How to prepare for the California Consumer Privacy Act (CCPA)

CCPA is important because it represents the first real, comprehensive privacy legislation in the U.S. And because the CCPA applies to all California residents, any company that works with data from California residents will be subject to it.  …

Geek-wire.com click the link to read the rest of the story. Our FREE Tools can help!

Are you ready for CCPA?

Join the conversation on our Facebook Page!

Here’s how you can still get a free Windows 10 upgrade

Microsoft’s much-hyped free upgrade offer for Windows 10 ended in 2016, right? Not exactly. The GWX tool may be gone, but all the other upgrade tools still work. The end result is an apparently valid digital license, and there’s no evidence that the free upgrades will end any time soon. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Ready to finally do this?

Join the conversation on our Facebook Page!

Brave browser reaches v1.0, its first stable version

Brave, a privacy-first browser, rolls out its first stable release, complete with innovative features such as its own private ad platform and a users and websites rewards initiative. …  Developed from the ground up to be a privacy-first alternative to modern-day browsers, Brave 1.0 comes with many features not present in any other competitor’s software. This includes: Brave blocks all ads by default, and instead uses its own private ad platform, designed to work right inside the browser, and with a focus on preserving users’ privacy. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you ready to try a new browser?

Join the conversation on our Facebook Page!

Microsoft to apply California’s privacy law for all US users

Microsoft‘s chief privacy officer promises to apply the CCPA to all US users, not just Californians. … The California Consumer Privacy Act, or CCPA, is currently set to go into effect on January 1, 2020. The upcoming law is considered one of the most restrictive privacy legislations in the world world. … Under the CCPA, companies must be transparent about the type of data they collect from users and how they use it. In addition, companies must also provide users with the option to prevent their personal information from being sold.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Will your business be compliant in time?

Join the conversation on our Facebook Page!

Google keeps a staggering amount of information about you. Here’s how to manage it

Google collects a staggering amount of information about you — maybe even more than you realize. Google remembers every search you perform and every YouTube video you watch. Whether you have an iPhone ($699 at Amazon) or Android phone, Google Maps logs everywhere you go, the route you take to get there, when you arrive and what time you leave — even if you never open the app. When you really take a look at everything Google knows about you, the results can be shocking — maybe even a little frightening. Thankfully, there are a few things you can do about it. …

Cnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have you reviewed your Google data, yet?

Join the conversation on our Facebook Page!

Your WordPress site is at risk: These precautions and plugins can keep it secure

It’s an interesting paradox. WordPress powers 35 percent of all websites on the Internet, in part because it’s so flexible … But the paradox is that WordPress itself, along with the add-on plugins and themes. is open source. WordPress core, plugin, and theme development is done by a community of companies, professionals, and individual enthusiasts, each with varying degrees of software development and deployment skills. Each WordPress site is the sum of all those components

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How confident are you that your website is safe?

Join the conversation on our Facebook Page!

How can you drive more business with digital and social marketing?

Digital and social marketing requires time, attention, and commitment. It requires a long-term content strategy in alignment with your business goals and involves daily posts and interactions with your audience. It also requires monitoring and engagement to ensure a two-way dialog with your intended audience. It is not a magic button by any means. However, it is a relatively inexpensive, direct communication channel to reach your target audience. …

LinkedIn.com click the link to read the rest of the story. Our FREE Tools can help!

Do you do digital marketing?  What has worked best for you?

Join the conversation on our Facebook Page!

Tech Giants Have Hijacked the Web. It’s Time for a Reboot.

While Washington looks to combat online monopolies, some innovators are developing new internet platforms to prevent monopolies from forming in the future… While lawmakers try to combat the concerns by talking about antitrust and regulation, a cottage industry of true decentralizers is emerging in the computer space. They want to recapture the original promise of the web, to create a platform where information isn’t siloed by private companies or monitored by police states.

WSJ.com click the link to read the rest of the story. Our FREE Tools can help!

Do you think these startup technologies have a real chance to change things?

Join the conversation on our Facebook Page!

Gartner’s top 10 strategic predictions for 2020

Mobile-accessible cryptocurrency, AI and ML oversight, blockchain to counter deepfake technology and an Internet of Behavior are all among the predictions for the near future.

Prediction 1: By 2023, the number of people with disabilities employed will triple due to AI and emerging technologies, reducing barriers to access. 

Prediction 2: By 2024, AI identification of emotions will influence more than half of online advertisements. …

TechRepublic.com click the link to read the rest of the story. Our FREE Tools can help!

Do you see opportunities for your business?

Join the conversation on our Facebook Page!

How to stop getting distracted

Ever find yourself at work, desperate to finish an important project, but seemingly getting nowhere? Nir Eyal used to experience that a lot. Then he started to look at the science behind distraction and what you can do to stop it. In this episode, Nir explains how to stop getting distracted, why open plan offices don’t work and how Slack created a distraction free workplace.

anchor.fm  click the link to read the rest of the story. Our FREE Tools can help!

How do you cope with tech distractions?

Join the conversation on our Facebook Page!

Firefox New Privacy Protections Lets You Track the Trackers

Firefox is taking the guesswork out of how to give yourself more privacy online providing always-on features like blocking third-party tracking cookies and cryptominers also known as Enhanced Tracking Protection.

Mozilla.org click the link to read the rest of the story. Our FREE Tools can help!

Will you use their new privacy features?

Join the conversation on our Facebook Page!

Do businesses really know how much their data is worth?

DocAuthority‘s new report states that IT security departments are incorrectly estimating the value of business information they have in their possession. This leads to poor investment into the availability, protection and security of the data that is commercially most valuable.  … the poll uncovered that the majority was undervalued, including research and development, as well as financial reports. On the other hand, personally identifiable data (PII), which was less sensitive, was highly prioritised.

itproportal.com click the link to read the rest of the story. Our FREE Tools can help!

Do you know the value of your data?

Join the conversation on our Facebook Page!

New ‘unremovable’ xHelper malware has infected 45,000 Android devices

Over the past few months, many users have complained about xHelper’s near “unremovable” state… While the trojan is currently engaging in spam and ad revenue, it also possesses other, more dangerous features. xHelper can download and install other apps, a function that the xHelper could at any point to deploy second-stage malware payloads, such as ransomware, banking trojans, DDoS bots, or password stealers.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you safe using an Android phone?

Join the conversation on our Facebook Page!

New IoT botnet army targeting small office and home routers

Tens of thousands of Wi-Fi routers are potentially vulnerable to an updated form of malware that takes advantage of known vulnerabilities to rope these devices into a botnet for the purposes of selling distributed denial of service (DDoS) attack capabilities to cyber criminals.  A new variant of Gafgyt malware – which first emerged in 2014 – targets small office and home routers from well-known brands

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you using one of these routers?

Join the conversation on our Facebook Page!

This easy-to-use information-stealing trojan malware is quickly gaining popularity among cyber criminals

Racoon Stealer isn’t sophisticated, but it has stolen credit card information, passwords and more from hundreds of thousands of victims, and an aggressive marketing campaign means its popularity is still growing, security researchers warn.  A new kind of easy to use trojan malware is gaining popularity among cyber criminals, providing them with simple means of stealing credit card data, passwords and cryptocurrency — and it has already infected hundreds of thousands of Windows users around the world.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have any of your associate’s been hit, yet??

Join the conversation on our Facebook Page!

The watchdogs who track secret online censorship

Online censorship isn’t limited to blocked websites. Social media sites also filter content from news feeds and chats. In China, social media companies are liable to the government for the content that appears on their platforms and have signed a pledge to monitor their services for politically objectionable content, according to Human Rights Watch, an NGO. This leads to a system that strictly limits discussion of political topics.  Companies filter from users’ chats and news feeds any images that could violate the government’s standards. The standards aren’t always transparent to users…

Cnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you concerned about others filtering out content you want?

Join the conversation on our Facebook Page!

 

How to replace each Google service with a more privacy-friendly alternative

As privacy concerns grow, companies like Google and Facebook that rely on data collection and advertising for revenue are increasingly in the spotlight. But is it really possible to give up Google’s vast range of services? Here are recommended alternatives.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have you given up on protecting your privacy?

Join the conversation on our Facebook Page!

Google quantum computer leaves supercomputers in the dust

The era of practical quantum computers has begun … “Our machine performed the target computation in 200 seconds, and from measurements in our experiment we determined that it would take the world’s fastest supercomputer 10,000 years to produce a similar output,” Google researchers said in a blog post about the work. …

Cnet.com click the link to read the rest of the story. Our FREE Tools can help!

What business opportunities will this mean for you?

Join the conversation on our Facebook Page!

The Keys To A Digital Disaster Recovery Plan For Business Leaders

As a small business owner, I found out that I was the perfect target for cybercriminals when I read certified IT professional Darren Coleman’s book, Easy Prey: How to Protect Your Business from Data Breach, Cybercrime, & Employee Fraud. It inspired me to arm myself with some common sense and the realization that I am responsible for my viral life just as I am for my real life. …

Forbes.com click the link to read the rest of the story. Our FREE Tools can help!

How do you keep informed of the threats to your business?Join the conversation on our Facebook Page!

Alexa and Google Home still being used to eavesdrop on users

Amazon, Google fail to address security loopholes in Alexa and Home devices more than a year after first reports. … Neither Amazon nor Google have responded to requests for comment…

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you still willing to use these devices?

Join the conversation on our Facebook Page!

‘Stop the email ping-pong’​: 9 ways to avoid digital distraction

Constantly checking your phone? Sidetracked by apps? Use these tips to change bad tech habits to good … such as: Stop notifications… Slow down the email ping-pong … Never open an email more than twice…

TheGuardian.com click the link to read the rest of the story. Our FREE Tools can help!

What good tech habits are you using?

Join the conversation on our Facebook Page!

WAV audio files are now being used to hide malicious code

Two reports published in the last few months show that malware operators are experimenting with using WAV audio files to hide malicious code. …  All previous instances where malware used steganography revolved around using image file formats, such as PNG or JPG.  The novelty in the two recently-published reports is the use of WAV audio files, not seen abused in malware operations until this year. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How are you keeping up with all the latest threats?

Join the conversation on our Facebook Page!

What to Do When You Don’t Know What to Do

Early in my career… I felt overwhelmed. … I went to a wise, older colleague and poured out my soul. He listened patiently and then said something I will never forget: “Mike, just do the next right thing.”  “That’s it?” I asked.  “Yep. That’s it,” he replied. “You’re overthinking it. Just do the next right thing. It will be okay.”  … Here are three steps I follow to put it into practice…

Michaelhyatt.com click the link to read the rest of the story. Our FREE Tools can help!

What was the best business advice you ever received?Join the conversation on our Facebook Page!

FBI Warning: Multi-Factor Authentication Is Being Defeated

The FBI has now warned that it “has observed cyber actors circumventing multi-factor authentication through common social engineering and technical attacks.” … But according to the FBI, this use of secondary tokens or one-time codes to back-up usernames and passwords still isn’t enough. Unless companies employ “biometrics or behavioral information—such as time of day, geolocation, or IP address,” there is a risk that an attack can either trick a user into disclosing a multi-factor authentication code or use technical interception to create one for themselves. …

Forbes.com click the link to read the rest of the story. Our FREE Tools can help!

What additional security measures do you use?Join the conversation on our Facebook Page!

America’s First Privacy Law Is Here: What it Means for Business and You

The new rules will have significant effects on U.S. business and on privacy norms. There remains, however, considerable confusion over how the law will be enforced, and how much of a burden it will be to U.S. companies. What follows is a plain English explanation of the law, the politics surrounding it, and how it will affect businesses and consumers. What is CCPA and why is it such a big deal?

Fortune.com click the link to read the rest of the story. Our FREE Tools can help!

How will this new affect you?Join the conversation on our Facebook Page!

How The U.S. Hacked ISIS

In August 2015, the NSA and U.S. Cyber Command, the military’s main cyber arm, were at a crossroads about how to respond to a new terrorist group that had burst on the scene with unrivaled ferocity and violence. The one thing on which everyone seemed to agree is that ISIS had found a way to do something other terrorist organizations had not: It had turned the Web into a weapon. ISIS routinely used encrypted apps, social media and splashy online magazines and videos to spread its message, find recruits and launch attacks.  A response to ISIS required a new kind of warfare

NPR.org click the link to read the rest of the story. Our FREE Tools can help!

What surprise you the most about this history?Join the conversation on our Facebook Page!

Ransomware gang uses iTunes zero-day

After discovering evidence of the zero-day, Morphisec reported the issue to Apple, and the OS maker patched it this month. But Michael Gorelik, CTO at MorphiSec, says things aren’t that simple as updating the two Apple apps. Users who used these two apps in the past are also vulnerable.  … Sysadmins must scan workstations for the Bonjour component and remove it by hand, or install the latest iTunes

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have you patched this?

Join the conversation on our Facebook Page!

California’s new privacy law gets teeth with proposed regulations

California proposed regulations on Thursday to dictate how the state will enforce its tough, new privacy law. The law, known as the California Consumer Privacy Act, gives consumers more control over how companies collect and manage their personal data. It goes into effect on Jan. 1.  The CCPA, seen as establishing the most stringent data privacy protections in the nation, allows people to request that data be deleted and gives them the opportunity to opt out of having their information sold to a third party. …

Cnet.com click the link to read the rest of the story. Our FREE Tools can help!

How will this affect your business?

Join the conversation on our Facebook Page!