Archive for RB

Everyone Snoops Thru Smartphones

Everyone Snoops Thru SmartphonesMobile device users lose almost 70 million smartphones per year in the U.S., about 30 percent of all the phones in use at any given time. According to one report only seven percent of the lost smartphones are recovered. Only 57 percent had any security, but 60 percent have confidential contact lists, emails, Internet and security codes and credentials for business apps or mobile-payment services.

Symantec logoEven if an honest person finds your mobile, security company Symantec (SYMC) says that the good Samaritan will look at the confidential data stored on the smartphone while trying to return it. The study (PDF) found that 96 percent of the people who found a mobile device planted by the security vendor peeked at personal data. People who found the smartphones:

  • Clicked on an app labeled “online banking” 43% of the time
  • Tried to run a remote-access/VPN app to access the fake network 49% of the time
  • Clicked on a filed named “HR salaries” 49% of the time
  • Opened a file named “saved passwords” 57% of the time
  • Checked social networking tools and personal e-mail 60% of the time
  • Accessed a folder labeled “private photos” 72% of the time
  • Checked out something on the lost mobile device 96% of the time

Online storage company Carbonite (CARB) reports that the data on a mobile device is valuable enough and the headaches involved in recovering it are big enough that 50 percent of Americans would rather give up all of a year’s vacation time than lose all the files on their smartphones.

rb-

Even though most Americans would give up their vacation then lose the data on their mobile devices they don’t take steps to prevent other from snooping through their data. Simplistic as it seems, one password will deter most casual snoops.Identity theft data lose and embarrassment can easily be prevented by using the password screen-lock that comes with all smartphones.

How to Set a Passcode

WikiHOW explains How to Set a Passcode on the iPad to prevent people from snooping through your Apple (AAPL) iPad2.

Open the “Settings” app and tap “General Settings”. Continue by opening “Passcode Lock” in the center box of options.
How to Set a Passcode on the iPad - Step 1

Scroll until you find the “Passcode” option, then tap it. If this is your first time enabling a passcode, “Turn Passcode On” will be the only selectable option. If your iPad supports Touch ID, this option will be called “Touch ID & Passcode.”

How to Set a Passcode on the iPad - Step 2

Turn Passcodes on by tapping the “Turn Passcode On” option.

How to Set a Passcode on the iPad - Step 3

Enter a six-digit passcode of your choosing. You’ll need to enter it again exactly the same way on the next screen to verify. Be sure that it is a combination you won’t easily forget, as well as one that is also hard for others to figure out. This has increased from 4 – 6 characters since I first posted this article in 2012.

How to Set a Passcode on the iPad - Step 4

Re-enter the passcode. Pay close attention as you type to avoid mistyping the passcode. If both your new passcodes match each other, you’ll be taken back to the “Passcode Lock” screen.

How to Set a Passcode on the iPad - Step 5

Press the lock button to lock your iPad. You still need to confirm that your passcode is active.

How to Set a Passcode on the iPad - Step 6
Swipe right on your iPad’s screen, then enter your passcode. Your iPad is now passcode-protected!You can change or remove your passcode at any time in the “Passcode” menu.

How to Set a Passcode on the iPad - Step 7

rb-

Apple has updated this process since I first wrote about putting a lock on your iPad in 2012.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers and anything else that catches his attention since 2005. You can follow him at LinkedInFacebook and Twitter. Email the Bach Seat here.

ITU Regs Bad for Cybersecurity

ITU Regs Bad for CybersecurityEmma Llansó at the Center for Democracy & Technology writes that the International Telecommunication Union is ill-suited to regulate cybersecurity. The United Nations-backed ITU will meet in December to try to expand its control over the Internet. The CDT believes that the issue of cybersecurity perfectly illustrates why the ITU should not be given expanded regulatory authority to include matters of Internet governance.

Center for Democracy & TechnologyThe UN body is holding the World Conference on International Telecommunications (WCIT) this December in Dubai, UAE to renegotiate the International Telecommunication Regulations (ITRs), the UN’s core telecommunications treaty. The ITRs were in 1988 and sets forth general principles for the operation of international telephony systems. The CDT reports that some Member States of the ITU want to use the WCIT to expand these regulations to Internet matters by amending the ITRs. The CDT and others have warned of the risks to online freedom and innovation if the UN is allowed to regulate the Internet. The CDT has released a paper (PDF) that examines in detail some of the proposals pending before the ITU relating to cybercrime and cybersecurity.

The CDT states that cybersecurity is undeniably a critical issue for the future of telecommunications and indeed for global commerce, development, and human rights. On the other hand, it is ill-suited to the kind of centralized, government-dominated policy-making that the ITU represents.

ITU logoCybersecurity requires agility: Given the pace of technological change, governmental bodies are not likely to be the source of effective technical solutions. The CDT predicts those solutions will emerge from multi-stakeholder efforts, involving ICT companies, technologists, academics, and civil society advocates, as well as governments.

Moreover, the cybersecurity issue inevitably leads straight into questions of human rights and governmental power: surveillance, privacy, and free expression. None of these are issues the ITU has any expertise in or any ability to assess and balance. The CDT suggests, rather than adopting vague wording that could be used by governments as justification for repressive measures, the ITU should endorse existing standards initiatives such as those underway at the IETF and continue to serve as one forum among many for the development of consensus-based, private sector-led efforts.

According to the CDT briefing, the Arab States regional group has offered a proposal to amend the ITRs to require Member States to “undertake appropriate measures” to address issues relating to “Confidence and Security of telecommunications/ICTs,” including “… online crime; controlling and countering unsolicited electronic communication (e.g Spam); and protection of information and personal data (e.g. phishing).” The governments of the middle-east have a history of manipulating the Internet to silence dissent.

Another example of why the UN should not control the Internet comes from the African Member States cybersecurity proposal which deals with data retention. The CDT reports the requirement will force communications companies to retain data about customers and communications for the benefit of the government rather than for business purposes.

UN against U.S. ConstitutionAnalysis by CDT says that this requirement goes against American criminal laws. This data retention law turns the presumption of innocence on its head since these cybersecurity data retention laws apply to every citizen regardless of whether they have committed a crime. Further, because data retention laws require service providers to store information that identifies people online, they threaten anonymity online, implicating the rights to both privacy and free expression.

The CDT writes that several cybersecurity proposals to amend the ITRs refer to the routing of communications. One proposal from the Arab States regional group would amend the ITRs to specify that “A Member State has the right to know how its traffic is routed.”

national securityThe proposal is justified on the grounds of security, according to the CDT which some Member States clearly interpret to mean national security. In its comments, Egypt argued, “…  Member States must be able to know the routes used … to maintain national security. If the [Member State] does [not] have the right to know or select the route in certain circumstances (e.g. for Security reasons), then the only alternative left is to block traffic from such destinations…”

The brief explains that Internet protocol (IP) networks transmit communications and interconnect entirely differently than traditional telephone networks; in that context the Arab States proposal to “know how traffic is routed” simply would not work and could fundamentally disrupt the operation of the Internet. If the Arab States proposal were applied to all Internet communications, the requirement that countries be able to “know” how every IP packet is routed to its destination would necessitate extensive network engineering changes, not only creating huge new costs but also threatening the performance benefits and network efficiency of the current system.

The brief goes on to explain that the Arab States proposal could also serve to legitimize governmental efforts to set up controls on the Internet traffic, by enshrining in an international treaty. Changes to IP routing rules to carry out the Arab States’ cybersecurity proposal could give the Member States more technical tools to use to block traffic to and from certain websites or nations. The regulations on routing that the Arab States proposal condones could take a variety of forms, from prohibiting certain IP addresses from being received inside a country to tracking users by IP addresses and blocking specific individuals from sending or receiving certain communications. “Knowledge” of IP routing could also encompass countries keeping track of what websites their citizens visit or with whom they email – all in the name of national security.

These types of regulations, which could be legitimized if the Arab States proposal is adopted, could threaten user rights to privacy and freedom of expression on the Internet.

rb-

The UN must not be allowed to expand its control over the Internet.  ITU regulation will be bad for cybersecurity.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

5 Tips To Make Meetings Less Painful

5 Tips To Make Meetings Less PainfulSalesCrunch has created a guide to “meetings that don’t suck.” The firm collected data from its management software, which tracks things like if people are really paying attention (looking at the screen or not), and if follow-up materials are opened. The BusinessInsider says the Web conferencing company crunched the numbers and came up with 5 good tips for the next time you call a meeting.

1. The 15-minute meeting. No meeting should last more than 30 minutes. After 30 minutes, they are giving one-quarter of their attention to something else.

2.  Everyone needs to talk.  If all participants talk, people will give the meeting 92% of their attention. If someone is yammering on, it gets only 78% of their attention.

3. Send follow-up materials within 5 minutes. Nearly two-thirds of attendees will read them within one day. A few more will be read the next day, but not many.

4. Shorter follow-up materials are better read. People will spend 52 seconds with a short follow-up. But they will spend only 10 seconds on a mega 100-slide deck.

5. Reach out via LinkedIn immediately. Nearly three-quarters of meeting attendees will accept a new LinkedIn connection after an online meeting.

rb-

Some of these I do better than others. I like to keep my meeting simple while trying to engage everybody in the conversation. My follow-ups tend to be more formal meeting notes so they take longer to get them out. So my meetings are less painful than others.

Don't Such at Meetings

© 2012 SalesCrunch

 

Related articles
  • Study finds web conferencing popular but underutilized (shoretel.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

IT Admins Switching Careers Due to Stress

IT Admins Switching Careers Due to StressHelp Net Security highlights a report from GFI Software which reports that 67% of IT administrators have considered switching careers due to job stress. IT administrators cited managers, users (employees), and tight deadlines as the biggest job stressors. GFI’s survey results (PDF) also revealed that IT professionals tend to work long overtime hours, with one-third working up to 10 extra weeks per year.

GFI Software logoThe independent blind survey, which polled 204 IT administrators in U.S. organizations ranging from 10 to more than 500 employees, gauged respondents’ stress levels at work and revealed their opinions on their main stressors, as well as how their stress level compares to friends and family, and how it affects their personal and professional lives.

Key findings from the GFI Software survey include:

  • Nearly 70% of all IT administrators surveyed consider their job stressful.
  • Greater than 67% of IT administrators consider switching careers on either an occasional (43%) or regular (25%) basis due to job stress.
  • 72% of respondents consider themselves either just as stressed as or the most stressed compared to others in their social circle.
  • While less than half (47%) of IT admins at companies with between 10 and 49 employees say their jobs are stressful, that number skyrockets to 83% when those at companies with between 50 and 99 employees are polled, representing the most stressed group in the respondent base.
  • The top three sources of stress for IT admins are management (28%), tight deadlines (20%), and the users they support (18%).
  • IT admins in the Northeast are the most stressed in the country (74%). Midwesterners are the least stressed, with nearly two-thirds (64%) still saying their job is stressful.

their job has affected their personal lifeIn addition to the stressors themselves, IT admins also told GFI that they routinely put in many overtime hours beyond the traditional 40-hour workweek. More than one in three (36%) say they work eight hours or more of overtime during an average week, which adds up to nearly 10 extra weeks per year.

Nearly 85% of respondents feel as though their job has affected their personal life in some way. According to the survey results, respondents have:

  • Lost sleep over work (42%)
  • Missed out on social functions (40%)
  • Missed time with their kids (39%)
  • Canceled commitments to friends and family due to work (35%).

Additionally, many GFI survey respondents say their jobs have even affected their health. Nearly one in four (22 percent) say they don’t feel great physically and 20 percent say they have experienced stress-related health issues, such as high blood pressure.

rb-

The article concludes with Phil Bousfield, general manager of GFI Software’s Infrastructure Business Unit who says; “IT is a critical component of a company’s success.” He says, “firms … need to take these findings as a wake-up call, and ensure their IT staff is supported, productive, and armed with the tools they need to be successful. Doing so will deliver business value and help IT admins have a better work-life balance.”

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tech Labor Day

Tech Labor DayToday is Labor Day in the U.S. The U.S. Department of Labor says Labor day is dedicated to the social and economic achievements of American workers. Outplacement firm Challenger, Gray & Christmas summed up the social and economic achievements of American tech workers recently. Their report stated that in the first half of 2012, layoffs in the technology sector hit their highest levels since 2009. There were more than 51,000 cuts announced by the end of June.

According to CRN, most of the layoffs came from the biggest firms. (rb- I kept a butcher’s toll of tech layoffs in 2009. The first half of 2012 seems just as grim.)

HP – Leads the body count in 2012 with its planned 27,000-plus layoffs. HP (HPQ) made the announcement in May, saying it would cut about 8% of its workforce over the next two years.

Nokia – The downward spiral continues for Nokia (NOK) with the announcement that it will slash 10,000 jobs. The NYT estimated the cuts to be around 19% of its worldwide workforce, by the end of 2013.

Sony In April Sony (SNE) said it would slash about 6 percent of its global workforce. That about 10,000 job cuts in an effort called “One Sony.” The cuts are said to refocus the company around its digital imaging, gaming, and mobile businesses. Sony also announced cuts at Sony Mobile Communications its mobile handset division. They plan to lay off 15% of its workforce or about 1,000 people. According to TechCrunch, the process is due to complete by March 2014.

Google – In a long-expected move, Google (GOOG) confirmed it would ax about 4,000 jobs from its Motorola Mobility subsidiary. This cut represents about 20% of Motorola’s 20,000-employee headcount. Google said that some 90 former Motorola facilities would be closed down.

Panasonic – In May, Panasonic (PCRFY) announced it would cut another 7,000 staff after announcing in April 2011 plans to cut 17,000 jobs over two years.

Research In Motion – Former king of smartphones, Research In Motion (RIMM) has suffered setback after setback in the face of Apple and Android competition. RIM early this year warned of workforce reductions, and in mid-June, several reports held that those reductions had already begun, in small batches of 10-or-so employees. New reports in August stated that RIM will cut some 3,000 other jobs this month.

Olympus –  CNET reports that Olympus (OCPNY) will cut 2,700 employees from its global workforce between now and March 31, 2014.

Yahoo – Back in April Yahoo (YHOO) cut about 2,000 employees across all the major units of the company. CRN speculates that Yahoo’s job cutting will grow as new CEO Marissa Mayer gets her feet wet.

Lexmark – Lexmark (LXK), the printer maker is jettisoning its inkjet printers and laying off 1,700 workers as paper becomes increasingly passe in an age of online photo albums on Internet hangouts like Facebook and Pinterest according to MercuryNews.com.

Cisco – In mid-July, Cisco (CSCO) confirmed 1,300 more job cuts, about 2 percent of its global workforce.

Activision – Activision (ATVI) subsidiary Blizzard Entertainment, maker of World of Warcraft announced that it will cut its global workforce by 600 employees Gamespot reported in February.

Best Buy logoBest Buy – CNET reports that the retail giant has decided to cut 650 Geek Squad workers. Best Buy (BBY) confirmed to Minneapolis-St. Paul news station KARE 11 the nationwide layoffs were effective August 1.

Logitech – the $2.3 billion peripherals king has had Logitech’s financial struggles. In June, Logitech (LOGI) said it would cut about 450 jobs, roughly 13 percent of its global workforce.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.