Archive for the ‘Internet/Intranet’ Category
Tuesday, June 21st, 2016
By Dennis Powell, e-Management
Is Big Data is another way of saying predatory online marketing? You decide.
Big data as the name suggests is all about large volumes of information. More and more schools, government agencies, retailers, and other organizations are analyzing big data to learn more about people. Big data players include Amazon, Facebook, and Google, to name a few. Naturally, consumer profiling by these and other companies has led many to be a little concerned about issues around privacy and has left other consumers frustrated because of what they see as predatory online marketing. Think about those ads that follow consumers everywhere online following an innocent search on Google or Bing. Yeah, that’s big data analytics at work. But is Big Data bad or good? We’ll let you decide…
The Potentially Bad Stuff…
-
Exclusion Based on Highly Sensitive Data: In a 2016 U.S. Federal Trade Commission (FTC) report (Big Data: A Tool for Inclusion or Exclusion?), the federal agency examines big data and fairness. The report raises concerns that companies may be making decisions by “incorporating errors and biases” into big data analytics. Such decisions, according to the report, could result in “potential discriminatory harms.” One example given is how analytics from social media “likes” could reveal sensitive information about consumers’ political affiliation, faith, and recreational habits (e.g. smoking, drinking, etc.). Sensitive information taken out of context could lead to excluding consumers from employment opportunities, services, and products.
-
Bad Guys Trying to Dupe Seniors (and Others) into Making Poor Decisions: Big data can be used by individuals and companies looking to scam consumers as well. The same FTC report gives examples of companies obtaining lists from people who respond to sweepstakes or ailing seniors. Apparently, these consumers may be the most susceptible to being victims of fraud.
-
Low-Income Consumers Getting Bad Deals: A Huffington Post article from Nathan Newman explains how big data can harm low-income shoppers. The article points to “free services” that come with the high-price of giving away personal information so that companies that use big data can “exploit” consumers. Examples of this is when finance companies single out low-income consumers by using targeted ads made possible by big data and then markets high-interest rate services such as payday and subprime loans to the audience. Big data obtained from free services and mobile apps can also lead to “price discrimination” where some consumers pay more for the exact same service. Well, that’s definitely not good.
The Potentially Good Stuff…
-
Better Products: Many companies are investing more and more marketing dollars to track what people say and do online—collecting information about what consumers like, dislike, and need. Data collected help companies launch new versions of cool stuff. People who get excited about the latest Samsung or Apple update can probably thank big data analytics for those innovations and new features like a smartphone that keeps working even after you drop it in water. What took them so long to get that one to market? *smiles*
-
Better Service: People do business with people they like. Big data helps companies, schools, and other organizations to tailor a better and arguably more personal experience. Writer Larry Alton points to the fact that organizations that leverage big data get their information from surveys, social media, and other online reactions to offer the best service based on your particular pet-peeves and preferences.
-
Better Deals & Decisions: Many consumers also benefit from websites and apps that use big data to pull together useful information. Think comparison shopping. For instance, couples who are planning to marry get a better idea of costs from a that estimates expenses of weddings. Many motorists cringe when there are signs of auto mechanical issues. Well, there are places to get accurate information on how much drivers should be paying for auto repairs. There’s Nextag® that gives shoppers the power to get the best deal on millions, that’s right millions of products. These convenient tools are all powered by big data analytics.
Your Thoughts…
Like any promising technology, big data analytics can be used to enhance customer experience or exploit vulnerable people. We’d love to hear from you: (1) What are your thoughts on big data? (2) How much information are you willing to give up to improve your customer experience or bring new products to market? (3) Where does your privacy fit into the big data conversation?
Tags: , analytics, Android, , apps, big data, Bing, Dennis Powell, , FTC, , HTC, iPhone, Motorola, Ola Sage, Samsung
Posted in Corporate, Entertainment, Information Security, Internet/Intranet, News | 18 Comments »
Monday, March 28th, 2016
By Dennis Powell, e-Management
Experts say cybersecurity is 90% YOU and only 10% technology. What are you doing to protect yourself from hackers?
Newsflash! There is no privacy on the Internet. I repeat: There is NO privacy on the Internet. Anyone with a web browser can see everything anyone has ever posted online! That’s according to the e‑Management Chief Information Officer (CIO) team (and numerous other cyber experts). Cyber experts say online security is 90% user and 10% technology. I know it sounds like a lot of responsibility. But securing the things stored on your Internet-enabled devices that are important to you (e.g., finances, pictures, intellectual property, work products, family stories) may be easier than you think.
Clearly, you should invest in anti-virus and anti-malware software or services. But that’s just 10% (technology) of the solution. The other 90%, remember, is you. Here are a few simple considerations to help you protect yourself from hackers.
-
Keep work and home separate. We are not talking about a work-life balance here. Keep your work and personal devices separate. Hackers will sometimes target you to steal valuable information about work projects or sensitive customer or client information. Oftentimes, the easiest way to hack a nonprofit, business, or government agency is through the organizations’ staff. Avoid using your smartphone for dual purposes, such as accessing your corporate enterprise network and visiting sites to download apps/games on the same device. Still, it may be best if you talk to your company’s or agency’s information technology (IT) or cybersecurity team about BYOD (Bring-Your-Own-Device) policies and best practices before accessing work products from home or downloading personal-use entertainment on business devices.
-
Be mindful of online phishing and social engineering scams. You’re only human. And that’s what hackers are counting on. They prey on admirable qualities in people, including being helpful and trusting of others. Clever and “social” hackers employ tactics such as having chats with you while claiming to be someone you would normally trust. In reality, their intentions are nefarious—potentially tricking you into giving away clues and facts to obtain sensitive information. Similarly, phishing scam artists carefully craft e-mails and posts on social media sites like Twitter and Facebook. The phishing goal is to get you to click on links that launch malware, which downloads to your device and essentially gives hackers free range to your sensitive information and privacy. To protect yourself, never respond to online requests for personally identifiable information such as your full social security number. In addition, do not complete forms within the body of an e-mail message. And, avoid clicking on the links of sensational posts on social media sites.
-
Avoid tricks that will hold your computer ransom. It’s true. Hackers have an arsenal of malware to infect your computer. Even your cloud files can be destroyed if you’re a victim to ransomware. That’s malware that holds your files hostage and demands payment for you to re-gain access. (As if the anti-virus subscription you paid for was not expensive enough). Hackers have even gone one step further with the encrypted CryptoLocker, which made ransomware headlines last year. How do you get infected? According to a Symantec blog posting, it’s the old enticing e-mail that you just gottah open trick AND then the ransomware infection downloads. The good news is that there is protection for malware/ransomware through security products like Symantec. Also, the e-Management CIO team recommends daily backups of your data to avoid the pain and inconvenience of losing or paying for access to your files.
-
Get training. But before you sign up for a class, accept the fact that you are important enough to be a target for online predators. Next, take advantage of possible free training available to you. Several government agencies such as the Small Business Administration (SBA) offer free training. One best practice is continuous cybersecurity training. At e-Management, for example, we have a commitment to cybersecurity readiness. One of the first things our employees learn in the training is: There is the possibility that someone will deliberately or accidentally attempt to steal, damage, or misuse the data in our computer system(s).
Remember, online security is 90% user and 10% technology. By the way, if your company needs support figuring out where you may be at risk and what you can do to improve your level of readiness, do . We can help.
Knowledge is protection.
You get it. Cybercrime is on the rise and you have to do something to protect yourself from the cyber-crooks. The recently relaunched e-Management blog will focus on technology and cybersecurity, providing useful tips to help you navigate the ever-changing landscape of apps, policy, privacy protection, and consumer tech. So, (1) how do you protect yourself from hackers? (2) Does the organization you work for have clear guidelines around cybersecurity? (3) What are other consumer technology or cyber-focused topics you’d like for the e-Management blog team to tackle?
Tags: CryptoLocker, cybersecurity, Dennis Powell, Hackers, Ola Sage, Phishing, ransomware, social engineering, tech
Posted in Corporate, Information Security, Internet/Intranet, IT Infrastructure, Lifestyle, Social Media | 22 Comments »
Five-Finger Discount?
Tuesday, January 6th, 2015
By Dennis Powell, e-Management
More than 3 million smartphones were stolen in 2013 according to Consumer Reports. What are you doing to protect your mobile devices?
Check the Urban Dictionary and you’ll find the phrase “5-finger discount.” The term refers to how stealing requires only one hand or five fingers. Not protecting your smartphone (Windows Phone, iPhone, Android, Blackberry etc.) is essentially allowing cyber predators and real-life thugs to steal your personal information or even your identity. Well, we can all agree that’s not good for anyone. So, we’ve pulled together these…
Five Tips for Protecting Your Smartphone to Counter the 5-Finger Discount
-
Curb Your App-etite: Apps can be practical, useful, fun, and convenient. But apps from shady sources can open you and your phone up to enormous risks. Word of advice from the FCC Smartphone Security Checker is to install apps from “trusted sources” only and be sure to “research” before downloading to determine the legitimacy of the app and app maker. An inability to curb your “app-etite” can lead to malicious software, viruses, stolen information, or a non-functioning smartphone. You’ve been warned!
-
Install Anti-Virus Software: Apps, games, and other fun downloads are popular with most smartphones users. But it is also important to download at least one antivirus app for added protection. If you are an Android user, check out for reviews of security apps. If you’re an iPhone fan, Security Today has a great article, which lists apps designed to safeguard your favorite iPhone or tablet.
-
Make Sure Your Smartphone Opens for Only You: HealthIT.gov offers a few tips for protecting your smartphone. One tip seems like a no brainer: Securing your smartphone by using some method of authentication. Yet, Consumer Reports National Research Center’s 2014 Annual State of the Net Survey shows that only 36% of all smartphone owners use a password, personal identification number, or some other authentication processes to verify the mobile phone user’s identity. Authentication is a simple precaution which locks out potential offline and online threats by requesting a password or some other form of authentication. We strongly recommend it for protection!
-
Turn It Off: offers common sense tips for protecting your phone on its website. One that may surprise you is turning off your Wi-Fi and Bluetooth® when you aren’t using either. Sophisticated hackers can easily connect to your smartphone and steal sensitive information through these connections.
-
Insure It: The CTIA-The Wireless Association® recommends that smartphone users consider insuring their mobile devices. Many wireless providers offer affordable insurance plans directly or through a third party vendor. An insurance plan could mean a free replacement of your phone if it is loss or even damaged. Are you clueless when it comes to anything insurance? Well, check out Suzanne Kantra’s Techlicious about how to go about choosing the best plan for you.
More Tips…
There are certainly more than five ways to protect yourself from theft and cyber breaches. For instance, many smartphone users install tracking apps and software that disables phones when devices go missing. (1) What tips have worked for you in protecting your smartphone investment? (2) How easy is it for others to access your mobile phone? (3) What would you do if your smartphone suddenly disappeared?
Tags: apps, CTIA, CyberRx, cybersecurity, data breach, Dennis Powell, Digital Trends, , Hackers, Ola Sage, Security Today, smartphone, wireless
Posted in Information Security, Internet/Intranet, Lifestyle, Social Media | 27 Comments »
Monday, December 8th, 2014
The Bletchley Circle makes our year-end list of favorite shows to binge-watch. What’s on your list? (Photo Source: http://blogs.weta.org )
By Colleen Schuler
Netflix! Instead of my annual recap of movies in cinema, I thought I’d share what my husband and I have been watching on Netflix. After all, the movies (in the theater) are so five minutes ago. Besides, Netflix is a great way to catch up on TV shows that you missed or find some gems you never knew existed. Now if this list seems heavily weighted towards the Brits, well, what can I say? They’re good!
The British Invasion
-
The Bletchley Circle: What would you do if you figured out that not only is a second killing going to take place but where? And if the authorities don’t believe you? This series (set in the early 1950s) follow four women—former WWII code breakers—as they solve crimes faster than the police. There are two seasons with three storylines; unfortunately it wasn’t renewed for a third.
-
Endeavour: The prequel to the Inspector Morse series…I love this younger version. A cerebral detective constable joins the Oxford police department and seems to annoy his colleagues for being so smart! Well done. Make sure you see the pilot of the series first (Endeavour, 2012). Four episodes per season. Don’t have Netflix? PBS also airs this series.
-
Inspector Lewis: Following in the footsteps of Inspector Morse…Inspector Lewis has a wry, witty sidekick in Detective Sergeant Hathaway as they solve crimes in present day Oxford. In its seventh season on PBS.
-
MI-5: This is an oldie but oh so good if you like the spy/espionage genre. Set in present day, this series is about the British domestic intelligence agency and their efforts to keep Britain safe. If you start this series, plan for the long haul—it spanned 10 seasons (86 episodes). But so worth it. (P.S. If you want to read a page-turning, engrossing can’t-put-down book from a real MI-5 agent, try to find The SpyCatcher by Peter Wright.)
The Eclectic Collection
-
Continuum: Time-traveling, mind-bending, twist, and turn plots! Kiera Cameron, a Vancouver police detective from 2077, travels back to 2012 to stop rebels from destroying her world. Get your popcorn ready; this is ideal for marathon sessions.
-
Longmire: Set in Wyoming, this series centers on a sheriff who’s back on the job after being widowed for a year. Of course, there’s a back story to that which unfolds as the series develops. He’s up for reelection and one of his deputies wants his job. Netflix has picked it up for a fourth season, set to air late 2015.
-
Annika Bengtzon: Crime Reporter: A Swedish series about a journalist who has a knack for digging out the real story. The show also shows how she deals with her family life. Only six episodes, English subtitles.
Your Streaming Picks
Those are my Netflix picks. As more and more of us are cutting the cable-cord and turning to streaming services like Netflix, Amazon Instant Video, and Hulu Plus, there are so many options for binge-watching online serials, back in the day TV shows, old movies, and even documentaries. (1) What is your favorite streaming service (e.g., Netflix, Hulu Plus, YouTube, Amazon)? (2) What are your favorite shows or programs to watch on Netflix and other streaming services?
Tags: , binge-viewing, binge-watching, blog, Colleen Schuler, , Hulu, Netflix, Ola Sage
Posted in Entertainment, Family, Internet/Intranet, Lifestyle | 15 Comments »
Wednesday, September 10th, 2014
By Dennis Powell, e-Management
Last month, e-Management blogged about the benefits of Google Hangouts. This time around, we’ve pulled together a handful of mobile apps that could enhance your smart phone or tablet experience. Without further ado, here is our 2014 list of apps for business (and play)…
WhatsApp has won over millions of messaging app fans in the USA and around the world. (Photo Credit: mashable.com)
-
WhatsApp: Facebook made news earlier in the year, when the social media giant purchased WhatsApp Messenger for $19 billion. Since that time, WhatsApp has won over millions of messaging app fans in the USA and around the world. Why? Well, the marketing team at WhatsApp says it’s because the app offers: Simple. Personal. Real Time Messaging. The app gives mobile users the power to send and receive messages without standard text messaging fees. WhatsApp also allows the creation of groups as well as the sharing of audio messages, video messages, and images without any data limitations. The app is available on practically all smartphones including iPhone, BlackBerry, Android, and Windows Phone. Business Application: Bryan Collins, who covers social media on his blog WorkReadPlay, suggests that WhatsApp can be a great customer service and communications tool for organizations. But business users should avoid guerrilla sales tactics, since using the app to sell may be a violation of users’ terms of agreement.
-
Dropbox: More than 300 million users use this app to “store, sync, and share” all of their documents as well as photographic, audio, and video files. Users can retrieve the files from anywhere and restrict access to files as needed. Misplaced or lost devices aren’t an issue for Dropbox. There is a function to “wipe” away sensitive data from the lost devices. Good news: Dropbox is free. But the “pro” version for home costs about $9 per month for 1 TB (1,000 GB) of space. That’s a lot of space! Plus, Dropbox works on Blackberry, iPhones, Kindle Fire, iPad and others tablets. Business Application: Small businesses and nonprofits who are looking for an affordable way to share large files with customers and staff may want to consider this app. Dropbox for Business pricing starts at $15 per month and comes complete with admin tools that help to protect businesses.
-
Quip: Fastcompany picked Quip as one app that small business owners need for a more productive 2014. Quip is a free collaboration app that empowers users to work on draft documents in “real-time.” Users can work offline and later upload documents, which is great if internet connectivity or access is limited. Furthermore, users can pull documents from a variety of sources including Dropbox, Google, Evernote, and email. Perhaps best of all, collaborators are notified when there are updates to the living document. Business Application: Quip is a great tool for small organizations who need a budget-friendly collaboration tool. Businesses can also use this tool to work on quick turnaround projects like quotes, proposals, presentations, and press releases.
-
Google Translate: This app is a convenient way to get a better handle on the local language when traveling. How does it work? Users simply “speak, type, write, or take a picture to translate” a foreign language. Google Translate allows users to download language packs to help avoid roaming charges or Wi-Fi connections. In addition to the usual Spanish, French, and German translations, this app also offers more than 75 languages including Haitian Creole, Punjabi, Khmer, Yoruba, and Zulu. This app has more than 1.2 million 5-star reviews and is available for Android and Apple devices (iPhone, iPad etc.). Business Applications: Translation tools for business travelers are always handy when someone is unfamiliar with the host language. The tool is extremely helpful for simple translation using speech-to-text technology for convenience. Beware, translations are sometimes inaccurate; so users may want to keep sentences short and simple.
-
Polaris Office: Polaris Office is like having the Microsoft Office Suite on your mobile device without having to pay for it. Polaris comes pre-loaded on many Android devices. But it is not limited to Google platform phones. The app won a PCMag’s Editors’ Choice Award. Like the Quip app, Polaris is also a great tool for collaboration. The app allows users to read MS Office documents without actually having the Office Suite software (e.g. Excel, PowerPoint, Word) installed on their device. In fact, users can create and edit files and later convert them to Microsoft documents on most any smart phone or mobile device. Business Application: This app is perfect for professionals who are without their trusty tablet, electronic notebook, or laptop. Users can access Microsoft presentations, spreadsheets, and documents from their smartphones. The app is free for Android users; but there is a small fee for the Apple version.
Apps-a-Million
There are nearly 1.4 million apps available in the Google Play store for android devices according to AppBrain. About.com says the number of apps for iPhones and iPad exceeded 1.2 million in June 2014. With so many apps available, we totally overlooked about 2 million. So, (1) what apps for business or play did we miss? (2) What apps do you use most often? (3) What platform has the better apps: Android (Google Play), iPhone (iTunes), Windows, Blackberry World, or Samsung?
+++
Summary: e-Management looks at five convenient mobile apps for business users.
Tags: Android, apps, Blackberry, Dennis Powell, Dropbox, , , iTunes, Ola Sage, Polaris, Quip, Samsung, Social Media, WhatsApp, Windows
Posted in Entertainment, Internet/Intranet, Lifestyle, Social Media | 19 Comments »
|
|