8 Timeless Skills to Change your Life Forever – in Under 8 Hours

You can learn valuable soft and hard skills in about 15 to 20 hours of practice. And I’m talking about starting from nothing. I’ve learned 39 new skills in the past 13 months. But I’m not the only one who has experimented with that. My original inspiration came from Josh Kaufman’s TEDx talk, The First 20 Hours — How to Learn Anything.

Medium.com click the link to read the rest of the story.

What new skill could change your life?

Join the conversation on our Facebook Page!

Microsoft: We promise you’ll get better controls over your data

Microsoft on Tuesday announced that it will change how it collects data from devices when customers use its services, introducing the new ‘required’ and ‘optional’ categories for data collected, say, when enterprise customers use Office 365.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

What do you think about this change?

Join the conversation on our Facebook Page!

Microsoft: WinRAR exploit gives attackers ‘full control’ of your PC

When this attack was detected by Microsoft, it’s likely a large chunk of the world’s 500 million WinRAR users hadn’t updated… Israeli security firm Check Point revealed that a malicious ACE file could place malware anywhere on a Windows PC after being extracted by WinRAR. The social engineering used in the campaign was crafted to ensure full remote compromise of a machine

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Do you use Winrar?

Join the conversation on our Facebook Page!

Cloud database leaked private details of 80 million US families

The addresses and demographic details of more than 80 million US households were exposed on an unsecured database stored on the cloud, independent security researchers have found.  The details included names, ages and genders as well as income levels and marital status. …

Cnet.com click the link to read the rest of the story.

Is your cloud data secure?

Join the conversation on our Facebook Page!

80% Of Cybersecurity Threats Are Inside Your Business

Forget Russia, China And Iran, Most Threats Are Closer To Home

Three-quarters of incidents are still coming from within the business and its extended enterprise, far greater than the threat from external hackers. Businesses need to shift the focus inwards. …

Forbes.com click the link to read the rest of the story.

Have you been training your employees in cyber-security?

Join the conversation on our Facebook Page!

How Much Does a Website Cost in 2019?

Having built hundreds of websites we know from experience that sites generally fall into three broad categories — small business, corporate and eCommerce. Within these categories we allocate time and resources based on our understanding of the design and function required. As a general rule our small business websites fall between the $5,000 and $7,500 range while corporate websites are generally between $7,500 and $15,000. eCommerce sites are the most expensive option, ranging from $10,000 all the way through to $20,000+.

Medium.com click the link to read the rest of the story.

Is your website giving you the results you were seeking?

Join the conversation on our Facebook Page!

Major DDoS attacks increased 967% this year

Distributed Denial of Service (DDoS) attacks are increasing in size and frequency, as multi-vector exploits become more of the norm in hacker’s efforts to distract and confuse security teams, while damaging their businesses, according to a Wednesday report from Neustar.

TechRepublic.com click the link to read the rest of the story. Our FREE Tools can help!

Have you noticed the increase of attacks on your operation?

Join the conversation on our Facebook Page!

The Top 10 Lies We Believe About Our Influence

Avoiding These 10 Lies and Focusing on Real Influence

You might not be as influential as you think. Misconceptions about influence keep us from continued success. Anyone at any level, with any title, can influence others to act willingly upon what we have to say, but only if they are willing to do the work. Influence is a learned skill requiring self-awareness, feedback and ongoing practice. But why?

Thriveglobal.com click the link to read the rest of the story. Our FREE Tools can help!

Were these helpful?

Join the conversation on our Facebook Page!

A prisoner in my own company

In the first few years after founding AP Logic, I went from being a dreamer and a creative person who was proactive to being someone who was drowning in a box of requirements and “to-dos”. … I started to hate it. I slowed down. I focused on tasks even though I was bad at them.  How could I be trapped in my own business?

Jim Ratichek, LinkedIn.com click the link to read the rest of the story. Our FREE Tools can help!

How have you dealt with business growing pains?

Join the conversation on our Facebook Page!

The Importance of Working With “A”Players

We operate in a world where it’s nearly impossible to accomplish anything great as an individual.  When you think about it, you’re the product of an education system, a healthcare system, luck, roads, the internet and so much more. You may be smart but you’re not self-made. And at work, most important achievements require a team of people working together.

The leader’s job is to get the team right. Getting the team right means that people are better as a group than as individuals. Now this is important.  Step back and think about that for a second — the right teams make every individual better than they would be on their own.

Farnamstreet.com click the link to read the rest of the story. Our FREE Tools can help!

What has it cost you, when you try to save money on less expensive help?

Join the conversation on our Facebook Page!

New Ransomware Attacks Much More Expensive to Survive

The average ransom demand is up to almost $13,000, compared with $6,700 just a few months ago.

The average ransom demand by hacker to release files encrypted by their ransomware attack has almost doubled in 2019.  … The sharp increase in ransom payments is linked to the emergence of more expensive and more hands-on forms of ransomware… They’ll exploit vulnerabilities in remote desktop protocols or abuse stolen credentials to gain access to systems, moving around networks and laying the groundwork for their ransomware to encrypt as many PCs as possible for the maximum impact.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Has your company paid a ransom?

Join the conversation on our Facebook Page!

Top 5 risks innovation is forcing businesses to face

Complying with rapidly accelerating privacy regulations is the top emerging risk faced by organizations globally, even above the talent shortage, according to a Thursday report from Gartner. …”With the General Data Protection Regulation (GDPR) now in effect, executives realize that complying with privacy regulations is more complex and costly than first anticipated,” Matt Shinkman, …

“More budget dollars from IT, legal and information security are going to address GDPR compliance, just as the California Consumer Privacy Act (CCPA) is set to take effect, adding another layer of complexity for companies to navigate in this area.”

TechRepublic.com click the link to read the rest of the story. Our FREE Tools can help!

Is your company compliant with the new California Consumer Privacy Act?

Join the conversation on our Facebook Page!

The Age of Small Brands Eating Big Brands Is Here!

When the Internet started to become more popular and the Ecommerce boom happened, suddenly people had options. … And sometimes the little guy was creating a superior product; he just didn’t have the marketing budget to advertise to enough people. …

HuffingtonPost.com click the link to read the rest of the story. Our FREE Tools can help!

Are you pursuing a big brand?

Join the conversation on our Facebook Page!

Scammers Use Tax Related Emails To Make you Download Malware

The scammers have been delivering the Trickbot Trojan by pretending to send emails from well-known payroll and HR firms such as Paychex and ADP. The emails will contain an attachment that’ll secretly load the malware.

PCmag.com click the link to read the rest of the story. Our FREE Tools can help!

Did you receive these scam emails?

Join the conversation on our Facebook Page!

New Servers are Found and Under Attack – in under a minute

New report demonstrates how quickly hackers see and begin attacks — and the dangers of default login credentials.

It only takes a few seconds for cyber criminals try to hack into newly connected cloud devices and servers!

ZDnet reported that

Researchers at security company Sophos set up honeypots in ten of the most popular AWS data centre locations around the world …  and connected them to the internet with common configuration errors, such as using default credentials or insecure passwords).

It took just 52 seconds for hackers to begin attacking the first server and 20 minutes to start on the California server.

The servers were all on Amazon Web Services.

This is a clear demonstration that no-one is able to fly under the radar whilst online. The attackers are using scripts not to focus on any one individual, but to probe the entire internet address space to look for the low-hanging fruit,” said Boddy.

This scripted approach of attempting to login to your online device means that these attackers can attempt to login to a huge number of online devices in no time at all,” he added.

This illustrates why businesses must have security in place prior to it being given internet access, as well as why your business needs as many layers of security as possible.

References: 
ZDnet

Ingenious.News click the link to read the rest of the story. Our FREE Tools can help!

How safe are your servers?

Join the conversation on our Facebook Page!

Phishing Attacks Are Prevalent During March Madness

With popular sporting events like March Madness, it’s easy for attackers to prey on human emotions with excitement running high and money on the line. With so many employees participating in office pools and brackets, it’s critical to avoid getting phished through fake sporting-themed websites, contests and offers around the games, or malicious browser extensions that claim to keep track of scores and stats.

SecurityBoulevard.com click the link to read the rest of the story. Our FREE Tools can help!

Has your company been hit with this attack?

Join the conversation on our Facebook Page!

3 Easy But Highly Effective Ways To Keep Tabs On Your Business

One of the benefits of the digital age (and the direction it is moving) is the ease with which so many different platforms can easily be connected. Cyfe, for example, is a business dashboard that integrates with everything from Facebook, Google Analytics, Gmail, Shopify, QuickBooks, and EventBrite, to Stripe, Bitly, and dozens upon dozens of other platforms. Think Hootsuite, but for everything.

Medium.com click the link to read the rest of the story.

Do you plan to use any of these methods?

Join the conversation on our Facebook Page!

The Office of the Future — Brought to You by Microsoft

An interview with Microsoft’s director of office envisioning Anton Andrews…

Anton Andrews, wants to flip that equation by answering what he calls his core question: “How do you get people to lean in and do their best work together and collaborate?”

It’s a question that Microsoft has been asking itself for years.

Medium.com click the link to read the rest of the story.

What do you think of Microsoft’s vision of the future?

Join the conversation on our Facebook Page!

Ten Powerful Habits That Will Change Your Life and Career

Having success in life largely depends on the habits that you repeatedly engage in, which ultimately shape your life. …

Your habits will either make or break your existence as it directly affects your source of happiness and success. Some habits are more powerful than others and simply put; your everyday habits determine your attitude and future progress both in life and in your career. The following are ten powerful habits that will improve your life and career direction. …

Forbes.com click the link to read the rest of the story.

What habit has changed your life?
Join the conversation on our Facebook Page!

You Need Multiple Layers of Security

The findings in the Identity Theft Resource Center (ITRC)’s “2018 End-of-Year Data Breach Report” serve as a stark reminder of why companies should take a layered approach to security.

SecurityIntelligence.com click the link to read the rest of the story.

How many layers of security do you have?

Join the conversation on our Facebook Page!

A Few Simple Steps to Vastly Increase Your Privacy Online – update

The short answer is that a VPN is a great way to increase your privacy. The only problem is that you are still ultimately putting your trust in the VPN provider that they are not logging your browsing, that they won’t sell your data…

Thetoolsweneed.com click the link to read the rest of the story.

How concerned are you about privacy?

Join the conversation on our Facebook Page!

The downsides of buying a new Mac

The hefty price tag is only the beginning of the pain that comes as a result of buying a new Mac.  … The first problem is the hardware selection on offer.  When planning to buy a Windows-based PC, there’s almost no end of options from a wide array of OEMs. Want a certain kind of laptop with a specific screen size and battery life? Chances are good that, with a bit of internet sleuthing, you’ll find one that matches your needs.

When buying from Apple, that’s all different.

ZDnet.com click the link to read the rest of the story.

Are you thinking of buying a new Mac?
Join the conversation on our Facebook Page!

Cybersecurity is broken: Here’s how we start to fix it

We are building our future on a creaking digital foundation. It’s time for that to change. Cybersecurity is in a terrible state, possibly the worst it’s ever been. Literally not a day goes by without another report of a security breach or a data spill or a hack spilling corporate secrets.

This to me is the way to turn the tide. First, we need to value our own personal data more. …

ZDnet.com click the link to read the rest of the story.

What do you think we should do?
Join the conversation on our Facebook Page!

Even if your data is stored in the cloud, you need to back it up

Relying on your cloud service provider to provide fault-tolerant data storage does not account for the potential of data loss through user error, malicious destruction of data, or other incidents that can result in the loss of mission-critical business data. …

TechRepublic.com click the link to read the rest of the story.

Do you backup your cloud storage?

Join the conversation on our Facebook Page!

7 Counterintuitive Rules for Growing Your Business Super-Fast

Blitzscaling a company isn’t easy; if it were, everyone would do it. Like most things of value in this world, blitzscaling is contrarian. To succeed, you’ll have to violate many of the management “rules” that are designed for efficiency and risk minimization.

Medium.com click the link to read the rest of the story.

What rules have you violated and still succeeded?

Join the conversation on our Facebook Page!

Why 91% of IT and security pros fear insider threats

Some 62% of professionals said they believe the largest insider security threat comes from well-meaning but negligent end users…

More than half (53%) of respondents said they felt the employees who were most likely to be a threat were those who have left or were planning to leave the company, or contractors whose contract had ended…

Three-fourths (75%) of respondents said they believe the biggest insider security risks lie in cloud applications, including popular file storage and email solutions like Google Drive and Dropbox.

TechRepublic.com click the link to read the rest of the story.

What systems do you have in place to deal with internal sabotage?

Join the conversation on our Facebook Page!

The Multibillion-Dollar Online Crime Industry

Criminal “products” from the underworld marketplace are part of a sophisticated and highly profitable global industry.. there’s a thriving underground economy online, a place where tools and techniques are advertised and sold — even given away — and where stolen data is laundered to facilitate online crime. What might surprise you is how many of these underground economies there are and how well-established they have become.

This is a sophisticated and highly profitable global industry. In 2016, ransomware alone generated more than $1 billion in profit for criminals. The FBI is now calling “business email compromise,” where scammers intercept suppliers and payment transfers, the $5 billion scam.

Medium.com click the link to read the rest of the story.

Have you been a victim of online criminals?

Join the conversation on our Facebook Page!

Dropbox Projects Reveals How Successful Teams Collaborate

Harvard Business Review

We know a lot about how teams collaborate face-to-face, with regard to leadership, communication, conflict resolution, and other areas. But less is known about how groups work together virtually. As more and more collaboration happens in digital settings, it’s critical to understand best practices for working in such spaces.

To address this question, we studied the virtual interactions of research teams at universities around the word on Dropbox, analyzed how the collaborative dynamics related to performance and developed a list of best practices that organizations can use on any file-sharing platform to improve team performance.

HBR.org The Harvard Business Review click the link to read the rest of the story.

What have you found works for your teams?

Join the conversation on our Facebook Page!

Streamline Your Workflow by Assigning Tasks to Days of the Week

The idea is pretty simple: Rather than shift your focus throughout the day, group together similar tasks so that you can streaming completing them.  … So I might always do one type of task on Mondays and Wednesdays, and another on Tuesdays and Thursdays. Perhaps you reserve all your in-person meetings or site visits for Wednesdays or Fridays. …

LifeHacker.com click the link to read the rest of the story.

Have you tried this method?  Did it work for you?

Join the conversation on our Facebook Page!