Are the People Who Take Vacations the Ones Who Get Promoted?

Americans are taking less vacation time than at any point in the last four decades. Why? According to Gary Oster, Managing Director of Project: Time Off, “Many people don’t take time off because they think that it will negatively impact their manager’s perception of them. But, that isn’t the case at all.” If you or someone you know needs to be convinced to use your vacation time, here’s a list of reasons why it just makes good business sense: …

Harvard Business Review click the link to read the rest of the story. Our FREE Tools can help!

Have you noticed similar benefits in your life?Join the conversation on our Facebook Page!

 

The Simplest Way to Generate a Major Breakthrough

Some business coaches focus on intensity. They advise you to take “massive action” in order to get the results you want. This can be helpful occasionally , but, in my experience, it’s usually better to focus on consistency

MichaelHyatt.com click the link to read the rest of the story. Our FREE Tools can help!

What is the one thing you have found that when done consistently makes a huge difference?Join the conversation on our Facebook Page!

 

99% of all misconfigurations in the public cloud go unreported

Today’s data breaches often seem to be caused not just by malware infections or external threat actors, but human error, insiders with an ax to grind, and simple security failures. Some companies will bury their head in the sand, attempting to ignore responsible, private disclosures of data leaks, while others will act rapidly when their information — and reputation — is at stake.

According to new research released Tuesday and conducted by cybersecurity firm McAfee, titled, “Cloud-Native: The Infrastructure-as-a-Service Adoption and Risk,” the majority of IaaS misconfigurations are going unnoticed. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have you tested your cloud service security?

Join the conversation on our Facebook Page!

Buying a new router? Understand these Wi-Fi basics first

Shopping for a new router can feel overwhelming, especially if you don’t really understand what you’re looking for. There’s lots of jargon to wrap your head around, plenty of hyperbolic claims about speed and coverage to sift through, ISP limitations to take into consideration — and that’s before you try to comprehend the newfangled features that come with emerging, next-gen Wi-Fi tech.  But there’s no need to feel paralyzed if it’s time for an upgrade. If you understand some key basics, you’ll have no problem

Cnet.com click the link to read the rest of the story. Our FREE Tools can help!

Will you be upgrading your router soon?

Join the conversation on our Facebook Page!

Silicon Valley is terrified of California’s privacy law. Good.

In a little over three months, California will see the widest-sweeping state-wide changes to its privacy law in years. California’s Consumer Privacy Act (CCPA) kicks in on January 1 and rolls out sweeping new privacy benefits to the state’s 40 million residents — and every tech company in Silicon Valley.  California’s law is similar to Europe’s GDPR. …

TechCrunch.com click the link to read the rest of the story. Our FREE Tools can help!

How are you preparing your business for the new laws?Join the conversation on our Facebook Page!

How Much Is Your Privacy Really Worth?

Facebook alone hauls in about $30 per year in revenue per North American user, or about $2.50 per month, and, of course, it’s just one of the countless companies tracking your online behavior. …

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

How much do your private data is worth?Join the conversation on our Facebook Page!

Why Visuals Are the Most Powerful Way to Sell Anything

Almost every day, I have to impress upon a client that telling their customers that they believe in something or are committed to something is almost useless without a clear visual to back it up. Because it’s visuals that stick in our minds. We think in pictures. If you can plant a positive picture in the mind of whomever you’re trying to persuade, you are that much closer to getting what you want. …

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

Do you use visuals to communicate?Join the conversation on our Facebook Page!

Being ‘Indistractable’ Will Be the Skill of the Future

The truth is, we overuse video games, social media, and our cell phones not just for the pleasure they provide, but because they free us from psychological discomfort.
Distraction, then, is an unhealthy escape from bad feelings. …

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

How do you resist distractions?Join the conversation on our Facebook Page!

An In-Depth Look Into All The Ways Google Tracks You in 2019

Have you been wondering how Google tracks you? What kind of data does it collect? What is this company doing with all that (incredibly personal) data? Well, I’ll do my best to untangle this purposefully-created mess of misleading marketing messages and hard-to-read privacy policies.

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

What surprised you most about the article?Join the conversation on our Facebook Page!

5 Ways to Be Respected in Every Conversation

If you’re a leader right now or a young person aspiring to be, let’s have a moment of honesty. Your rights, when you enter into leadership, do not get broader, they get much more narrow.

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

Any other suggestions on how to gain respect in your conversations?Join the conversation on our Facebook Page!

 

Google hit by antitrust probe from 50 attorneys general

Texas Attorney General Ken Paxton on Monday announced an antitrust investigation into Google, with the participation of 50 attorneys general. … The investigation will focus on the search giant’s dominance in digital advertising.

Cnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are concerned with Google’s dominance in the marketplace?

Join the conversation on our Facebook Page!

Scammers find powerful way to impersonate you and empty your bank accounts

Criminals are using AI-generated audio to impersonate a CEO’s voice and con subordinates into transferring funds to a scammer’s account.  … The Wall Street Journal reports that the CEO of an unnamed UK-based energy company thought he was talking on the phone with his boss, the CEO of the German parent company, who’d asked him to urgently transfer €220,000 ($243,000) to a Hungarian supplier. However, the UK CEO was in fact taking instructions from a scammer who’d used AI-powered voice technology to impersonate the German CEO.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How will you protect yourself from this?

Join the conversation on our Facebook Page!

Cybersecurity alert: 34% of vulnerabilities found this year remain unpatched

The overall number of reported vulnerabilities in the first half of 2019 has dropped slightly from last year, but risks remain high

TechRepublic.com click the link to read the rest of the story. Our FREE Tools can help!

How quickly do you patch fixes to these vulnerabilities?

Join the conversation on our Facebook Page!

 

Wi-Fi 6 Will Be Here Soon. What Is It?

Wi-Fi 6 is the latest generation of wireless connectivity technology. It hasn’t really launched yet, but it will be here this fall, so tech makers have been building support into devices this year as a means of future-proofing their products. Its faster…

Wired.com click the link to read the rest of the story. Our FREE Tools can help!

How soon will you upgrade to wifi6?

Join the conversation on our Facebook Page!

How to write great emails - and why it matters

Many people loathe email, but I love it. Used well, it can enhance productivity and communication. It can streamline workflows and clarify meaning. A well-composed email also raises the profile of the sender.

Jotform.com click the link to read the rest of the story. Our FREE Tools can help!

Were this tips helpful to you?Join the conversation on our Facebook Page!

Ransomware hits hundreds of dentist offices in the US

Hundreds of dental practice offices in the US have had their computers infected with ransomware this week, ZDNet has learned from a source. The incident is another case of a ransomware gang compromising a software provider and using its product to deploy ransomware on customers’ systems.  In this case, the software providers are The Digital Dental Record and PerCSoft…

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Was your dentist hit?

Join the conversation on our Facebook Page!

Addicted to distractions? How to reclaim your focus and shut out the noise

It is easy to think that being distracted is just the inability to focus, when in fact, it’s more complicated than that.  As Seth Godin, the content God himself, said in one of his essays:  “If you’re not paying, you and your attention are the products.”  We let ourselves get sucked into an endless cycle of distraction while the gatekeepers are busy selling our attention to advertisers.

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

How do you deal with the distractions?Join the conversation on our Facebook Page!

Phishing attacks jump by 21% in latest quarter, says Kaspersky

The number of worldwide phishing attacks detected by Kaspersky hit 129.9 million during the second quarter of 2019, according to a new report from the security vendor.

TechRepublic.com click the link to read the rest of the story. Our FREE Tools can help!

Have you been hit this year?

Join the conversation on our Facebook Page!

Ransomware attacks have more than doubled this year

Ransomware attacks have more than doubled this year, as criminals turn to powerful new forms of file-locking malware and additional attack techniques to conduct campaigns that are more lucrative than ever before.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Has your business been hit?

Join the conversation on our Facebook Page!

Hackers Want $2.5 Million Ransom for Texas Ransomware Attacks

The threat actor behind the coordinated ransomware attack against multiple Texas local governments may have gained access to its computer systems via a third-party software provider.  According to NPR, which first reported the development, the attackers want a collective ransom of $2.5 million. So far, there are no indications the amount has been paid.

TheNextWeb.com click the link to read the rest of the story. Our FREE Tools can help!

What would you do, if hit by an attack?Join the conversation on our Facebook Page!

Symantec fails to keep up with new industry standards

It seems that six months is not enough for Symantec to get its ducks in a row, as its anti-virus software is unable to handle new security industry standards (SHA-2 signatures), and led to Microsoft withholding updates from certain devices.  In an update note for Windows 7 and Server 2008 R2, Microsoft said that when a device runs any Symantec or Norton antivirus program, and attempts to install an update signed only with SHA-2, the antivirus program blocks or deletes the update during installation, which could make the operating system stop working. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you still using Symantec or Norton? Why?

Join the conversation on our Facebook Page!

Startup delivers 5G internet broadband for $49 a month

Common Networks is using 5G and mmWave technology to deliver a low cost alternative to fiber broadband. Super high speed broadband doesn’t have to cost an arm and a leg. That’s the aim of Common Networks, a startup using 5G to offer wireless broadband to homes in the San Francisco Bay Area.  The company launched its service three years ago and is offering a new tier of service starting Wednesday that delivers 300 megabit per second downloads for just $49 a month. …

Cnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you looking for lower cost broadband service?

Join the conversation on our Facebook Page!

Ransomware Attack Hits 20+ Local Governments In Texas

The number of local government entities in Texas affected by a ransomware attack is now up to 23. In a release Saturday afternoon, the Texas Department of Information Resources said the local governments reported the attacks Friday morning. The majority of them are smaller local governments. …The DIR said it is continuing to investigate the origin of the attack, but at the moment believes it came from a “single threat actor.”

Kut.org click the link to read the rest of the story. Our FREE Tools can help!

How safe is your local government?Join the conversation on our Facebook Page!

The impact of AI in business

AI is changing the way we do business.  AI can be either a supporting tool or a replacement tool for jobs, tasks and even entire industries. It will all depend on how you prepare your company for the future. Here are the five areas you can implement now. …

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

How is AI impacting your business?Join the conversation on our Facebook Page!

 

New cryptojacking malware uses a sneaky trick to remain hidden

A newly-discovered form of cryptocurrency- mining malware is capable of remaining so well-hidden that researchers investigating it found that it had spread to almost every computer at a company that had become infected. … The Monero-cryptomining campaign was uncovered after Varonis’ security platform spotted suspicious network alerts and abnormal file activity on systems within organisations that had reported unstable applications and network slowdown. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you confident your computers are viruses free?

Join the conversation on our Facebook Page!

Want to Be Super Successful? Science Says Do Any 1 of These 10 Things

We all have the same amount of time. That’s why people who are more productive — and successful — use their time more effectively. … Chris Winfield is a great resource for entrepreneurs.  Chris is an entrepreneur and writer, and if you like this post (and the next two in the series), he’s created a special bonus area with a worksheet and 40 powerful morning habits you can adopt.

Inc.com click the link to read the rest of the story. Our FREE Tools can help!

Will you use any of these tips?

Join the conversation on our Facebook Page!

Top Windows Defender expert: These are the threats security hasn’t yet solved

More danger lurks around the corner as advanced techniques used by state-backed hackers, for example, to steal information, filter down to financially motivated attackers. This threat applies to the continuing growth of file-less malware, supply-chain attacks, and phishing. “We’re seeing the trend of advanced techniques being used to deliver commodity malware. Once the advanced technique becomes public knowledge…

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you confident your computers are viruses free?

Join the conversation on our Facebook Page!

Warshipping: new hack tools shipped to your business

Researchers have described a new technique which could be used by cyber attackers to infiltrate corporate setups — with a little help from your friendly neighborhood delivery workers. … Dubbed warshipping, the technique is the result of the researchers’ investigation into possible infiltration methods through package deliveries to the office mail-room — or an individual victim’s front door. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have you found odd electronics in packages to your office?

Join the conversation on our Facebook Page!

These Seven To-Do List Mistakes Could Be Derailing Your Productivity

Before you write your next to-do list, make sure you aren’t making these seven common mistakes:

1. Writing the List in the Morning… Instead, create your list the night before.

Fastcompany.com click the link to read the rest of the story. Our FREE Tools can help!

What is the biggest change you have made in your to-do lists?

Join the conversation on our Facebook Page!

Microsoft alert: Hackers using IoT to breach business networks

One of Russia’s elite state-sponsored hacking groups is going after IoT devices as a way to breach corporate networks, from where they pivot to other more high-value targets.  Attacks have been observed in the wild said the Microsoft Threat Intelligence Center…

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have you secured all your IoT devices?

Join the conversation on our Facebook Page!