Welcome to the July edition of Technology Today
Quick tech news for the busy professional! Here you will find:
- Digital Dread: that sinking feeling of losing your laptop
- CrowdStrike: the recent outage explained
- Microsoft: what’s new?
- Tech Facts: did you know?
- Q & A: what everyone’s asking
- Quiz Time: test your team!
Wallet? Check. Keys? Check. Laptop? Uh… Laptop???
Picture this: It’s a typical Wednesday evening, and your employee Sam is heading home after a productive day at the office. She’s balancing her coffee cup, a shopping bag, and her work-issued laptop as she steps into the car. It’s only when she gets home that she realises, with a sinking feeling, that her laptop is nowhere to be found. Is it still on the roof of the car, maybe?
And then panic sets in as she remembers all the sensitive data stored on that device.
This scenario is a nightmare, but it doesn’t have to turn into a full-blown crisis. Having a solid plan in place can mitigate the risks associated with a lost or stolen work device.
Here’s what you should do if you or one of your team finds yourself in Sam’s situation:
First and foremost, create an environment where employees feel comfortable reporting a lost or stolen device immediately. Sam needs to know that the sooner she informs the company, the better. Emphasise that there will be no blame or punishment – what matters most is safeguarding the data.
Ensure that all work-issued devices have remote wiping capabilities. This is your first line of defence. When Sam reports her laptop missing, your IT team should be able to remotely wipe the device, erasing all data to prevent unauthorised access.
Before a device is lost, proactive measures can make a world of difference. Make sure all company devices are encrypted. Encryption converts data into a code to prevent unauthorised access. Even if someone gets hold of Sam’s laptop, encrypted data remains inaccessible without the proper decryption key. Most modern operating systems offer robust encryption options.
Always enforce strong password policies. Sam’s laptop should have a complex password and, ideally, two-factor authentication (2FA). This adds an extra layer of security, making it harder for anyone to access the data if they bypass the initial password protection.
Regular training is vital. Employees should understand the importance of device security and the steps to take if a device is lost or stolen. Conduct workshops and send reminders about security protocols. The more informed Sam is, the quicker and more effectively she can respond to the loss.
Why are these steps so crucial? If Sam’s laptop falls into the wrong hands, the consequences can be severe. Unauthorised access to customer files can lead to identity theft and loss of client trust. Exposure of financial data could result in significant loss and legal consequences. Proprietary information could be stolen and sold. It’s a nightmare.
By implementing these strategies, you can sleep easier knowing that your company’s data remains secure, even if a device goes missing. It becomes a minor annoyance not a disaster.
We can help you plan for this kind of scenario – get in touch.
CrowdStrike Outage Explained
On Friday 19 July 2024, a routine software update from CrowdStrike, a leading cyber security company, caused a major issue affecting an estimated 8.5 million Windows computers.
This incident led to significant disruptions in many sectors, including airports, supermarkets, and media. As such, many businesses are now reviewing their disaster recovery plans and business continuity software. They want to be sure they have clear procedures to help mitigate the impact of future disruptions.
In this PDF, we explain what CrowdStrike is, what went wrong with the update, how it impacted businesses, and how to protect your own business.
What’s new to Microsoft?
Microsoft is SERIOUS about security
Cyber security is crucial, and Microsoft knows that more than most. Now the tech giant has upped the ante, tying executives’ pay to security performance.
Basically, if it gets hacked, they don’t get their bonuses. This inspires confidence that Microsoft is really taking accountability for its security plans… but how do you think the executives feel about it?
You can block employees taking screenshots in Edge
Data privacy for your business is critical. But it’s not only cyber criminals you need to be wary of. Sometimes, your staff could be (intentionally or unwittingly) sharing your confidential data using screenshots on their browser.
Microsoft is stepping in with screenshot prevention tools in Edge. You’ll be able to tag webpages as protected, which will stop any unapproved copying of the data.
Windows 10 is reaching end of life: what are your options?
Windows 10 reaches its end of life next year. That means no more updates, not only for new tools and features, but for the security improvements that keep your data safe.
If you’re still using Windows 10 in your business, you have four options to consider. Our latest PDF guide explains each one and the things you’ll need to consider: download here.
Did you know?
Tech Facts:
- On 30th April 1993 the directors of CERN released the source code of the World Wide Web into the public domain, making it freely available to anyone, without licensing fees. This was at the urging of its creator Tim Berners-Lee and allowed the web to flourish.
- The first wristwatch with the ability to make phone calls was the Samsung SPH-WP10, released in 1999.
- The first widely used web browser was Mosaic in 1993.
Q & A
Q: What’s the difference between 2FA and MFA?
A: 2FA (two-factor authentication) requires two types of authentication – say, a password and a one-time code. MFA (multi-factor authentication) requires at least two, or more types of authentication.
Q: Which of the above is best?
A: The answer depends on how your business works and what you’re securing. Ideally, you’d use the method with the highest security standards yet the lowest amount of effort. We can help you figure this out.
Time for a Tech Quiz!
- In an August 2021 blog post, CEO Ryan Roslansky approved permanent remote work for employees of which business-oriented social network?
- What delicious computer term did web browser programmer Lou Montulli coin to refer to information that is sent from the browser to the web server?
- What does “IOT” stand for?
- What device was announced in 2007 with this slogan: “This is only the beginning”?
- Wi-Fi is a family of wireless network protocols modelled after the IEEE 802 set of LAN protocols. What does LAN stand for?
See answers below
That’s all for today, folks!
Until next time,
Rajesh and the GZD team
Quiz answers:
1. LinkedIn.
2. Cookie.
3. Internet of Things, such as your fridge and Alexa.
4. iPhone.
5. Local Area Network.