Recent Blog Posts
Google, with its seemingly limitless funding, can, of course, provide their employees with every imaginable benefit under the sun. Take for example just some these perks Google provides their staff (aka, ?Googlers?), as reported by Inc. The free gourmet food and snacks are never-ending. Googlers at the Mountain View campus get a free ride to and from work. The TechStop helps Googlers stay plugged in with 24-7 tech support. Free “massage credits.” New parents get the break they deserve. New dads receive six weeks of paid leave, and moms can take 18 weeks, and employees’ stock continues to vest (and they continue to receive bonuses) while they are on leave. If a Googler passes away while working there, all their stock vests immediately, and, on top of the life insurance payout, their surviving spouse continues to get half of the Googler’s salary for the next 10 years. Employees get free fitness classes, gym access, and are encouraged to participate in organized intramural sports. Google employees can get extended time off to follow their passions. Due to the sobering fact that you?re not Google, let?s face it, sometimes money is tight and you as a business owner must make the hard choice of what to cut in order to make payroll. In trying times like these, before you lay anybody off, you?ll first want to attempt to save money by making cuts to perks that may be draining your budget. While nobody enjoys making cuts, sometimes cuts are necessary in order to get a handle on out-of-control expenses and to better allocate resources. Ask yourself, ?Can your business do without perks such as these?? Company PartiesBusinesses have a reputation for knowing how to throw some pretty extravagant company parties. Take for example Yahoo?s $7 million ?Great Gatsby? themed party thrown last December. What makes such a party outrageous and newsworthy isn?t so much the price tag; it?s the fact that Yahoo recently laid off 15 percent of its staff after posting massive losses. For an employee who just watched their peers lose their jobs due to ?budget cuts,? moves like this can be maddening. This, in turn, will sink employee morale, which is the complete opposite of what a company is trying to accomplish by throwing a party. An alternative option: Instead of dropping huge sums of cash to rent out a yacht and party bus, keep it simple. You can still have a party, but many of your employees will have just as much fun at a small gathering with punch and pizza, or even a potluck event. Free Food and SnacksIt?s well known that providing employees with food makes the office a much more pleasant place to work at. However, when money gets tight and you start feeding your staff excuses that you can?t afford raises along with food, then even the most tasty of meals will lose its flavor. As great as free food is, at the end of the day, most employees would prefer a raise and/or keeping their job. High Executive SalariesThere?s just something inherently wrong about a company executive who cuts jobs citing budget concerns while giving themselves a fat raise. Take for example Viacom?s CEO Philippe Dauman who recently gave himself a board-approved raise of 22 percent (which translates to a cool $54.2 million per […]
One of these ?things? in the news at the moment is a BB-8 droid toy built by Sphero. This toy, consisting of a typical Sphero, is a commercially available, app-controlled, robotic ball, that has been painted up like BB-8, the mischievous Droid from Star Wars Episode VII: The Force Awakens and marketed to people who want their very own droid. How can a seemingly irrelevant toy be at risk? In a recent report, security experts were able to exploit a bug and ?hack? into a BB-8 toy through its integrated wireless communication systems. This allowed them to inject code into the phone, which couples as the device?s remote. In the report, hackers were able to take full of control over the device in what is called a man-in-the-middle attack. While this particular case doesn?t reveal anything perilous, a man-in-the-middle attack can potentially be very dangerous if targeting something of substance. Man-In-the-MiddleIt?s not hard to understand what a man-in-the-middle attack is. For an analogy, you can go back to the first grade. Remember the game ?telephone? that you used to play when you were a child? A man-in-the-middle hack produces similar results. Essentially, a person sends a message and the recipient receives it, but in the process of being relayed the message, someone adds or omits some crucial element of the message. Just imagine that instead of the sentence, ?Jane runs through the forest,? the message that was interrupted and manipulated is a customer?s credit card number. To completely understand the man-in-the-middle attack, you need to realize that, with the advent and use of wireless systems, more entities are at risk for this type of hack than ever before. This is why it?s important to implement safeguards to ensure that the information you send, regardless of whether you?re sending instructions for a toy from your smartphone, or an essential file from a PC to your server. You need to make sure that your commands are sent securely and get to the recipient in the way the sender had intended. Precautions such as remote monitoring and management, that include intrusion detection, and other protocols that work toward cyber security, are good solutions to combat potential network security. Potential for Attacks Require SolutionsWireless technology has altered a great many things. Cumbersome, wired systems that people have had to fumble with, are largely a thing of the past. Now people have to determine whether or not wireless systems are secure to use, and if they aren?t, they have to do what they can to secure them. There are literally hundreds of solutions to help users secure their devices, whether it be from a mobile device or a PC/Mac running off a wireless network. In some cases, however, an inconsequential and seemingly irrelevant piece of the puzzle (like in this case, a toy with buggy software), could potentially leave you exposed.
The first thing that you need to know about GIFs is that they can be downloaded, uploaded, and shared in the same way as most other digital image formats, like JPEG and PNG files. GIFs are easy enough to use, but to really take advantage of them you?re going to want to know how to search for and make them. Searching the Web for a GIFDo you have a specific GIF in mind that you?d like to use? Perhaps a clip from your favorite movie, or of a silly reaction? If so, you can easily search the web for it using Google Search. To do this, simply type into Google?s search bar what you?re looking for and hit Enter. Next, select Images > Search Tools > Type > Animated. From here, you?ll see a page full of with relevant images. Note: in order to see what the GIF?s animation looks like, you actually have to click once on the image, otherwise it will appear as a static image. Although, be careful not to double click the image or you?ll be taken to the website where the GIF originates from. To download the GIF, simply right click it, and select Save image as… Making Your Own GIF From YouTubeIf you can?t find the perfect GIF, then you can use any of the millions upon millions of YouTube videos to make your own! To do this, first go to YouTube and find the perfect video (or upload one). Next, copy the URL of the video, located in either the form at the top of your browser, or below the video after selecting Share. From here, go to gifs.com and paste the video?s URL in the provided form. Next, select Create GIF. You will now be taken to a new page showing your YouTube video alongside video editing tools. As prompted by the text boxes, give your GIF a title in the top form. Next, move the slider to where in the video you want your GIF to begin and end. Or, you can manually enter the GIF?s start time in the Start time form. Next, determine the duration of your GIF. By default, it?s set to five seconds. Be sure to adjust the clip?s time span as needed. Additionally, you can fine tune the timing of your GIF by hovering over the Duration form and selecting the up and down arrows. Lastly, you can add captions to the GIF by selecting Add Caption to the left of the video and following the directions. As you make edits to your GIF, a preview of your work will be displayed. Once you?ve got everything exactly how you want it, select Create GIF. Gifs.com will now generate your file and take you to a new page displaying your GIF. To the right of the GIF is the GIF?s URL, file path (for downloading purposes), and the embed code. If you wish to share your GIF creation over social media, then take advantage of the various social media icons provided by the website. After going through these steps, you can now call yourself a GIF master and populate the Internet with even more great GIFs.
What is social engineering?With social engineering, someone attempts to gain access to passwords and other sensitive information not through technical savvy, but by using various psychological tricks to gain your confidence and fool you into granting unwarranted privileges or access to protected data.For example, an individual may pose as a customer service representative for a software company or as IT personnel; they then talk their way into obtaining your data and exposing you to further attacks. Other tactics include impersonating a colleague or potential associate via email or social media. In other situations, they may start out as strangers and then befriend you, gaining enough of your trust to get you to click on a malicious link in an email and download malware to your system. They may also try to find out enough about you to guess your password or your responses to password recovery questions in order to gain access to your accounts. How can you prevent social engineering scams?These types of scams often come as a surprise. They exploit people’s ready tendency to extend trust and accept explanations at face value. However, there are ways to reduce your chances of getting taken in by social engineering. The following are five tips: ? Raise awareness among your employees. If employees are aware of the risks and get introduced to the tactics commonly used in social engineering, they’re more likely to remain cautious even when approached by charismatic, confident, and seemingly trustworthy individuals. It’s less likely that they’ll accept information at face value. Offer training programs, and demonstrate to employees how sensible preventive measures can better protect them from scams in their personal lives, not only at work. Stress how important it is to pause and think instead of automatically clicking on links or disclosing sensitive information. ? Devise and enforce a comprehensive security policy. For example, you can institute rules about the kinds of files employees are allowed to download on company devices, and the kinds of information they’re allowed to disclose on social media or in-person (or even just leave out in the open on their desks). Be sure to check up on whether or not they’re taking these policies seriously. Turn lapses into opportunities to once again discuss the consequences of poor security and the importance of caution. ? Adopt layers of protection. You should have in place a series of checks for confirming identity and detecting impostors. For example, if someone shows up at your office claiming to be a computer technician, your employees would check for appropriate identification and call up the company the technician allegedly works for. Another strategy is to share information or suspicions about hacked accounts; for instance, if one of your employees thinks their email account has been compromised, they should notify everyone else. ? Pay especially close attention to new employees. Because new employees are less familiar with your company and the people you employ on the outside, they’re more susceptible to getting tricked. ? Model secure behavior. As a leader within your company, your employees will look to you for examples of safe practices and cautious behavior. If you pick security questions that are easily guessed or get lax about access to your network and servers, your employees won’t take your cyber security initiatives seriously. Remember that there’s […]