The 2015 Arkansas murder case that depended on smart-home devices, made the news again as the judge in the civil case upheld his ruling that James Bates is financially liable for the death of Victor Collins. The case against the accused was built on, among other forensics, records from Amazon whose Echo device was installed by the scene of Collins’ death, as well as evidence from a so-called smart meter. The smart meter reported inordinate usage of water around the time of death, which led the police to argue that a bloody patio was hosed down.
Surprised that in the last month, between two small marketing list brokers, more than a billion personal records were found to have been leaked on the internet?1
That data then gets leaked and sold to potentially hold users’ computers or reputation for ransom. Or as in a 2018 hack, of DNA tester, MyHeritage, there is the ability to sell the data to the insurance and mortgage industries, revealing DNA disease susceptibilities, thereby making the user ineligible for coverage or a loan.2
GDPR to the Rescue!
A sense of belonging, a sense of community and for businesspeople, a touchpoint for customer service and the ability to market to specific demographics are among social media’s benefits. And like every technology, social media – by which I mean websites that offer sharing tools that allow people to interact (e.g. Instagram, Twitter, SnapChat, Facebook, YouTube) – have their drawbacks.
Let’s face it, servers, like any piece of hardware, will eventually need to be replaced, but in the meantime, keep it running until it’s time to replace it. Developing a checklist of the tasks that need to be done regularly can go a long way in ensuring your servers consistently perform at their best. Because servers take care of all your data, it is important to watch and properly care for them. Such maintenance involves constant monitoring and continuously analyzing how the server is functioning. Preemptive maintenance not only reduces server issues, but also may increase the longevity of your server.
Every IT professional would agree that servers are the lifeblood of your organization. No matter what daily task you perform, whether it is responding to email, preparing for a presentation, or completing other workday tasks, it’s important to have a server in your office that runs smoothly. No organization, no matter what the size, wants to face the IT issues associated with a slow or non-responsive server. While there is no way to accurately predict when a server will need to be replaced, there are some general guidelines you should observe to ensure that this critical piece of equipment is running properly.
With black Friday just around the corner, many of us are starting to think about holiday shopping. We all love the convenience of being able to be at home in front of a computer vs the hassle of crowded malls and searching for parking spots. You can click here and there and order whatever product you desire and have it delivered to your front door. You can compare pricing, look for deals, compare products, and it all can be done quickly and in the convenience of your own home, any time, night or day. The downfall? Wherever there is money and users to be found, there are malicious hackers roaming around.
Connected devices are essential to our professional and personal lives, and criminals have gravitated to these platforms as well. Many common crimes—like theft, fraud, harassment, and abuse—are now carried out online, using new technologies and tactics. Others, like cyber intrusions and attacks on critical infrastructure, have emerged as our dependence on connected systems revealed new vulnerabilities.
Oftentimes, when you come across an article that someone is raving about as a ‘”MUST READ – Changed my life”, you glance through it with some skepticism, and then realize that it won’t change your life. However this time I came across one of these “life changing” articles and wow – it peaked my interest! It gave me an entirely different perspective on how to approach a conversation.
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and an untrusted external network, such as the Internet. Firewalls block unauthorized access to your computer network from hackers, malware and viruses. They […]
A family can benefit from sharing a computer – whether it be the kids, parents or even grandparents. When you set up this new computer there are a few things to keep in mind so that everyone can enjoy it, especially if you have a large family. You will want to make sure that the […]