The DHS is using Congress’ “Real ID” Act of 2005 to require all US states to issue new, more robust IDs for air travel originating in the United States.
The ubiquity of smart phones and their apps have reduced the attention span for the masses. People now expect their information in big fonts, nice colors, and pretty pictures.
The term “security by obscurity” has been around for a long time. Traditionally, this has referred to the idea that the best way to keep a system safe is to keep its design (and any potential vulnerabilities) a secret. To many, “security by obscurity” has also represented the idea that there is safety in numbers, such as on a social media network that has hundreds of millions of users. One might argue that the intersection of social media, online platforms that gather and sometimes sell (for legitimate purposes) personal data, and peoples’ addiction to electronic communication convenience, may call for a new way of thinking about one’s own (or a client’s) security by obscurity.
Why all of the hype around Facebook privacy revelations? After all, the purpose of Facebook is to share your information (albeit, among your closest friends).
Today’s NFL coaches are concerned that the new players being drafted are millennials and they will need to be treated differently – they report that football playmaking classroom training sessions need to be limited to 30 minutes, with breaks for the athletes to check their phones, text messages, and social media feeds.
In our recent Tech Essentials edition, about the “million-dollar email,” delivery proof was at question. The recent events highlighted below emphasize the additional importance of being able to easily prove the content of your sent email. As you will read, it is very easy for a recipient to modify an email with a few mouse strokes, print to PDF, forward the modified copies, and suddenly you, the sender, are on the defensive… trying to prove what you sent was not what the receiver claims to have received from you.
While it’s very common to hear from attorneys and law firms who use RMail for their high-profile cases in district and circuit courts, here we share a story from one RMail user, where the value of our Registered Email™ receipt was literally, his family’s home.
Why do humans prefer live events vs. recorded ones, even though recorded, tape delayed or on-demand events provide the same sensory experience?
Enter 2018. A new generation of cyber security risks bear names that make it sound like they were implanted by James Bond villains (“Spectre”), with worldwide doomsday impact (“Meltdown”), coupled with anti-virus programs used for international espionage (Kapersky Labs allegations).
As Tech Essentials readers hunker down for holiday online shopping, it’s a good time to remind you what to consider before you make that final click to purchase.