e-Management brings commitment, expertise and proven success to every opportunity.
Solutions

Archive for the ‘Information Security’ Category

Is Big Data a Big Deal?

Tuesday, June 21st, 2016

By Dennis Powell, e-Management

Is Big Data is another way of saying predatory online marketing? You decide.

Is Big Data is another way of saying predatory online marketing? You decide.

Big data as the name suggests is all about large volumes of information. More and more schools, government agencies, retailers, and other organizations are analyzing big data to learn more about people. Big data players include Amazon, Facebook, and Google, to name a few. Naturally, consumer profiling by these and other companies has led many to be a little concerned about issues around privacy and has left other consumers frustrated because of what they see as predatory online marketing. Think about those ads that follow consumers everywhere online following an innocent search on Google or Bing. Yeah, that’s big data analytics at work. But is Big Data bad or good? We’ll let you decide…

The Potentially Bad Stuff…

  • Exclusion Based on Highly Sensitive Data: In a 2016 U.S. Federal Trade Commission (FTC) report (Big Data: A Tool for Inclusion or Exclusion?), the federal agency examines big data and fairness. The report raises concerns that companies may be making decisions by “incorporating errors and biases” into big data analytics. Such decisions, according to the report, could result in potential discriminatory harms.” One example given is how analytics from social media “likes” could reveal sensitive information about consumers’ political affiliation, faith, and recreational habits (e.g. smoking, drinking, etc.). Sensitive information taken out of context could lead to excluding consumers from employment opportunities, services, and products.
  • Bad Guys Trying to Dupe Seniors (and Others) into Making Poor Decisions: Big data can be used by individuals and companies looking to scam consumers as well. The same FTC report gives examples of companies obtaining lists from people who respond to sweepstakes or ailing seniors. Apparently, these consumers may be the most susceptible to being victims of fraud.
  • Low-Income Consumers Getting Bad Deals: A Huffington Post article from Nathan Newman explains how big data can harm low-income shoppers. The article points to “free services” that come with the high-price of giving away personal information so that companies that use big data can “exploit” consumers. Examples of this is when finance companies single out low-income consumers by using targeted ads made possible by big data and then markets high-interest rate services such as payday and subprime loans to the audience. Big data obtained from free services and mobile apps can also lead to “price discrimination” where some consumers pay more for the exact same service. Well, that’s definitely not good.

The Potentially Good Stuff…

  • Better Products: Many companies are investing more and more marketing dollars to track what people say and do online—collecting information about what consumers like, dislike, and need. Data collected help companies launch new versions of cool stuff. People who get excited about the latest Samsung or Apple update can probably thank big data analytics for those innovations and new features like a smartphone that keeps working even after you drop it in water. What took them so long to get that one to market? *smiles*
  • Better Service: People do business with people they like. Big data helps companies, schools, and other organizations to tailor a better and arguably more personal experience. Writer Larry Alton points to the fact that organizations that leverage big data get their information from surveys, social media, and other online reactions to offer the best service based on your particular pet-peeves and preferences.
  • Better Deals & Decisions: Many consumers also benefit from websites and apps that use big data to pull together useful information. Think comparison shopping. For instance, couples who are planning to marry get a better idea of costs from a that estimates expenses of weddings. Many motorists cringe when there are signs of auto mechanical issues. Well, there are places to get accurate information on how much drivers should be paying for auto repairs. There’s Nextag® that gives shoppers the power to get the best deal on millions, that’s right millions of products. These convenient tools are all powered by big data analytics.

Your Thoughts…

Like any promising technology, big data analytics can be used to enhance customer experience or exploit vulnerable people. We’d love to hear from you: (1) What are your thoughts on big data?  (2) How much information are you willing to give up to improve your customer experience or bring new products to market? (3) Where does your privacy fit into the big data conversation?

Cybersecurity is mostly about you…

Monday, March 28th, 2016

By Dennis Powell, e-Management

cyber attacks

Experts say cybersecurity is 90% YOU and only 10% technology. What are you doing to protect yourself from hackers?

Newsflash! There is no privacy on the Internet. I repeat: There is NO privacy on the Internet. Anyone with a web browser can see everything anyone has ever posted online! That’s according to the e‑Management Chief Information Officer (CIO) team (and numerous other cyber experts). Cyber experts say online security is 90% user and 10% technology. I know it sounds like a lot of responsibility. But securing the things stored on your Internet-enabled devices that are important to you (e.g., finances, pictures, intellectual property, work products, family stories) may be easier than you think.

Clearly, you should invest in anti-virus and anti-malware software or services. But that’s just 10% (technology) of the solution. The other 90%, remember, is you.  Here are a few simple considerations to help you protect yourself from hackers.

  1. Keep work and home separate. We are not talking about a work-life balance here. Keep your work and personal devices separate. Hackers will sometimes target you to steal valuable information about work projects or sensitive customer or client information. Oftentimes, the easiest way to hack a nonprofit, business, or government agency is through the organizations’ staff. Avoid using your smartphone for dual purposes, such as accessing your corporate enterprise network and visiting sites to download apps/games on the same device. Still, it may be best if you talk to your company’s  or agency’s information technology (IT) or cybersecurity team about  BYOD (Bring-Your-Own-Device) policies and best practices before accessing work products from home or downloading personal-use entertainment on business devices.
  2. Be mindful of online phishing and social engineering scams. You’re only human. And that’s what hackers are counting on. They prey on admirable qualities in people, including being helpful and trusting of others. Clever and “social” hackers employ tactics such as having chats with you while claiming to be someone you would normally trust. In reality, their intentions are nefarious—potentially tricking you into giving away clues and facts to obtain sensitive information. Similarly, phishing scam artists carefully craft e-mails and posts on social media sites like Twitter and Facebook. The phishing goal is to get you to click on links that launch malware, which downloads to your device and essentially gives hackers free range to your sensitive information and privacy. To protect yourself, never respond to online requests for personally identifiable information such as your full social security number. In addition, do not complete forms within the body of an e-mail message. And, avoid clicking on the links of sensational posts on social media sites.
  3. Avoid tricks that will hold your computer ransom. It’s true. Hackers have an arsenal of malware to infect your computer. Even your cloud files can be destroyed if you’re a victim to ransomware. That’s malware that holds your files hostage and demands payment for you to re-gain access. (As if the anti-virus subscription you paid for was not expensive enough). Hackers have even gone one step further with the encrypted CryptoLocker, which made ransomware headlines last year. How do you get infected? According to a Symantec blog posting, it’s the old enticing e-mail that you just gottah open trick AND then the ransomware infection downloads. The good news is that there is protection for malware/ransomware through security products like Symantec. Also, the e-Management CIO team recommends daily backups of your data to avoid the pain and inconvenience of losing or paying for access to your files.
  4. Get training. But before you sign up for a class, accept the fact that you are important enough to be a target for online predators. Next, take advantage of possible free training available to you. Several government agencies such as the Small Business Administration (SBA) offer free training. One best practice is continuous cybersecurity training. At e-Management, for example, we have a commitment to cybersecurity readiness. One of the first things our employees learn in the training is: There is the possibility that someone will deliberately or accidentally attempt to steal, damage, or misuse the data in our computer system(s).

Remember, online security is 90% user and 10% technology. By the way, if your company needs support figuring out where you may be at risk and what you can do to improve your level of readiness, do . We can help.

Knowledge is protection.

You get it. Cybercrime is on the rise and you have to do something to protect yourself from the cyber-crooks. The recently relaunched e-Management blog will focus on technology and cybersecurity, providing useful tips to help you navigate the ever-changing landscape of apps, policy, privacy protection, and consumer tech. So, (1) how do you protect yourself from hackers? (2) Does the organization you work for have clear guidelines around cybersecurity? (3) What are other consumer technology or cyber-focused topics you’d like for the e-Management blog team to tackle?

Four-Success

Wednesday, March 18th, 2015

By Dennis Powell, e-Management

Building a company with great culture is one way to help your small business thrive. What other tips do you have for small business success?

Building a company with great culture is one way to help your small business thrive. What other tips do you have for small business success?

It seems like we blog about everything under the sun…the best food, great travel destinations, social media, government agencies, and we can go on and on. We, however, haven’t focused on small businesses or entrepreneurs in a while. So, we wanted to share four tips that every small business and entrepreneur should consider for success.

  • Build a company with great culture. In an article on Monster.com, Michael Burchell, author of The Great Workplace—How to Build It, How to Keep It, And Why It Matters, gives a number of reasons why organizational culture can mean success for small businesses. At e-Management, our CEO strongly believes that culture starts at the top and makes it a priority for the company’s leadership to model the culture we want employees to experience and promote. Great work culture can reduce staff turnover. In addition, employees tend to be happier at companies with great culture and their happiness can mean customer care that stands out from the competition. Not to mention, great workplaces are oftentimes centers for creation and innovation. So, don’t underestimate the value of culture taking your business to the next level.
  • Reward your staff. A recent report from Bersin by Deloitte (formerly Bersin & Associates), The State of Employee Recognition in 2012, suggests that rewards programs have “a much more measurable role in business performance than previously believed.” Specifically, the research indicates businesses with defined recognition programs see a 14% improvement in “employee engagement, productivity and customer service” over organizations without formal staff acknowledgements. Employee recognition works at e-Management and is a key component of our management philosophy. We highlight staff achievement in a variety of ways. At our All-Hands Meetings held quarterly, we present awards to employees who have received commendations from clients and their peers. Award recipients are treated to a special awards dinner and other perks. In 2014, e-Management handed out more than 90 awards to staff.
  • Take risks! But, you have to be smart about it. Drew Hendricks, a contributor to Inc.com provides tips for knowing the difference between good risks and foolhardy endeavors. Hendricks asserts that all “successful business owners must learn the art of taking calculated (i.e. “good”) risks. Calculated risks come with identifying risks, anticipating risks, having mitigation plans in place, and having a strategic vision that includes financing, marketing, and sales among other components. Remember, when it comes to growing your business: No calculated risk. No glory.
  • Take cybersecurity seriously! Cybersecurity is a buzz word in business and in the news. Why? Well, it’s a big deal. The average cost of a targeted cyber-attack to a small business is $188,242, according to a 2010 survey from Symantec. And according to the National Cyber Security Alliance (NCSA), 60% of small companies go out of business within 6 months of a major cyber breach. Yet, many entrepreneurs and business owners don’t know what their exposure is or don’t have a response plan in place in the event that they are targets of hackers. At the very least, small businesses should learn about the new Critical Infrastructure Cybersecurity Framework from the National Institute of Standards and Technology (NIST) and find products like CyberRx that help to simplify and automate the framework for small business success.

Your Success in Business
Those are our tips. Now it’s time for you to sound off:  (1) How important do you think organizational culture is to the success of businesses? (2) Do you think small business owners and their staff should be concerned about internet hackers? (3) What tips do you have for small business success?

Five-Finger Discount?

Tuesday, January 6th, 2015

By Dennis Powell, e-Management

More than 3 million smartphones were stolen in 2013 according to Consumer Reports. What are you doing to protect your mobile devices?

More than 3 million smartphones were stolen in 2013 according to Consumer Reports. What are you doing to protect your mobile devices?

Check the Urban Dictionary and you’ll find the phrase “5-finger discount.” The term refers to how stealing requires only one hand or five fingers. Not protecting your smartphone (Windows Phone, iPhone, Android, Blackberry etc.) is essentially allowing cyber predators and real-life thugs to steal your personal information or even your identity. Well, we can all agree that’s not good for anyone. So, we’ve pulled together these…

Five Tips for Protecting Your Smartphone to Counter the 5-Finger Discount

  1. Curb Your App-etite: Apps can be practical, useful, fun, and convenient. But apps from shady sources can open you and your phone up to enormous risks. Word of advice from the FCC Smartphone Security Checker is to install apps from “trusted sources” only and be sure to “research” before downloading to determine the legitimacy of the app and app maker. An inability to curb your “app-etite” can lead to malicious software, viruses, stolen information, or a non-functioning smartphone. You’ve been warned!
  2. Install Anti-Virus Software: Apps, games, and other fun downloads are popular with most smartphones users. But it is also important to download at least one antivirus app for added protection. If you are an Android user, check out for reviews of security apps. If you’re an iPhone fan, Security Today has a great article, which lists apps designed to safeguard your favorite iPhone or tablet.
  3. Make Sure Your Smartphone Opens for Only You: HealthIT.gov offers a few tips for protecting your smartphone. One tip seems like a no brainer: Securing your smartphone by using some method of authentication. Yet, Consumer Reports National Research Center’s 2014 Annual State of the Net Survey shows that only 36% of all smartphone owners use a password, personal identification number, or some other authentication processes to verify the mobile phone user’s identity. Authentication is a simple precaution which locks out potential offline and online threats by requesting a password or some other form of authentication. We strongly recommend it for protection!
  4. Turn It Off: offers common sense tips for protecting your phone on its website. One that may surprise you is turning off your Wi-Fi and Bluetooth® when you aren’t using either.  Sophisticated hackers can easily connect to your smartphone and steal sensitive information through these connections.
  5. Insure It: The CTIA-The Wireless Association® recommends that smartphone users consider insuring their mobile devices. Many wireless providers offer affordable insurance plans directly or through a third party vendor. An insurance plan could mean a free replacement of your phone if it is loss or even damaged. Are you clueless when it comes to anything insurance? Well, check out Suzanne Kantra’s Techlicious about how to go about choosing the best plan for you.

More Tips…
There are certainly more than five ways to protect yourself from theft and cyber breaches. For instance, many smartphone users install tracking apps and software that disables phones when devices go missing. (1) What tips have worked for you in protecting your smartphone investment? (2) How easy is it for others to access your mobile phone? (3) What would you do if your smartphone suddenly disappeared?

Don’t Be a Target

Wednesday, February 12th, 2014

By Dennis Powell, e-Management

In response to a significant data breach of its systems during the holiday season, Reuters reported last week that Target is investing more than $100M in a "smart card" program, which takes advantage of more secure credit/debit cards that uses microprocessor chips.

In response to a significant data breach of Target's systems during the holiday season, Reuters reported last week that the retailer is investing more than $100M in a "smart card" program, which takes advantage of more secure credit/debit cards that uses microprocessor chips.

Recently news outlets around the country reported large hotels experiencing significant data breaches resulting in customers debit and credit card information being misused. During the holidays, large retailers reported they had been victims of data breaches exposing tens of millions of consumers to financial risk. It seems like everywhere you look someone is stealing sensitive information. So what can consumers do to protect themselves from becoming a target of cyber fraud, whether online or offline? Look no further, we’ve pulled together a short list of suggestions designed to help consumers.

  1. Replace bank cards immediately: If you hear of a data breach including debit or credit cards at a retailer you’ve used, you may want to call your banking institution and request replacements. When it comes to protecting yourself from cyber criminals, it pays to take immediate action, before they do!
  2. Consider signing up for fraud monitoring services: Providers of fraud detection solutions offer a variety of options for consumers. Fraud monitoring services may include bank account protection, e-mail alerts for suspicious activities, and insurance protection some up to $1 million. If you don’t know where to start searching for monitoring solutions, check out the online which gives side-by-side comparisons. Be sure to call your financial institutions before purchasing new services, because you may already be covered.
  3. Manage passwords and PINs: Changing your password periodically can help to protect your online accounts and mobile apps from hackers. It’s a good idea to retire passwords every 90 days or more frequently if you believe you are at risk for fraud. Be sure to create strong alphanumeric passwords. In fact, passwords are strongest when they have at least one special character (e.g., #, $, % etc.) and an uppercase letter. Additionally, if you hear of data breaches involving any brick and mortar or online retailers you’ve accessed, then consider changing your personal identification numbers (PINs).
  4. Be mindful of the pitfalls of the web: The Internet is the number one source for malware distribution today. Malware is software that can be used to steal sensitive information from PCs, smartphones, and other tech devices. The malicious software can also disrupt your computer’s overall performance and operation. In addition to malware, cyber thugs are using evolving techniques and technologies to rip off your information (identity) or your money. So, be careful about providing personal and sensitive information to websites; and be extra cautious of unexpected or strange invitations from social media sites (Facebook, Tumblr, Twitter, etc.) and other websites. You should also be aware that your PC, tablet, or smartphone can become infected by viruses from instant messenger-type services and apps.
  5. Use caution when accessing free wireless or public Internet connections: Many wireless (Wi-Fi) hot spots of your favorite coffee house, bookstore, or hotel may not be secure, which can invite hackers to sensitive information stored on your tablets, PCs, and smartphones. So if you are accessing the Internet using free or public wireless, you may want to visit encrypted websites only. The Federal Trade Commission’s OnGuardOnline.gov site offers up a few more tips for identifying encrypted websites and protecting yourself on public Wi-Fi systems.

We could go on and on…
There are so many ways to protect personal information from cyber criminals and identity thieves. Education is a good start. It is a great idea to share with the entire family the importance of being savvy in an age of data breaches. The Consumer Federation of America operates IDTheft.org, which offers additional tips to consumers about protection against fraud in the Electronic Age. So, (1) what would you do if you were suddenly a victim of a cyber crime or identity theft? (2) Have you or a loved-one been a victim of identity theft? (3) What tools are you currently using to protect yourself?