Archive for the ‘Corporate’ Category
Tuesday, June 21st, 2016
By Dennis Powell, e-Management
Is Big Data is another way of saying predatory online marketing? You decide.
Big data as the name suggests is all about large volumes of information. More and more schools, government agencies, retailers, and other organizations are analyzing big data to learn more about people. Big data players include Amazon, Facebook, and Google, to name a few. Naturally, consumer profiling by these and other companies has led many to be a little concerned about issues around privacy and has left other consumers frustrated because of what they see as predatory online marketing. Think about those ads that follow consumers everywhere online following an innocent search on Google or Bing. Yeah, that’s big data analytics at work. But is Big Data bad or good? We’ll let you decide…
The Potentially Bad Stuff…
-
Exclusion Based on Highly Sensitive Data: In a 2016 U.S. Federal Trade Commission (FTC) report (Big Data: A Tool for Inclusion or Exclusion?), the federal agency examines big data and fairness. The report raises concerns that companies may be making decisions by “incorporating errors and biases” into big data analytics. Such decisions, according to the report, could result in “potential discriminatory harms.” One example given is how analytics from social media “likes” could reveal sensitive information about consumers’ political affiliation, faith, and recreational habits (e.g. smoking, drinking, etc.). Sensitive information taken out of context could lead to excluding consumers from employment opportunities, services, and products.
-
Bad Guys Trying to Dupe Seniors (and Others) into Making Poor Decisions: Big data can be used by individuals and companies looking to scam consumers as well. The same FTC report gives examples of companies obtaining lists from people who respond to sweepstakes or ailing seniors. Apparently, these consumers may be the most susceptible to being victims of fraud.
-
Low-Income Consumers Getting Bad Deals: A Huffington Post article from Nathan Newman explains how big data can harm low-income shoppers. The article points to “free services” that come with the high-price of giving away personal information so that companies that use big data can “exploit” consumers. Examples of this is when finance companies single out low-income consumers by using targeted ads made possible by big data and then markets high-interest rate services such as payday and subprime loans to the audience. Big data obtained from free services and mobile apps can also lead to “price discrimination” where some consumers pay more for the exact same service. Well, that’s definitely not good.
The Potentially Good Stuff…
-
Better Products: Many companies are investing more and more marketing dollars to track what people say and do online—collecting information about what consumers like, dislike, and need. Data collected help companies launch new versions of cool stuff. People who get excited about the latest Samsung or Apple update can probably thank big data analytics for those innovations and new features like a smartphone that keeps working even after you drop it in water. What took them so long to get that one to market? *smiles*
-
Better Service: People do business with people they like. Big data helps companies, schools, and other organizations to tailor a better and arguably more personal experience. Writer Larry Alton points to the fact that organizations that leverage big data get their information from surveys, social media, and other online reactions to offer the best service based on your particular pet-peeves and preferences.
-
Better Deals & Decisions: Many consumers also benefit from websites and apps that use big data to pull together useful information. Think comparison shopping. For instance, couples who are planning to marry get a better idea of costs from a that estimates expenses of weddings. Many motorists cringe when there are signs of auto mechanical issues. Well, there are places to get accurate information on how much drivers should be paying for auto repairs. There’s Nextag® that gives shoppers the power to get the best deal on millions, that’s right millions of products. These convenient tools are all powered by big data analytics.
Your Thoughts…
Like any promising technology, big data analytics can be used to enhance customer experience or exploit vulnerable people. We’d love to hear from you: (1) What are your thoughts on big data? (2) How much information are you willing to give up to improve your customer experience or bring new products to market? (3) Where does your privacy fit into the big data conversation?
Tags: , analytics, Android, , apps, big data, Bing, Dennis Powell, , FTC, , HTC, iPhone, Motorola, Ola Sage, Samsung
Posted in Corporate, Entertainment, Information Security, Internet/Intranet, News | 18 Comments »
Monday, March 28th, 2016
By Dennis Powell, e-Management
Experts say cybersecurity is 90% YOU and only 10% technology. What are you doing to protect yourself from hackers?
Newsflash! There is no privacy on the Internet. I repeat: There is NO privacy on the Internet. Anyone with a web browser can see everything anyone has ever posted online! That’s according to the e‑Management Chief Information Officer (CIO) team (and numerous other cyber experts). Cyber experts say online security is 90% user and 10% technology. I know it sounds like a lot of responsibility. But securing the things stored on your Internet-enabled devices that are important to you (e.g., finances, pictures, intellectual property, work products, family stories) may be easier than you think.
Clearly, you should invest in anti-virus and anti-malware software or services. But that’s just 10% (technology) of the solution. The other 90%, remember, is you. Here are a few simple considerations to help you protect yourself from hackers.
-
Keep work and home separate. We are not talking about a work-life balance here. Keep your work and personal devices separate. Hackers will sometimes target you to steal valuable information about work projects or sensitive customer or client information. Oftentimes, the easiest way to hack a nonprofit, business, or government agency is through the organizations’ staff. Avoid using your smartphone for dual purposes, such as accessing your corporate enterprise network and visiting sites to download apps/games on the same device. Still, it may be best if you talk to your company’s or agency’s information technology (IT) or cybersecurity team about BYOD (Bring-Your-Own-Device) policies and best practices before accessing work products from home or downloading personal-use entertainment on business devices.
-
Be mindful of online phishing and social engineering scams. You’re only human. And that’s what hackers are counting on. They prey on admirable qualities in people, including being helpful and trusting of others. Clever and “social” hackers employ tactics such as having chats with you while claiming to be someone you would normally trust. In reality, their intentions are nefarious—potentially tricking you into giving away clues and facts to obtain sensitive information. Similarly, phishing scam artists carefully craft e-mails and posts on social media sites like Twitter and Facebook. The phishing goal is to get you to click on links that launch malware, which downloads to your device and essentially gives hackers free range to your sensitive information and privacy. To protect yourself, never respond to online requests for personally identifiable information such as your full social security number. In addition, do not complete forms within the body of an e-mail message. And, avoid clicking on the links of sensational posts on social media sites.
-
Avoid tricks that will hold your computer ransom. It’s true. Hackers have an arsenal of malware to infect your computer. Even your cloud files can be destroyed if you’re a victim to ransomware. That’s malware that holds your files hostage and demands payment for you to re-gain access. (As if the anti-virus subscription you paid for was not expensive enough). Hackers have even gone one step further with the encrypted CryptoLocker, which made ransomware headlines last year. How do you get infected? According to a Symantec blog posting, it’s the old enticing e-mail that you just gottah open trick AND then the ransomware infection downloads. The good news is that there is protection for malware/ransomware through security products like Symantec. Also, the e-Management CIO team recommends daily backups of your data to avoid the pain and inconvenience of losing or paying for access to your files.
-
Get training. But before you sign up for a class, accept the fact that you are important enough to be a target for online predators. Next, take advantage of possible free training available to you. Several government agencies such as the Small Business Administration (SBA) offer free training. One best practice is continuous cybersecurity training. At e-Management, for example, we have a commitment to cybersecurity readiness. One of the first things our employees learn in the training is: There is the possibility that someone will deliberately or accidentally attempt to steal, damage, or misuse the data in our computer system(s).
Remember, online security is 90% user and 10% technology. By the way, if your company needs support figuring out where you may be at risk and what you can do to improve your level of readiness, do . We can help.
Knowledge is protection.
You get it. Cybercrime is on the rise and you have to do something to protect yourself from the cyber-crooks. The recently relaunched e-Management blog will focus on technology and cybersecurity, providing useful tips to help you navigate the ever-changing landscape of apps, policy, privacy protection, and consumer tech. So, (1) how do you protect yourself from hackers? (2) Does the organization you work for have clear guidelines around cybersecurity? (3) What are other consumer technology or cyber-focused topics you’d like for the e-Management blog team to tackle?
Tags: CryptoLocker, cybersecurity, Dennis Powell, Hackers, Ola Sage, Phishing, ransomware, social engineering, tech
Posted in Corporate, Information Security, Internet/Intranet, IT Infrastructure, Lifestyle, Social Media | 22 Comments »
Wednesday, May 13th, 2015
By Colleen Schuler, e-Management
For Memorial Day, thousands visit the famous Iwo Jima statue at the Marine Corps Memorial located outside of Washington, DC. How will you honor the fallen this Memorial Day? Photo Source: https://goo.gl/lh4X3e
“It is for us, the living, rather to be dedicated here to the unfinished work which they have, thus far, so nobly carried on,” President Abraham Lincoln declared. “It is rather for us to be here dedicated to the great task remaining before us. That from these honored dead we take increased devotion to that cause for which they gave the last full measure of devotion – that we here highly resolve that these dead shall not have died in vain.”
The President, of course, was referring to the Union soldiers who had died five months earlier at the Battle of Gettysburg. It would be another 20 months of fighting before the last general of the Confederate Army surrendered.
Decoration Day Commences.
Three years after the Civil War ended, Memorial Day was created to honor the fallen soldiers on both sides of the conflict. After World War I, it was designated to honor all soldiers who died while serving their country. Originally known as Decoration Day (the soldiers’ graves were decorated) and celebrated on May 30, it wasn’t until 1971 with the passage of the National Holiday Act that it was moved to the fourth Monday in May. In 2000, President Clinton signed the National Moment of Remembrance Act designating “3:00 p.m. local time on Memorial Day each year as the National Moment of Remembrance, in honor of the men and women of the United States who died in the pursuit of freedom and peace.”
Yes, Memorial Day is in remembrance for the fallen. But I suggest we broaden our view. Let’s honor the memories of those who’ve fallen in service to our country by using the gifts and talents we have to help and serve the living. Everyone can do something.
Twenty dollars.
Perhaps you’ve heard of Myles Eckert, whose father, U.S. Army Sgt. Andy Eckert, died in Iraq when Myles was an infant. Last year, Myles found $20 in a restaurant parking lot outside of Toledo, Ohio. He was going to spend it on himself when he saw a man in uniform—Lt. Col. Frank Dailey of the Ohio Air National Guard. Instead, he gave the money to Dailey with a note: “Dear Soldier – my dad was a soldier. He’s in heaven now. I found this 20 dollars in the parking lot when we got here. We like to pay it forward in my family. It’s your lucky day! Thank you for your service. Myles Eckert, a gold star kid.” That’s a big heart for an 8-year-old.
Clear Water.
In 2007, fresh out of college on a ROTC scholarship, U.S. Army Capt. Benjamin Sklaver was sent to northeast Africa. In Uganda, he saw that clean water was vital for the health of the people, especially those living in small villages, and worked to provide that. When he came back to the States, he set up the to continue helping the Ugandans. Two years later, Sklaver was redeployed to Afghanistan, working in civil affairs doing much of the same work that he had done in Uganda. But he lost his life to a suicide bomber. His parents and friends continued the work of his foundation; eight years later they are still going strong.
Kick for Nick.
U.S. Army Pvt. Nick Madaras inspired many people to honor his memory—with a global reach. Madaras, a soccer aficionado and youth-soccer coach from Connecticut, had been deployed to Iraq. He found that soccer broke down barriers, especially with the Iraqi children. Madaras’ goal was to send soccer balls to the Iraqi children. But he was killed by a roadside bomb in 2006. A Korean War vet, Ken Dartley, read a local newspaper article about Madaras and started a soccer ball drive. That has evolved into the . People from forty-seven states have sent more than 42,000 soccer balls to 19 countries. Cal Holt, an eighth grader from Winston-Salem, N.C., saw a video about Madaras and started his own drive for a school project. He and his friends collected 33 soccer balls. They ended up in the hands of children from the African nation of Djibouti. Seeing pictures of the smiling children, Holt said, “Doing this, I’ll remember this for a long time.”
What a great way to honor Pvt. Madaras—a seemingly small act with a big impact.
What does Memorial Day mean to you?
The beginning of summer? A paid holiday? Great bargains? Blockbuster movies? Cookouts?
Let’s remember the fallen. Let’s resolve that those who gave their lives for our country will not have died in vain.
Let’s make it a day that inspires. What will you do?
Tags: charity, ClearWater Initiative, Colleen Schuler, , Kick for Nick Foundation, Memorial Day, Ola Sage
Posted in Corporate, Entertainment, Family, Leadership, Lifestyle, Travel, Uncategorized | 20 Comments »
Wednesday, March 18th, 2015
By Dennis Powell, e-Management
Building a company with great culture is one way to help your small business thrive. What other tips do you have for small business success?
It seems like we blog about everything under the sun…the best food, great travel destinations, social media, government agencies, and we can go on and on. We, however, haven’t focused on small businesses or entrepreneurs in a while. So, we wanted to share four tips that every small business and entrepreneur should consider for success.
-
Build a company with great culture. In an article on Monster.com, Michael Burchell, author of The Great Workplace—How to Build It, How to Keep It, And Why It Matters, gives a number of reasons why organizational culture can mean success for small businesses. At e-Management, our CEO strongly believes that culture starts at the top and makes it a priority for the company’s leadership to model the culture we want employees to experience and promote. Great work culture can reduce staff turnover. In addition, employees tend to be happier at companies with great culture and their happiness can mean customer care that stands out from the competition. Not to mention, great workplaces are oftentimes centers for creation and innovation. So, don’t underestimate the value of culture taking your business to the next level.
-
Reward your staff. A recent report from Bersin by Deloitte (formerly Bersin & Associates), The State of Employee Recognition in 2012, suggests that rewards programs have “a much more measurable role in business performance than previously believed.” Specifically, the research indicates businesses with defined recognition programs see a 14% improvement in “employee engagement, productivity and customer service” over organizations without formal staff acknowledgements. Employee recognition works at e-Management and is a key component of our management philosophy. We highlight staff achievement in a variety of ways. At our All-Hands Meetings held quarterly, we present awards to employees who have received commendations from clients and their peers. Award recipients are treated to a special awards dinner and other perks. In 2014, e-Management handed out more than 90 awards to staff.
-
Take risks! But, you have to be smart about it. Drew Hendricks, a contributor to Inc.com provides tips for knowing the difference between good risks and foolhardy endeavors. Hendricks asserts that all “successful business owners must learn the art of taking calculated (i.e. “good”) risks. Calculated risks come with identifying risks, anticipating risks, having mitigation plans in place, and having a strategic vision that includes financing, marketing, and sales among other components. Remember, when it comes to growing your business: No calculated risk. No glory.
-
Take cybersecurity seriously! Cybersecurity is a buzz word in business and in the news. Why? Well, it’s a big deal. The average cost of a targeted cyber-attack to a small business is $188,242, according to a 2010 survey from Symantec. And according to the National Cyber Security Alliance (NCSA), 60% of small companies go out of business within 6 months of a major cyber breach. Yet, many entrepreneurs and business owners don’t know what their exposure is or don’t have a response plan in place in the event that they are targets of hackers. At the very least, small businesses should learn about the new Critical Infrastructure Cybersecurity Framework from the National Institute of Standards and Technology (NIST) and find products like CyberRx that help to simplify and automate the framework for small business success.
Your Success in Business
Those are our tips. Now it’s time for you to sound off: (1) How important do you think organizational culture is to the success of businesses? (2) Do you think small business owners and their staff should be concerned about internet hackers? (3) What tips do you have for small business success?
Tags: CyberRx, cybersecurity, Dennis Powell, , entrepreneur, great place to work, Leadership, NCSA, NIST, Ola Sage, Small Business, smallbiz
Posted in Corporate, Economy, Information Security, Leadership, Small Business | 29 Comments »
Thursday, August 7th, 2014
By Sayoh Mansaray, e-Management
Did you know that the Google Hangouts app is good for social networking and online group conversations at home or work?
In today’s social media saturated world, it is nearly impossible to avoid using social media in the workplace. In fact, incorporating social media tools has many benefits, and can help employees continue to be productive by encouraging collaboration. Combining social media tools such as Google Hangouts with the workplace can also help bring different generations of workers together.
What is Google Hangouts?
Google Hangouts is a platform that offers video conferencing and instant messaging. The free service is similar to Skype, which is a program on which users can chat via webcam or instant messaging.
Nowadays most workers have demanding schedules, and face-to-face meetings can be nearly impossible to organize. With Google Hangouts, people can come together, as a group — virtually. The platform acts as a stand-in for face-to-face interaction, and allows employees to communicate. Users can access the platform from their personal computers, and can interact even if they are miles away from each other.
How do you use Google Hangouts?
Individual users first need to create a Gmail account. Once the Gmail account is created, the user is automatically given a Google+ account. Google+ is then used to log onto Google Hangouts.
What are the pros and cons to using Google Hangouts?
Pros…
- No cost to use the platform
- Easy to download and learn how to use
- Ability to mimic face to face interaction
- Allows users who are far away to participate
Cons…
- Limited number of people (15) can sign onto the hangout at one time
- Convincing “social media averse” coworkers to join in can be a challenge (although the ease of use is a great selling point)
What is an example of Google Hangouts being used in the professional world?
A federal program office facilitates Citizens’ Advisory Boards (CABs) across the country. One CAB uses Google Hangouts for some of its committee meetings. Board members who live further away are able to attend meetings that they may have otherwise had to miss. A significant portion of the board members are unaccustomed to social media, and have found Google Hangouts easy and convenient to use.
Where will Google Hangouts go in the future?
It is very likely Google Hangouts will continue to grow. The use of the platform will most likely become more widespread, especially as demands in the workplace become more challenging. (1) What are your thoughts on social media, especially Google Hangouts, at work? (2) Do you currently use Google Hangouts in the workplace, and if so, does it work well for you? (3) Where do you predict the platform will go in the future? (4) Do you think video conferencing will ever be able to completely replace face-to-face meetings?
Tags: , Generation Y, , hangouts, Ola Sage, Sayoh Mansaray, Social Media, workplace
Posted in Corporate, Entertainment, Internet/Intranet, Lifestyle, Social Media | 12 Comments »
|
|