Regulation is Coming to YouTube, and It’s Going to be Ugly

YouTube, which has battled repeated negative headlines in the last two years, published new terms of service for its users in the European Union and Switzerland last month. Hardly anyone noticed.  The rules beef up the power of the video sharing platform to remove access to users who cause harm to the reputation of the service, or harm its users. … Today, the new rules came into force across 29 countries — and at a stroke YouTube became fractured.  Users who access the platform from different corners of the world — the site has around 100 localized versions worldwide, covering 95% of the internet’s users, except China, where the ruling Communist party’s censorship was seen as too difficult to comply with — all see different versions of the site already.

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

Should YouTube be regulated?Join the conversation on our Facebook Page!

How businesses can reduce the financial impact of data breaches

The financial impact of a data breach can devastate companies of all sizes but especially small and mid-sized businesses. The study found that organizations with fewer than 500 employees were hit by losses of more than $2.5 million on average… But there are actions that organizations can take to lessen the financial impact, as outlined in the report. …

TechRepublic.com click the link to read the rest of the story. Our FREE Tools can help!

How many of their recommendations have you implemented?

Join the conversation on our Facebook Page!

Capital One’s breach was inevitable

Another day, another massive data breach.  This time it’s the financial giant and credit card issuer Capital One, which revealed on Monday a credit file breach affecting 100 million Americans and 6 million Canadians. Consumers and small businesses affected are those who obtained one of the company’s credit cards dating back to 2005.  That includes names, addresses, phone numbers, dates of birth, self-reported income and more credit card application data — including over 140,000 Social Security numbers in the U.S., and more than a million in Canada.

TechCrunch.com click the link to read the rest of the story. Our FREE Tools can help!

Should government do more?

Join the conversation on our Facebook Page!

The Power of Stilling the Mind – why leaders do it

I have also practiced this discipline for twenty-two days in a row. Honestly, this has been one of the most transformational things I have ever done. …  Here are three of my own reasons for practicing the discipline of stillness:  I want to maintain perspective. If I don’t make time to be still, then I find myself in reactive mode—influenced by hundreds of little voices with big demands. I want to stay connected to my true self. I don’t want to get confused, thinking that I am the image I present to the world. They are related, of course, but I want to live from the inside out. I want more internal margin in my life. While I have been pursing external margin in my calendar and finances, I also want internal margin—more room to notice what matters most and be thankful for it. … How to Practice Stillness…

MichaelHyatt.com click the link to read the rest of the story. Our FREE Tools can help!

Do you practice stillness?

Join the conversation on our Facebook Page!

66% of SMBs don’t believe they are vulnerable to cyberattacks

The majority (66%) of business leaders at small to medium-sized businesses (SMBs) don’t believe they will fall victim to a cyberattack… While SMBs don’t think they are at risk, a previous study conducted by the Ponemon Institute for Keeper found otherwise: 67% of SMBs experienced cyberattacks within the past year. … The report found a major gap between the awareness and reality of cyberattacks in SMBs. Only 12% of respondents said they realize how likely an attack is on any size company.

TechRepublic.com click the link to read the rest of the story. Our FREE Tools can help!

Can you business survive the cost of a data breach?

Join the conversation on our Facebook Page!

Capital One Data Theft – What it means for you

Federal prosecutors this week charged a Seattle woman with stealing data from more than 100 million credit applications made with Capital One Financial Corp. Incredibly, much of this breach played out publicly over several months on social media and other open online platforms.  … That data included approximately 140,000 Social Security numbers and approximately 80,000 bank account numbers on U.S. consumers…

Krebsonsecurity.com click the link to read the rest of the story. Our FREE Tools can help!

What do you do to protect yourself?

Join the conversation on our Facebook Page!

Should the U.S. Government Fight Back When Businesses Are Cyberattacked?

Keith Alexander of the venture-backed cybersecurity start-up IronNet is unequivocal in his belief that private companies protecting themselves from nation-state threats is not working. “I flipped through this before you arrived,” he told us, dropping a pocket copy of the Constitution on the table. “It still says that the purpose of the Union is to provide for the common defense. There is no parenthetical that says ‘except in cyberspace.’” …

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

What should the government do?Join the conversation on our Facebook Page!

5 Reasons Why You Should Commit Your Goals to Writing

The research is conclusive. Dr. Gail Matthews, a psychology professor at Dominican University in California, did a study on goal setting with 267 participants. She found that you are 42 percent more likely to achieve your goals just by writing them down.  I have found this to be true in my own experience. Here are just a few goals I have written down over the last three decades: …

MichaelHyatt.com click the link to read the rest of the story. Our FREE Tools can help!

Have you made writing your goals down a habit? 

Join the conversation on our Facebook Page!

The New Ways Your Boss Is Spying on You

It’s not just email. Employers are mining the data their workers generate to figure out what they’re up to, and with whom. There’s almost nothing you can do about it. …

HOW TO KEEP YOUR PRIVATE LIFE MOSTLY PRIVATE

Maintain separate devices: Only use your employer-issued phone and laptop for work and keep a separate phone and computer for personal use.

Avoid linking your personal devices to corporate Wi-Fi networks: “Companies routinely log network activity to protect business interests, and most policies make clear there is no expectation of privacy of company equipment,” …

Be careful what you share on your resume: Recommends using a Google Voice or internet-based calling phone number rather than your cellphone number, and a commercial mail receiving address like a UPS store.

Use a USB data-blocker: These devices look like thumb drives and sit between a smartphone and a charging cord or dock. They protect smartphone data from being transferred to public charging stations, rental cars or company-owned computers.

Avoid leaking information: Don’t publish information about your personal life on public social media accounts like Facebook and Twitter profiles, which can be mined for potentially damaging information by your employer or a company where you have applied for a job.

WSJ.com click the link to read the rest of the story. Our FREE Tools can help!

Are you using these methods in your business?

Join the conversation on our Facebook Page!

Here’s how you can still get a free Windows 10 upgrade

Microsoft’s much-hyped free upgrade offer for Windows 10 ended in 2016, right? Not exactly. … In this post, I’ll cover the basics of a Windows 10 upgrade. I’ll also talk about the licensing issues involved, which are (as always) confusing. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you still waiting to upgrade?  What is your biggest concern?

Join the conversation on our Facebook Page!

Microsoft Warned 10,000 Users Targeted By State-Sponsored Hackers

Microsoft is warning customers that they are being targeted by state-sponsored hackers. Over the last year, the software giant said it had notified 10,000 users that they had been targeted by adversaries working for foreign governments. Some people had also been compromised as a result of these attempts…

Forbes.com click the link to read the rest of the story. Our FREE Tools can help!

Has your business been targeted by foreign governments?  Are you sure?

Join the conversation on our Facebook Page!

Strange new phishing attack uses a surprise bill to trick you

Banks and financial institutions around the world are being targeted by a new email phishing campaign which uses an unusual technique as part of its attacks.  The phishing emails come with server-parsed HTML (SHTML) file attachments that are typically used by web servers. If users open the attachments, they’re immediately redirected to a malicious site requesting sensitive information, which if entered, falls directly into the hands of cyber-criminals …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Does you company test employee phishing id skills?

Join the conversation on our Facebook Page!

Email scammers are now cost businesses $301 million monthly

The US Department of Treasury’s Financial Crimes Enforcement Network (FinCEN) has run an analysis on suspect transactions in the past year and found that US businesses in 2018 wired around $301 million per month to business email compromise (BEC) scammers.  The $301 million in average monthly losses is far higher losses than the FBI’s estimate…

fincen.gov click the link to read the rest of the story. Our FREE Tools can help!

How does your business rank on the list of targets? What are you doing to protect your business?

Join the conversation on our Facebook Page!

Cybersecurity: Do these six things to protect your company online

Of those companies surveyed … over half of companies (53%) reported losses of between 3% and 10% following a cyber-attack or data breach. But the losses can also be much worse: 6% of businesses consulted in the report said they lost between 11% and 25% of revenue as the result of an incident. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How good is your cyber insurance, training and security?

Join the conversation on our Facebook Page!

Israel issues warning of a new type of cyber attack

Israel issued a warning warning of a new type of cyber attack, using artificial intelligence (AI) technology to impersonate senior company executives. In this method, instructions are given to the companies staff members to perform transactions such as money transfer to perform transactions such as money transfers, as well as malicious activity on the company’s network. …

Gadgetsnow.com click the link to read the rest of the story. Our FREE Tools can help!

How are you protecting your office from such attacks?

Join the conversation on our Facebook Page!

How to Start a Business with No Money

We all know that hard work can produce incredible results. But the prevailing rise-and-grind mythology often pushes founders into business before they’re ready. Many smart, ambitious people feel pressured to quit their jobs and go all-in. They work around the clock, sacrificing their health and happiness to chase a startup dream. For every founder who’s battling exhaustion and surviving on protein bars, I’d like to suggest a different path. …

Jotform.com click the link to read the rest of the story. Our FREE Tools can help!

Do you have a great solution to solving a problem?

Join the conversation on our Facebook Page!

Top 10 Common Network Security Threats Explained

Now that most of our daily procedures and activities are automatized and available for use on the Internet, we need to take the same level of precaution we did as children, crossing to the other side of the street… today we’re going back to basicsexploring and explaining the most common network security threats you may encounter while online…

Securitytrails.com click the link to read the rest of the story. Our FREE Tools can help!

How safe is your business from these threats?

Join the conversation on our Facebook Page!

Microsoft fixes zero-day flaw exploited by Russian hackers

This month, Microsoft patched 77 vulnerabilities, including two zero-days — security flaws that were being actively exploited in the wild. … The zero-day was discovered by ESET as part of the attack chain of a group of Russian state-funded hackers. The company told ZDNet it plans to publish an in-depth blog post about these attacks…

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Do you think we are staying ahead of the threats?

Join the conversation on our Facebook Page!

Trying To Save Money On Programmers … Cost Boeing Billions

On October 29, 2018 Lion Air Flight 610, a 737 MAX 8 flight from Jakarta, Indonesia to Pangkal Pinang, Indonesia, crashed into the sea 13 minutes after takeoff, killing all 189 people aboard. Investigations into the precise cause of the crash are still ongoing, but investigators believe that the crash may have been caused by erroneous activation of commands from the Maneuvering Characteristics Augmentation System (MCAS)… To cut costs, engineering managers often rush developers, impose arbitrary unrealistic deadlines, or in the case of Boeing, outsource engineering to cheap contractors to try to increase production bandwidth.

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

Have you ever cut expenses in the wrong areas?

Join the conversation on our Facebook Page!

Microsoft adds OneDrive Personal Vault to secure your critical files

Microsoft’s OneDrive Personal Vault locks down a portion of your OneDrive cloud storage with time-limited two-factor authentication.  Personal Vault is designed for files you really hold dear: tax information, scanned passports, that sort of thing.  … Microsoft says that Personal Vault applies an extra layer of protection, essentially by reducing the timeout period. …

PCWorld.com click the link to read the rest of the story. Our FREE Tools can help!

Will you use the Personal Vault?

Join the conversation on our Facebook Page!

AI is changing the entire nature of compute

The world of computing, from chips to software to systems, is going to change dramatically in coming years as a result of the spread of machine learning. We may still refer to these computers as “Universal Turing Machines,” as we have for eighty years or more. But in practice they will be different from the way they have been built and used up to now. Such a change is of interest both to anyone who cares about what computers do, and to anyone who’s interested in machine learning in all its forms. … The rise of deep learning, starting in 2006, came about not only because of tons of data, and new techniques in machine learning, such as “dropout,” but also because of greater and greater compute power. … Machine learning is now poised to take over the majority of the world’s computing activity, …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Is your business tapping into AI?

Join the conversation on our Facebook Page!

Ransomware attacks: Why and when it makes sense to pay the ransom

Whether you pay ransomware actors or not really comes down to some straightforward business calculations. Sometimes the ransom is worth it. … Yet another city is deciding to pay ransomware gangs to get their IT infrastructure back and you can almost feel the consternation among officials. That consternation may also be good business. Simply put, it can make good sense to pay ransomware.  In a recent research report, Forrester Research argued that paying ransomware should be viewed as a viable option…

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Would your business pay a ransom?

Join the conversation on our Facebook Page!

Only 1/2 of cloud vendors are giving businesses what was expected

While many cloud providers promise increased flexibility, cost savings, and customization, tech professionals must carefully consider factors including security, visibility, and automation when choosing a cloud vendor. However, many IT professionals have reported discrepancies between cloud expectations and reality: Only one third said they achieved cloud expectations around cost, speed, business enablement, and service levels after migration, according to a recent Accenture report.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How pleased are you with your cloud services?

Join the conversation on our Facebook Page!

US Cyber Command Issues Alert! Hackers Attacking Outlook

US Cyber Command has issued an alert via Twitter today about threat actors abusing an Outlook vulnerability to plant malware on government networks.  The vulnerability is CVE-2017-11774, a security bug that Microsoft patched in Outlook in the October 2017 Patch Tuesday.  The Outlook bug, discovered and detailed by security researchers from SensePost, allows a threat actor to escape from the Outlook sandbox and run malicious code on the underlying operating system. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Do you train your office how to identify dangerous emails?

Join the conversation on our Facebook Page!

How to Avoid Windows 7’s End-of-Support Nags

Windows 7 has begun nagging you to upgrade to Windows 10—again. Specifically, you’ll see a message informing you that Microsoft will officially stop supporting Windows 7 on January 14, 2020. Here’s how to avoid it.  You can just click “Do not remind me again” and close the window to stop the nags. But you should think seriously about upgrading your computer… now!

Howtogeek.com click the link to read the rest of the story. Our FREE Tools can help!

Are you still on Windows 7? Why?

Join the conversation on our Facebook Page!

Protect your online identity now: Stop hackers in 5 steps

Having your identity stolen can be a nightmare, and cleaning up the mess can take months. You can make life difficult for a would-be identity thief by locking down these five key aspects of your online life. … [In a recent case] hackers were able to convince T-Mobile to issue a replacement SIM that gave them access to his primary phone number. That in turn allowed them to reset passwords on his Gmail account, which pretty much gave them unfettered access to his entire identity. They then proceeded to shut down his Twitter account, wipe out everything associated with his Google account, and even access his online banking accounts.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have you been the victim of a SIM hack?

Join the conversation on our Facebook Page!

How to Learn Digital Marketing for (Nearly) Free in 6 Months

This is a system that you can use to teach yourself digital marketing in a few months using mostly inexpensive resources and personal projects. I’d expect that anyone could take a game plan like this and go from zero to hireable digital marketer in 6 months or less, so long as you work hard at it and don’t get too distracted. …

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

Are you trying to learn digital marketing?

Join the conversation on our Facebook Page!

Here’s Why Time Off Work Actually Improves Your Work and Life

Leonard Mlodinow, a physicist, who also co-authored two books with Stephen Hawking, recently shared scientific research in his book Elastic about taking time off. He demonstrates that taking time off work improves our well-being:  “Though some may consider “doing nothing” unproductive, a lack of downtime is bad for our well-being, because idle time allows our default network to make sense of what we’ve recently experienced or learned.

GetPocket.com click the link to read the rest of the story. Our FREE Tools can help!

Do you schedule breaks in your life?

Join the conversation on our Facebook Page!