COVID-19: Why Your People Should Be The Main Focus

 

COVID-19 Symptoms and how to protect yourself

In the last week or so, the world has seemingly shrunk as a fallout of the COVID-19 pandemic that is ravaging every aspect of our lives right now. Those saddled with managing technology planning to deal with the pandemic should realize that technology is never first. People are.

In North America, particularly the U.S. and Canada, people practically went from their typical day-to-day lives to a dignified quarantine called “shelter in place”, all seemingly overnight. Organizations and businesses have had to transform ‘normal’ business processes and office spaces to virtual workplaces.

More critical is that fact that many small organizations have had to make incredibly difficult decisions to send their paltry staff home with no infrastructure in place to support the suddenly mandatory work from home guidelines.

As a matter of fact, to say that many are struggling to extend existing remote work capabilities to a larger set of employees, or trying to kick off remote work programs from scratch within a short window would be an understatement. (more…)

Share

Comments Off on COVID-19: Why Your People Should Be The Main Focus

7 Critical Cyber Security Measures for Associations

Image of two hands attempting to grab a laptop with the words "Cyber Security" and "Password" on the screen

Your Computer Network Is Being Haunted, And Your Membership Association is Under Cyber Security Attacks.

Right now, Cyber Security attacks are being perpetrated by extremely dangerous and well-funded cyber crime rings using sophisticated techniques to hack into thousands of membership associations to steal credentials, credit cards, and other confidential business data with one goal in mind: blackmail the executives of these associations to recover data, and swindle money directly out of their organization’s bank accounts.

This new threat is called CEO Phishing, and it is a real threat. FBI also calls them “Business Email Compromise” (BEC). If you’ve recently received a bogus email supposedly from your Executive Director, Chief Financial Officer, or a member of the board asking for a bank transfer, you just got a taste of this threat.

82,000 NEW malware threats are being released every single day and HALF of the cyber security attacks occurring are aimed at small organizations just like yours. You just don’t hear about it because it’s kept quiet for fear of bad PR, lawsuits and sheer embarrassment.

The National Cyber Security Alliance reports that 1 in 5 small businesses have been victims of cyber security crime in the last year and this number is growing rapidly as businesses continue to move to cloud computing and mobile device, and to store more information online.

The worst part of this is that all the current security tools we pile onto the network are practically useless against these types of cyber security attacks because they target human beings. This is what is popularly known as social engineering attacks.

According to security experts, the most advanced antivirus software, firewall, spam filter, two-factor-authentication, intrusion detection system, secure web application firewall, and data encryption tools will not stop these types of attack.

What can you do?

(more…)

Share

Comments Off on 7 Critical Cyber Security Measures for Associations

Computer Problems? Before You Call Tech Support

This is truly the age of information at your fingertips and most users may not even be aware of the vast array of tools available on the Internet – from tutorials on paper and video to easy to use applications that can do everything, even make coffee.

Most home users or even business users without dedicated IT support usually find themselves calling technical support or local providers of support services for computer problems they can easily fix themselves if they take a minute to get online and search for answers. (more…)

Share

4 Comments

MCIBTY: My Certification Is Better Than Yours

There was a book I read called “My Mercedes Is Bigger Than Yours”  – which pretty much sums up what the book was all about: bragging rights as to whose car is “bigger”. In this case the practice, in some cultures, of using the model tag on a Mercedes -Benz car as an index of the economic and social power of its owner: for example, the Mercedes-Benz 200 designated the small rich while the Mercedes-Benz 500 SL announced the super rich. It was a typical intra-class war where your neighbor had to have a bigger and sometimes better car than the one you were driving. (more…)

Share

Comments Off on MCIBTY: My Certification Is Better Than Yours

How Perverse Incentives Drive Bad Security Decisions

An employee of Whole Foods in Ann Arbor, Michigan, was fired in 2007 for apprehending a shoplifter. More specifically, he was fired for touching a customer, even though that customer had a backpack filled with stolen groceries and was running away with them. I regularly see security decisions that, like the Whole Foods incident, seem to make absolutely no sense. However, in every case, the decisions actually make perfect sense once you understand the underlying incentives driving the decision. All security decisions are trade-offs, but the motivations behind them are…

Comments Off on How Perverse Incentives Drive Bad Security Decisions