Typically the biggest problem social media companies face is the issue of privacy, or rather how to reassure their consumer that privacy is a priority. They all have privacy policies. Facebook’s Mark Zuckerberg says “we value your privacy”. Eric Schmidt says he values your privacy. Everybody says we value your privacy, but do they really? You […]
Social Media: The Myth of a Private Profile
The Lighter Side
EXAMPLES FROM BRITISH MILITARY OFFICERS’ REPORTS 1. His men would follow him anywhere, but only out of idle curiosity. 2. I would not breed from this Officer. 3. This man is depriving a village somewhere of its idiot. 4. This officer can be likened to a small puppy – he runs around excitedly, leaving little […]
Raj’s New Book – Coming Soon
“I found Unplugged: Luddites’ Guide to Cybersecurity to be not only useful, but a funny, fascinating read as well. The book is full of anecdotes and real-world examples that paint a sobering picture of the Big Brother-esque trends happening all around us. Many stories surprised me – is this actually what our world is like […]
Adult Friend Finder Data Breach – Blackmail R Us?
Whether it’s Tinder, Snapchat, AshleyMadison or AdultFriendFinder (AFF), many people aren’t looking for love…they’re looking for instant physical gratification. There’s nothing wrong with sex between consenting adults. However, there’s plenty wrong with submitting your sexual preferences online. To quote from the International Business Times: Blackmail The information contained in the leak includes usernames, post codes, […]
Tech analyst on Ashley Madison hack: ‘Internet security is an oxymoron – it does not exist’
Article by Jay Dow, PIX11, July 21st, 2015 You find your way to the dating website Ashley Madison because either you’re married – or attached – but still want to date secretly – without worrying that your spouse or significant other will find out. So imagine when the website that advertises itself as an online […]
Always On, Always Moving – Securing the Mobile Workforce
The rapid rise of mobile computing has caused more sleepless nights for security professionals than they would care to admit. Laptops, smart phones, tablets… most employees have one of each, and each needs to be protected. What are the best strategies to enable threat prevention for your mobile workforce? What exactly are the threats being […]
The Lighter Side
Texas Policing Two guys driving through Texas get pulled over by a state trooper. He taps on the driver’s window, the driver rolls it down, and the trooper smacks the driver in the head with his night stick. The driver asked why he did that. The trooper says, “You’re in Texas, son. When I pull […]
The Joy of SOPs – Better Than Pizza, Better than Chocolate, Better THAN SEX! How to Create Effective SOPs
If you look at any type of documentation, crack open Apple, or Microsoft, or whoever, the classic model is it looks more like a textbook. There’s a chapter heading, a lot of text, maybe a table. By the time you’ve finished reading it, your mind is numb, you’re brain fried, and you’ve just become functionally […]
The Importance of Vacations
One of the best ways to grow your business, whether you’re a solo-preneur or you have a thousand employees, is to actually plan vacations, and when necessary, force your people to take them. We, as Americans, are scandalous at not taking vacations. We have given up millions of vacation days a year. And as human […]