Featured Posts

<< >>

Master Email for Business Efficiency

Discover how mastering email communication can boost business efficiency, avoid common pitfalls, and ensure secure, respectful online interactions.

Turkey Revenge

The turkeys are pissed this Thanksgiving they are seeking revenge.

Germs Infest 60% of Americas Phones

60% of Americans sleep with their phones, harboring germs. Cleaning regularly with UV sanitizer or alcohol wipes can help keep your phone and bed germ-free.

Smartphone Sanitizing: A Practical Guide

Securely erase personal data from your old smartphone before recycling. Protect your identity from hackers—easy steps to follow.

Why Soft Skills Matter in Today’s Job Market

Boost your career with essential soft skills like communication, teamwork, and emotional intelligence. Learn why they’re crucial for workplace success.

Seven Social Engineering Classics

Seven Social Engineering ClassicsSocial engineering describes various non-technical attack techniques cybercriminals use to manipulate users. The attackers hope the user will bypass security or other business process protocols, perform harmful actions, or disclose sensitive information. Beware of these social engineering classics.

Business Email Compromise

Business Email CompromiseDon’t get fooled by official-looking emails even though the email appears to be work-related. Subject lines such as “Invoice Attached” or “Here’s the file you needed” might be a social engineering classic. To be sure, you should hover your cursor over email addresses and links before clicking to see if the sender and type of file are legitimate. BEC is the most costly form of cybercrime. It stems from faked emails called “Business Email Compromise” or BEC scams. A typical BEC scam involves phony emails in which the attacker spoofs a message from an executive at a company and tricks someone into wiring funds to the fraudsters.

VishingVishing

Corporate phone systems are often set up to forward voice mail audio files to employees’ inboxes. While this is convenient, forwarding the files can be risky. It makes it harder to determine if the email is phony or legit. Since 2014, scammers have been installing malicious software through emails designed to look like internal voicemail messages, making vishing a social engineering classic.

With vishing, cybercriminals use an urgent or alarming voicemail message to try to get potential victims to call back with their personal information. Fake caller ID information is often used to make the calls appear to be from a legitimate organization or business.

Free Stuff, a social engineering classic

Free pizzaFree Stuff is one of the oldest social engineering classics. Most people can’t resist free Stuff, from pizza to software downloads, and they will click just about any link to get it. Of course, nothing is truly free. Sophisticated attackers might send a link to genuine free software, but they’re sending you through their website, which means you may get infected or compromised.

Baiting

Baiting is a variant of “Free Stuff.” The attacker hopes to trick their victims into executing code by piquing their curiosity or convincing them to run hardware or software with hidden malware. For example, innocent-looking USB sticks handed out at a conference or casually “dropped” in the parking could contain malware. They then detonate when the curious user plugs it into their PC. This is how Stuxnet attacked the Iranian nuclear program.

Quid pro quo social engineering classic

Seven Social Engineering ClassicsAnother version of “Free Stuff.” In Latin, Quid pro quo means “something for something.” In exchange, the attacker offers something of genuine worth to the victim and will work their way into the target’s network. An example: The attacker poses as tech support and solves a problem for you, then convinces you to type in a line of code that serves as a “backdoor.” On the other hand, it may be as simple as trading a candy bar in exchange for a password!

Waterholing

This attack plants malware on a website you and your colleagues frequently visit. The next time you surf the site, the malware—such as a remote-access Trojan or RAT—is downloaded to your computer. And just like that, the attacker can begin exfiltrating data from your employer’s network.

Pretexting

Pretexting is another form of social engineering in which attackers focus on creating a fabricated scenario that they can use to try to steal their information. It is a true con game. It relies on the crook fostering a sense of trust in the victim.

Pretexting

Pretexting can also impersonate co-workers, police, banks, or tax authorities. It pretends to be any individual who could have perceived authority or right-to-know in the targeted victim’s mind. In some cases, all that is needed is an authoritative voice, an earnest tone, and an ability to think on one’s feet to create a pretext scenario.

Stay safe out there!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Why Do We Call Them Uppercase?

Why Do We Call Them Upper Case?The typical U.S. user can have up to 130 online accounts and hopefully, they have 130 different passwords on these accounts. When setting up the 130 different passwords on these 130 accounts – you have undoubtedly seen the hate message

Password must include at least one upper case letter, one lower case letter, a number, and a special character.

Why is it called an uppercase or lowercase letter?

It is Gutenberg’s fault

Printing pressThe story goes back to Gutenberg‘s innovation of moveable type and the printing press (1450 A.D.). With Gutenberg’s printing press the compositor (“person who sets the type or text for printing”) stored the individual pieces of metal type in boxes called cases. The smaller letters (along with the type for punctuation and spaces), which were used most often, were kept in a lower case that was easier to reach. Capital letters, which were used less frequently, were kept in an upper case. Because of this old storage convention, we still refer to small letters as lowercase and capital letters as uppercase.

Upper print type case

Lower  print type case

Notice the uppercase letters had slots of equal size, while the lowercase letters (more often used) had slots proportional to their frequency of use (in English). 

The terms quickly became convention, because then a typesetter from one press could quickly adapt to another press. Now the terms are so generic that they are used even in handwriting instruction.

 

No more uppercase in passwords

use longer passwords or passphrases of 15 or more characters without requiring uppercase, lowercase or special charactersFortunately, the tide against using case as a password complexity factor has turned. The National Institute of Standards and Technology (NIST) now recommends everyone use longer passwords or passphrases of 15 or more characters without requiring uppercase, lowercase or special characters. NIST 800-63B says enforcing unnecessary password complexity requiring a mix of special characters, numbers and uppercase letters is a practice that can stop.

rb-

The distinction between uppercase and lowercase letters doesn’t exist in all languages, though. Certain Eastern and Asian writing systems, including certain Indian, Chinese, and Japanese alphabets, do not distinguish between uppercase and lowercase letters.

Stay safe out there!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Under Water Data Center Resurfaces

Under Water Data Center Resurfaces– Updated – 07/07/2024 – Microsoft has discontinued its efforts to build a data center on  the sea floor. “I’m not building subsea data centers anywhere in the world,” Noelle Walsh, the head of Microsoft’s Cloud Operations and Innovation division, told DatacenterDynamics.

Two years ago, Microsoft sank a data center half a mile off Scotland’s Orkney Islands under 117 feet of North Sea water. Earlier this week, they dredged the shipping container-size data center of 864 servers and 27.6 petabytes of storage back to the surface. Now that it has resurfacedMicrosoft (MSFT) researchers are studying how it survived its trip into Davy Jone’s locker and the trip can tell us about land-loving data centers.

Lower failure rate

Microsoft logoTheir first conclusion is that the cylinder with servers packed in like sardines had a lower failure rate than a conventional data center. Only eight out of the 855 servers on board had failed. Ben Cutler, a project manager in Microsoft’s Special Projects research group who leads Project Natick, said in a presser,

Our failure rate in the water is one-eighth of what we see on land.

The MSFT team is speculating that the greater reliability may be connected to the fact that there were no humans on board.  Microsoft’s John Roach explained:

people bump and jostle components,The team hypothesizes that the atmosphere of nitrogen, which is less corrosive than oxygen, and the absence of people to bump and jostle components, are the primary reasons for the difference. If the analysis proves this correct, the team may be able to translate the findings to land data centers.”They believe that land-loving data centers often run into issues like corrosion from oxygen, humidity and temperature fluctuations. and bumps and jostles from people who replace broken components.

Microsoft "Northern Isles"

Alternate power sources for data centers

Project Natick is also about addressing the huge energy demands of data centers as more and more of our data is stored in the cloud. All of Orkney’s electricity comes from alternate power sources, wind and solar power, which was not a problem for the underwater data center “Northern Isles.” Spencer Fowers, Microsoft’s Special Projects research group principal member of technical staff,

We have been able to run really well on what most land-based data centers consider an unreliable grid.

Not only can data centers run on alternative power, but they may not need the huge investment in dedicated buildings, rooms of batteries, and racks of UPS’s. Microsoft’s Fowers speculates;

We are hopeful that we can look at our findings and say maybe we don’t need to have quite as much infrastructure focused on power and reliability.

Underwater data center availability

Microsoft has clammed up about the availability of an underwater data center SKU, but MSFT’s Cutler is confident that it has proved the idea has value;

We think that we’re past the point where this is a science experiment … Now it’s simply a question of what do we want to engineer – would it be a little one, or would it be a large one?

rb-

The drive to autonomous vehicles is just one case that explains MSFT’s idea of micro-self-contained data centers vs. mega-data centers. Even with 5G –  computing power will have to move closer to the user, to the edge of the network. How much latency do you want as your autonomous Tesla, traveling 70 MPH tries to figure out where it is?

Stay safe out there!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Labor Day 2020

Labor Day 2020It is Labor Day in the U.S. In the past, Labor Day was a celebration of working men and women. On Labor Day 2020, in the midst of the COVID-19 pandemic and economic havoc, the percentage of people actually employed in the U.S. has recently hit an all-time low.

COVID-19 virrusIn August 2020 (the last full set of data) the BLS says the employment-population ratio stood at 56.5%. For comparison, the rate stood at 59.8% in December 2016, before Trumpie and his fellow travelers started their reign. That means that 45.4% of the civilian noninstitutional population – did NOT have a job. 

This number is an improvement from the historically low 51.6% we saw in April 2020 – there are still over 7 million people not working.

Statista Employment Population ratio
24/7 Wall St. reviewed unemployment at the metropolitan area level for USA Today to identify the cities with the worst unemployment problem. It is not a big surprise that Michigan has been hard hit. They ranked 4 Michigan metro areas in their list of areas most impacted by the COVID-19 layoffs.

Battle CreekFlintDetroit metroMuskegon
Impact33211211
Unemployment rate15.1%16.6%17.7%17.8%
YTD change-8.7%-8.2%-19.0%-8.0%
COVID cases69981311,83629
Poverty rate18%18.8%14.3%15.8%

rb-

Middle class squeezed

Real unemployment at the height of the 2020 recession (so far) has reached levels not seen since the Great Depression. In April 2020, the real unemployment rate, including discouraged, marginally attached, and part-time, was 22.8%. The unemployment rate during the Great Depression surpassed 25% from March 1933 to June 1933. 

In case you’re wondering, the civilian noninstitutional population comprises of all persons aged 16 and older who reside in the 50 states and the District of Columbia, are not inmates of institutions (e.g., penal and mental facilities, homes for the aged), and who are not on active duty in the Armed Forces.
 

Are you better off this year than last year?

View Results

Loading ... Loading ...
 

Stay safe out there!

Related article

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Dell to Spin off VMWare?

Layoffs are coming to DellUpdated 09/16/2020 – Layoffs are coming to Dell Technologies. Bloomberg reports that during it’s last quarterly all-staff meeting, Dell workers were told that company-wide workforce reductions were coming. A Dell spokesperson announced,  “… we’re addressing our cost structure to make sure we’re as competitive as we should be now and for future opportunities … we’re doing what’s best for the long-term health of our company and our team.

Dell has already taken a number of people cost-cutting measures. It has suspended 401(k) matching, bonuses, and promotions for the fiscal year. The firm had previously announced that 60% of its workforce will WFH or be in the office one or two days a week. Dell will provide a one-time stipend of $400 for home-office equipment.

However, over at VMware, which is 81% owned by Dell, there is a different pain. VMware has told its employees they can move away from Silicon Valley and work remotely on a permanent basis. However, VMware may cut their pay should they chose to move to a less expensive location. Employees who move could face salary cuts of 8% -18% Bloomberg reported.  A VMware spokesperson emailed SDXcentral,

…VMware is building a dynamic, global workforce of the future where our people have choice and flexibility to work from any location … VMware is dedicated to equitable pay for its workforce, not by only race and gender, but also work location or geography.

Dell to Spin off VMWare?

The rumor mill is grinding on Dell and VMware again. Back in June 2020, the WSJ reported that Round Rock, TX-based Dell Technologies (DELL) was exploring the idea of spinning off its $50 Billion – 81% ownership stake in VMware (VMW). But the dust settled on that speculation until recently

VMware logoDuring the 08/27/2020 Q2 earnings call, VMware CEO Pat Gelsinger said his company was in discussions with parent-owner Dell about a possible spin-off. According to a Seeking Alpha transcript, CEO Gelsinger said,

I want to acknowledge the recent Dell Technologies 13D filing about their considerations of a potential VMware spin-off … our Board has formed a special committee … and we are in discussions with Dell.

Potential spin-off

Dell logoCEO Gelsinger sought to assure current VMware customers. “We have over a year to go as any potential spin-off would not occur prior to September 2021.” The potential spin-off would be designed to “unlock the full value of Dell’s hardware business and VMware’s software business.” As of 09/01/2020, VMware’s market cap ($59.2B) overshadows Dell’s ($49.17B) market cap.

In June 2020 statement Dell said:

Dell Technologies believes a spin-off could benefit both Dell Technologies and VMware shareholders, team members, customers and partners by simplifying capital structures and creating additional long-term enterprise value. …  Any potential spin-off would …  be intended to qualify as tax-free for U.S. federal income tax purposes.

VMware Solid second-quarter results

COVID-19Fierce Telecom reports that VMware posted solid second-quarter results in the face of headwinds from the COVID-19 pandemic. On-premise revenues were down to the pandemic. However, VMware’s subscription and software-as-a-service (SaaS) revenue was up 44% from a year ago. SaaS revenue was $631 million and accounted for 22% of its total revenue in Q2.

VMware reported second-quarter earnings of $447 million, or $1.06 per share, on revenue of $2.88 billion. The results were an increase of 9% year over year from $2.63 billion. VMware CEO Gelsinger commented, “I do think, as we’ve indicated, that COVID has been a bit of a headwind for on-premise, growth … particularly in the Americas.”

Looking forward, Mr. Gelsinger foresees uncertainties into 2021 due to COVID-19.

We do think that the environment remains a pretty uncertain. … we expect Q3 to still be challenging with recovery in Q4 and Q1 and into next year … we still think that (there are) several quarters of recovery until we’re back to a more normal economic environment.

rb-

The deal makes sense for the big-wigs. Big-wigs that will profit from the venture include Dell CEO Michael Dell and his venture capital backers. PE firm Silver Lake owns about 100 million shares of Dell, worth over $5 billion. CRN suggests that the deal could shift Dell’s $48 billion in long-term debt elsewhere, potentially to VMware.

What are the risks to VMware’s enterprise customers? CEO Dell claims he expects to formalize agreements between the step-children. The agreements would allow “ongoing strategic benefits and continued support for customers of both companies following any spin-off.” 

The firms have tightly integrated Dell hardware with VMware software. In the face of a COVID-19 recession well into 2021 enterprise customers are going to be pretty risk-averse. Customers are going to have to take whatever price increases VMware imposes to cover the new debt.

There are lots of people available with strong VMware skill-sets. Moving a firm’s infrastructure off VMware to a private or hybrid cloud environment as a managed service would require different IT operating models and skill sets that would probably cost a lot to set up and support. 

Stay safe out there!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.