email
Get the newsletter
Newsletter
search
Search blog
April 01, 2024 • read

Technology Tips: April 2024

Skyward IT Services
Network Infrastructure and Security Specialists

In this article
Share this story

The pros and cons of contactless payments

The use of contactless payments is rising for many convenient reasons. As with all new technology, you may be wondering what the risks are.

The pros:
1. Time savings: Contactless means that you aren’t handling cash or waiting for change, and it also keeps lines going a bit quicker.
2. Flexibility: You can have your cards digitally saved to your phone, so you no longer need a bulky wallet.
3. Health: Not having to handle cash or touch a card reader is a perk for those with health concerns.

The cons:
1. Limits: Not all retailers accept contactless payments, so it’s important to have a back up option when shopping.
2. Safety concerns: A PIN is not used in these transactions, so there isn’t a way for cashiers to determine if the device being used is stolen.
3. Technical: A contactless payment option is not for consumers that may face technical barriers, such as technical knowledge or not having a compliant smart phone.

 

Spotting hidden cameras in a vacation rental

Security is the last thing on your mind when you are getting settled into your relaxing vacation rental. However, it’s worth doing a quick sweep to check for any possible hidden cameras.

First, turn off the lights and use a flashlight to look around the room. Look for any reflections or blinking lights, specifically on the smoke detectors, outlets, clocks, and shower heads. Have extra caution in bedrooms, bathrooms, and saunas/hot tubs. Be on the lookout for things that may be out of place, such as wires coming from a plant, bookshelf, or even tissue box.

Did you know that you can scan to see what devices are connected to Wi-Fi? Download a scanner app (such as Fing) to see if there are any smart devices, or cameras, that are hooked up. Don’t be alarmed if there is a smart thermostat, TV, doorbell, or kitchen appliance that are already connected to the Wi-Fi.

If you do find a camera, make sure to take photos and videos and then report it with whatever booking platform you used (Airbnb, VRBO, etc).

 

QR code phishing attacks

QR codes are gaining in popularity, and are frequently found in restaurant menus, flyers, mailers, and even business cards. They are most often harmless and helpful, but it’s always good to be cautious.

QR codes are essentially digital hieroglyphs that link to other information when scanned (including websites, map addresses, etc). This gives hackers an opportunity to link them to malicious websites. If a QR code is in an unsuspecting email that is riddled with urgency, there’s a good chance you should not scan it.

Keep the software on your devices up-to-date so that they have the strongest defenses against fraudulent links. As always, stay vigilant!

 

Malware of the month: The hack that took two years to make

The best most unethical things in life can take time.

In fact, a recent supply chain attack on XZ Utils took a hacker two years to implement. XZ Utils is a free software tool that is widely used in Linux systems. The hacker slowly helped build code over the two years to develop trust in the online community before he built a backdoor. He eventually suggested disabling a tool that detected software vulnerabilities. The backdoor stayed undetected until Microsoft software engineer Andres Freund discovered it on March 29, 2024. Security company Binarly has a free tool which determines who is affected by the XZ backdoor.
 

For fun

Grab a coworker and fill in the blanks of this hack-themed madlib!

Hi ________(your name), This is _______ (CEO/CFO/handsome prince) and I need you to send me five ______(hundred, thousand, million) dollars in the form of ______ (gift cards/cash/money wire) as I have an emergency. Please send it to ______(my home address/email/venmo) and I’ll send you _____ (more PTO/a free car/cash/Taylor Swift concert tickets) as a token of my gratitude.

With _____(appreciation/sincerity/love), ______ (CEO/CFO/handsome prince)


Thinking about edtech for your district?
We'd love to help. Visit skyward.com/get-started to learn more.

Share this story
About the author
Skyward IT Services
Network Infrastructure and Security Specialists


Read more from Skyward

Special Education Packets: A New Recipe for Success

Wouldn’t it be nice if filling out special education evaluations and IEP forms was as straightforward as following a recipe? This June, we’re giving you the tools you need to simplify the documentation process for special ed staff at your school.

May 23, 2016 • Product Updates
How to Translate Skyward into Any Language

Language barriers can make it nearly impossible for some families to play an impactful role in their student’s learning experience. Here’s how to take this barrier out of the equation.

September 22, 2023 • Tips
How Skyward Software is Made

Check out this article and video for a behind-the-scenes look at how our software is made!

September 19, 2024 • Product Updates

This site uses cookies to improve your browsing experience and to help us understand how you use our site.
To learn more about how we use this data, click here. By continuing to use this site, you are consenting to our cookie policy.