Have you ever looked at a social media profile and wondered if it’s a real, legit, person, or not? This quiz put together by Clemson University and Interactive Knowledge will help teach you how to tell if an account is … Read More
Stefanie’s list of questions is a good place to start for really anyone. “Who – who specifically does it help? What – what problem does it solve? When – do you know the right time to post it on social … Read More
I guess I could see this happening. Teams or Slack chats are real-time, people feeling angry might be tempted to voice their unfiltered opinions on them, much like we see on Twitter, etc. “If workers don’t feel they have a … Read More
Smart enough to get in, not smart enough to cover their tracks when getting paid. That doesn’t seem so smart. Which goes to show, that security around Twitter could have been a lot better, and people who work there maybe should have been a little less careless. That doesn’t bode well for the rest of us when even a big tech company can’t get this right. How many of us have people on staff who might fall for this kind of phone-based attack?
What should we think of the complicated, super-smart hackers who also manage to be so easily identifiable? Should we accept that the hardest thing about any conspiracy, and this goes for all the conspiracy theories out there, is making sure one person doesn’t do something stupid and give it all away? That. actually, is nearly impossible, and is the one thing that makes most theories unbelievable to me. This hack proves to be a perfect example.… Read More
Flexibility and transparency: The keys to good remote leadership
Three Key Tips to Keep in Mind When Leveraging Corporate G Suite for eDiscovery
Five Strategies for Building Relationships Remotely
Mothers Are Paying the Price at Work for Coronavirus
-“Preventing a mass exodus of mothers from the workforce must be a priority.”
What Does Private Browsing Do? Less Than You Probably Think
Face masks are breaking facial recognition algorithms, says new government study
– Aww that’s a shame. Not.
The Biggest Lesson from the Twitter Breach
– “Focus on the vulnerability of humans”
The Sedona Conference Commentary on Law Firm Data Security Released
The End of Life Hacking
– If you were around in the early days of blogging, this may make you laugh, or cringe. Maybe both.
Microsoft told employees to work from home. One consequence was brutal
– The lesson, management and employees need to create boundaries around when you’re working, and when you’re NOT.
WORK from home or don’t work at all: telecommuting in the age of COVID-19
Business as Unusual? Eighteen Observations on eDiscovery Business Confidence in the Summer of 2020… Read More
It’s looking more and more like the Twitter Bitcoin scam was an inside job, or at least aided quite a bit by someone inside of Twitter who had access to do all of that. But, the interesting part, to me, … Read More
Sarah Anderson lays out one area where being a “know-it-all” is actually pretty dangerous. Unfortunately, many cybersecurity professionals either refuse or fail to accept the basic premise that he/she does not and cannot know everything. This failure or refusal is … Read More