Apple will replace its groundbreaking iTunes service with separate applications, the tech giant announced this month. After 18 years, Apple is killing iTunes…well, sort of. Here is the latest on what consumers can expect as an alternative from Apple.
Google Ad Grants is an in-kind program that gives qualified nonprofits free access to Google business tools, as well as $10,000 per month in free advertising on the Google Ads platform. The following write-up gives you valuable information about these resources including how to apply for ad grants, tips for using Google, and maintaining and getting the most from these marketing resources.
Unlike milk, passwords don’t need an expiration date. That’s the conclusion of Microsoft, which recently announced that it will no longer attach expiration dates as part of its security requirements.
While cybersecurity remains a burning issue for organizations in 2019, many businesses and nonprofits don’t plan on or budget for a cybersecurity risk assessment. However, once organizations understand the value of their data and reputation, assessments often become a regular component of their tech management strategies.
The phrase, “simpler is better,” doesn’t apply when you're deciding how to choose a password.
A new report from the UK’s National Cyber Security Centre, the cyber arm of the GCHQ intelligence service, reveals the 100,000 most hacked passwords. Not surprisingly, the simplest are easiest to hack.
“In order to nudge tech-savvy people in the right direction when it comes to staying secure online, the NCSC teamed up with Troy Hunt, an Australian cybersecurity expert who created Pwned Passwords API, to analyze millions of breached accounts worldwide to determine the most common hacked passwords,” Fox Business online reports.
And the top 10 winners for the most hacked passwords:
According to the report, ‘123456,’ was identified 23 million times in breaches. The second worst password pick – ‘123456789’ – was breached 7.7 million times, and the third most hacked password, ‘qwerty,’ 3.8 million times.
While several simple series of numbers and/or letters made the top 10, the study found people often used names in passwords – whether it’s their own name, the name of their child or their favorite musician.
The five most common names used as passwords in breaches included: 1) Ashley; 2) Michael; 3) Daniel; 4) Jessica; and 5) Charlie.
The five most common musician-inspired passwords in breaches included: 1) Blink182; 2) 50 Cent; 3) Eminem; 4) Metallica; and 5) Slipknot.
Consumer Reports offers tips for password-based cyber security:
“Ideally, a password should be composed of a long string (think at least a dozen characters) of seemingly random uppercase and lowercase letters, numbers, and symbols,” the publication reports. “One of the best and easiest things to do is to create a long password out of an easy-to-remember phrase, then throw in some special characters.”
Other tips on how to choose a password:
Create passwords or passphrases that do not use repeating words and number patterns, cannot be easily guessed, and do not use personal information.
Use a different password for each online account.
Change passwords annually and/or when prompted by your online accounts.
Always use two-factor authentication when available.
Consumer Reports also advises to avoid your name, birthday, or references to other personal details including your child’s personal details because hackers routinely troll Facebook and Twitter for clues to passwords like these.
It is important to remember to apply these same password standards to connected devices such as routers, webcams, and TVs. Many come with default passwords that should be changed the moment you take the product out of the box.
Happy 15th anniversary to Gmail! While many of Gmail tools, new and old, can save time and help productivity, there are several best practices everyone should consider when dealing with emails.
Employees accessing company data with a multitude of devices present the largest security threat for organizations today, according to a new report from BetterCloud, an independent software vendor based in New York, NY. So how can your organization mitigate the risk from well-meaning employees? Here are a few of the most crucial steps you can take today to protect your data.
Frustration and “inflated expectations” confront many business managers who try to adopt artificial intelligence (AI) into their operations, according to MIT Technology Review. “Despite what you might hear about AI sweeping the world, people in a wide range of industries say the technology is tricky to deploy. It can be costly. And the initial payoff is often modest,” reports the Review. So what does it take for AI to be successful?
“This socially conscious and fast-paced generation requires a set of rules different from those of Generation X and Z. And brands need to take into account that fact if they want their email marketing strategy to engage this important demographic,” Florian Bersier, founder and CEO of Gmail app Gmelius, writes.
Employees can feel either motivated and valued or discouraged and neglected. The difference often boils down to respect. It might seem simple, but successfully creating a culture of respect in the workplace takes an understanding of the different types of respect, how to deliver it, and how it will be received.
Small and medium-sized businesses rely on technology to achieve their goals but also find the diversity of choices a challenge, according to a new industry study. The sheer number and types of solutions has grown in such size and complexity that many firms are “taking two steps forward and one back as they navigate these new learning curves.”
Sophisticated phone phishing scams are on the rise and agencies are urging people to be aware of telephone scams from callers posing as Internal Revenue Service agents. Learn more about how these complex phone phishing scams work, how to recognize and report them.
Successful Nonprofits, a firm that provides strategic planning, board development, executive coaching and transition assistance to help nonprofits, recently spoke with Larry Velez, founder and CTO of Sinu, to help them understand and accommodate millennials in the workplace. Listen to the podcast to learn more about shifting demographic trends and practices in the workplace.
According to a 2018 survey by Gartner, CEOs report a growing focus on changing and upgrading the structure of their companies, including prioritizing IT-related issues and scaling up their digital business initiatives. Growth remains number one, but there is a shift from focusing on incremental growth to creating foundational change to become more competitive and support long-term growth. According to the survey, the top 4 priorities for CEOs in 2018/2019 are:
For the second year in a row, Sinu has been listed on the CRN’s Next-Gen 250.
From health care providers to whistleblowers, recipients of the 2018 Good Tech Awards cultivated socially beneficial uses of technology, whether drones or text messaging. The awards, a feature of New York Times columnist Kevin Roose in the New York Times Magazine, give a nod to innovators who often operate outside of the spotlight.
Data Privacy Day, held this year on Monday, January 28, is the perfect opportunity to take stock in your organization’s data privacy and security policies. There are several ways to create a culture of data security within your organization, even with a modest security budget. Here, you will find a list of data security priorities that most organizations can easily adopt with a little time, good internal communication, and without a large investment.
Corporate social responsibility (CSR) — often considered a delicate combination of ethics and profits — is gaining currency with organizations of all sizes because of the benefits to both society and the bottom line. Companies that pursue positive social impacts have found several benefits that positively impact the bottom line. We’ve summarized several of the top benefits reported in both the Forbes and Entrepreneur articles.
Digital technology will create opportunities but also upheaval for nonprofit groups, according to a trend forecast for 2019. Here are Five nonprofit tech trends to watch in 2019.
While VR technology is still in its early days, we can expect to see it increasingly used in the hiring process. It’s an effective method of attracting prospective candidates, testing their abilities, and introducing them to the realities of the job. Ultimately, VR can make hiring process quicker and smoother than ever before.