There is a war going on between giants and they are fighting for the right to be in your home – maybe even in your bedroom – in order to watch, listen and collect information about you. It’s probably inevitable that you will let one of them in (or maybe a new one you have not met yet), but whatever your choice, it will likely be around for a while… like your email or your bank. It will become so entrenched in your life that it will be a huge hassle if you change your mind.
In the digital world, there is no one, trusted source to verify who we are, so we fill in the same information at dozens of different sites. Each different site that gathers and verifies our info does it in a silo. The process is closed and complex with each site checking a directory of information and making a decision about whether we are who we say we are.
So, what should we while we wait for technology and policies around digital identity to catch up?
Consumers and businesses alike are choosing the convenience and efficiencies of being connected over the security of being "off the grid" (so to speak), and there are no signs of it slowing down. And, right now, the policies for securing these devices is in its infancy, increasing the risk for attacks.
Sinu has developed two documents to help your organization select the right backup solution by providing information about online backup services and what you can expect from two different types of solutions. Sinu selects backup, continuity and disaster recovery solutions based on the same criteria. We look for cloud-first solutions which are built to be future-proof as software advances.
Apple has released an update to iOS, the operating system for iPhone and iPad that contains a known bug. The upgrade – iOS 11 – began rolling out on September 19 following Apple’s announcement of the new iPhone 8 and iPhone X smartphones. People using the Mail app on iPhone have a few options.
“Autopilot is getting better all the time, but it is not perfect and still requires the driver to remain alert,” the company said. But who is ultimately responsible when the car crashes?
Even though Alexa may have been programmed to have the ability to provide pithy comebacks, AI is still in its infancy, but expected to surge over the next few years. According to a new report from Tractica, interest in implementing AI systems is growing among companies and institutions around the world, and the revenue generated from the direct and indirect application of AI software is predicted to grow from $1.4 billion in 2016 to $59.8 billion by 2025.... But what exactly is Artificial Intelligence, anyway?
Here at Sinu, we try to provide the latest tech news, predict trends, and share best practices – especially when it comes to protecting your data and other tech assets. Well, here is where taking our own advice paid off...
In less than 3 years, Adobe's once popular plug-in will no longer be welcomed on the web. So, what really happened to Flash? I would say it goes well beyond security issues and is more about the shift in the way we want to receive information from and interact with our devices.
One of the biggest vulnerabilities in endpoint security exists with mobile devices such as laptops, phones, and tablets. So, what can you do to mitigate the risk? Develop a mobile device or BYOD policy designed to protect your organization’s technology infrastructure and sensitive data. Here are 10 considerations:
It’s hard enough to keep your technology secure when you’re working from the office, even harder when you work remotely, but while on vacation, it’s even trickier to keep your devices and data safe. A little bit of preparation and being a little tech security savvy can prevent headaches during your summer vacation and the rest of the year.
In a recent survey of more than 1,100 U.S. small businesses, Wasp Barcode Technologies produced a State of Small Business Report that reports on some of the distinct challenges that small businesses face in 2016. Inc. summarized the report which shows some of the top challenges for small businesses include hiring new employees (50 percent), increasing profit (45 percent), employee healthcare (43 percent), growing revenue (43 percent), and cash flow (36 percent).
Amazon opened its first New York City bookstore in Columbus Circle on May 25. The interesting twist from this giant company credited with putting so many traditional bookstores (such as the closed Border’s that was located nearby) is that it uses the local online data aggregated from its e-commerce customers to determine which books to carry its store.
There are times when I choose to spend time over money, like when I repair my old classic German cars versus taking them to a mechanic, but with only 16 waking hours to create value from each day, I need to make the most of each one. (And I like working on my old Volkswagen.) However, rolling my own music playing solution in lieu of buying an iPad to use the Sonos app is not the way I want to spend my time.
In the book, Social, scientist Matthew Lieberman makes the case that our need to connect is as fundamental as our need for food and water. We need to connect and communicate with others, and I would suggest that this extends to how we connect with businesses and nonprofits. Is there a real person we can communicate with if we have questions or need assistance? Is that a satisfying experience? And, are the organizations that understand the basic human need to communicate and provide human interaction more successful?
There are 28 million small businesses in the U.S. They are the backbone and spirit of our economy. In fact, they are the very reason Sinu was formed back in 2000 because we wanted to give small businesses an edge by providing the enterprise-level technology and expertise which big business could afford, but were out of reach of most smaller organizations.
With today’s hardware replacement cycle growing shorter and shorter each year, many organizations find themselves with a closet full of old solutions. You don’t want to just throw them out or donate them, as they may contain sensitive data and, if they end up in a land fill, they can release dangerous substances such as lead and mercury into the soil and water supplies.
Recent hack threats on iCloud have caused concern about the security of the data of over 782 million iCloud users. According to several media sources, hackers are demanding Apple pay a ransom in bitcoin or they'll expose millions of iCloud account credentials and could potentially remotely erase customer iPhones, iPads, or Macs, causing a catastrophic loss of personal data. With so many people using their Apple devices in the workplace, this could result in huge losses of business data and productivity.
Be wary of the USB stick you plug into your computer. These small flash-memory drives used to easily share files from computer to computer have become one of the easiest ways for hackers to install malicious software and gain access to a computer.
There are three ways these malicious attackers use USB sticks to compromise your data and hardware.
You may be surprised to learn that your bank may not have some of the data security systems in place that are now standard for your email and social media accounts. One of the concerns is that many of the largest and most popular banks, including TD Bank, Citibank and Citizens, do not use a simple but effective method of protecting online accounts called two-factor authentication to prevent unauthorized logins. With so much at risk, why don’t the banks use this standard technology to help protect our data? The answer may not comfort you.