allow access to the company. …

Breitbart.com click the link to read the rest of the story.  Get our free tools here.

Will you avoid Huawei networks?Join the conversation on our Facebook Page!

Official: Puerto Rico govt loses $2.6M in phishing scam

Puerto Rico’s government has lost more than $2.6 million after falling for an email phishing scam, according to a senior official. … Rivera said the government agency transferred the money on Jan. 17 after receiving an email that alleged a change to a banking account tied to remittance payments, according to a police statement. …

APnews.com click the link to read the rest of the story.  Get our free tools here.

How do you protect your office from these scams?Join the conversation on our Facebook Page!

 

Watch Out: This Verizon Smishing Scam Is Crazy Realistic

Text message scams are becoming more common, and the latest scam we’ve seen is the most sophisticated yet. The scammer impersonates Verizon, sending you an “account security” text message that takes you to a shockingly convincing copy of Verizon’s website.  We opened the link to see the scam in action. Don’t try this at home: If you receive a scam message, we recommend against opening any links attached to it. You should also delete the message and block the sender. …

HowToGeek.com click the link to read the rest of the story.  Get our free tools here.

Have you seen any text message scams?Join the conversation on our Facebook Page!

Leadership: Wars Are Not Won by Military Genius or Decisive Battles

Losers of most major wars in modern history lost because they overestimated operational dexterity and failed to overcome the enemy’s strategic depth and capacity for endurance. Winners absorbed defeat after defeat yet kept fighting, overcoming initial surprise, terrible setbacks and the dash and daring of command ‘genius’.

Aeon.co click the link to read the rest of the story.  Get our free tools here.

Have you given up on an opportunity too quickly?Join the conversation on our Facebook Page!

What Happens When You Stop Talking About Yourself in Conversations

The temptation to always talk about ourselves is a new tradition like Black Friday without the cheap sales. It’s hurting our conversations and over-inflating our egos. Experiment: I tried to go two days without talking about myself in every conversation to see what would happen. Would it make a difference? Would people notice? What would it do to relationships? This is what happens when you stop talking about yourself.

Medium.com click the link to read the rest of the story.  Get our free tools here.

Would you try this experiment? Join the conversation on our Facebook Page!

Macs saw almost double the number of malware threats than Windows PCs last year

Macs don’t get viruses,” or so the long-time saying goes. But according to Malwarebytes’ annual State of Malware report, that’s far from true. In fact, there was almost double the number of threats targeting Macs compared to Windows PCs in 2019.  The report states that Macs saw an average of 11 threats per endpoint in 2019, whereas Windows systems had an average of 5.8 threats—the first time Macs outpaced PCs when it comes to malware threats. …

TechSpot.com click the link to read the rest of the story.  Get our free tools here.

How do you protect your Mac’s?Join the conversation on our Facebook Page!

Popular internet scams to watch out for in 2020

The internet is filled with scammers looking to steal your private information. … You should also be able to spot threats on your own. To help, here are a few scams that are currently trending online.

BigThink.com click the link to read the rest of the story.  Get our free tools here.

How do you spot scams?Join the conversation on our Facebook Page!