Technology Tips: July 2019 Edition Technology Tips: July 2019 Edition

Technology Tips: July 2019 Edition

by Skyward IT Services
Skyward IT Services Skyward IT Services Network Infrastructure and Security Specialists

Smart speaker privacy

You may have signed up for a small dose of surveillance when you set up your smart speaker, but that doesn’t mean you have to consent to sending your conversations to Google or Amazon. Here’s how to tighten privacy settings when it comes to your speaker recording your conversations to help refine speech recognition.

Google Home instructions

Amazon Alexa instructions

 

Security for high-tech collaboration

Do you have team members working remotely, accessing data on mobile devices, or otherwise sharing information outside your network? If so, this collaboration needs to be monitored for potential security loopholes.

Add a disclaimer, warning, or label when collaborators are outside the designated network. Only invite those who truly need to join via a video conferencing option. It’s hard to tell whose system could be infected with malware which can in turn access your team’s devices via networking connections, including file sharing during meetings.

Before any long-distance collaboration happens, tune up the network connection and ensure proper bandwidth is achieved. This not only enables your team to enjoy a smooth video conference, but also ensures security measures like malware scanners can work quickly against attacks.

 

Legally mandated action following data breach

In all 50 states, notifying users of a known data breach isn’t just good practice—it’s the law. Each state handles the topic a little differently, but most have incorporated some form of the following cybersecurity guidelines:
  • A deadline for notifying users of the breach
  • A deadline for notifying the state Attorney General of the breach (depending on how many users are notified)
  • Specific definitions of personal identifiable information (PII)
  • Requirements to offer credit monitoring in certain cases
  • Special requirements for different sectors (including finance and insurance)
  • Safe harbor laws protecting organizations from liability

It’s always a good idea to check into your state’s specific laws around cybersecurity, data privacy, and other attacks, including whether civil suits may be brought following a data breach.

 

Malware of the month: Social media malware

July’s malware of the month comes from our old pal, Facebook, but no social media site is immune from this malware strategy. 

This particular instance occurred in Libya and came in the form of news stories which appeared to originate from the commander of the Libyan National Army. The links claimed to be for documents showing proof of conspiracy against the country, but they turned out to actually just be malware. Users affected came from Libya, Canada, the United States, and more.

Social media users are particularly vulnerable since links seem trustworthy because a friend, family member, or page they follow is sharing it. However, these people could be sharing malware without even knowing it. Don’t assume a link is safe just because Facebook said it is—one alternative would be running a quick Google search on the topic instead of clicking from the original post. And with the population of users over 55 surging, it might also be a good idea to share this warning and strategy with parents and grandparents.


 

Skyward IT Services Skyward IT Services Network Infrastructure and Security Specialists


Share Facebook
Twitter
LinkedIn

Recent Articles

iCon or User Group?
What’s the difference? And which should you attend? Decide for yourself with the help of this article and infographic.  by Alexis Bushman
 
Technology Tips: October 2019
This month’s tips feature talk-to-type and read-aloud options, a language assistant, and tips on keeping your data (and Android phone) safe. by Skyward IT Services
 
A Day in the Life: Personnel and Skyward Support Specialist
People and technology—two very different subjects personnel and support specialists must master. What does a day in their lives look like? by Lauren Gilchrist
 

This site uses cookies to improve your browsing experience and to help us understand how you use our site.
To learn more about our use of cookies go here. By continuing to use our site, you are consenting to our use of cookies.
Subscribe to our blog: