Originally published on 1/8/18 at Forbes. Hacking is no longer new. It’s become a daily conversation in newsrooms and boardrooms everywhere; hacking and data breaches are the never-ending security story of the 21st century. Hackers illegally make their way into the computer systems of companies, hospitals, government institutions and our homes on a daily basis. […]
Look, I don’t want to be a beta tester, but if I must, because you’re unable to create a reliable product on your own, then you better put in a working feedback mechanism.
Warning! Don’t do it… don’t pick up your phone… don’t login to your computer… don’t do it! Next thing you know, you’ll be with me, in the depths of inbox hell. With all the email accounts, calendar invites, text messages, Facebook messages, LinkedIn messages, and everything else—I just can’t keep up with it all!
Hacking is in the news nearly every day and people constantly reach out to ask me if their information is safe. Are they at risk? What can they do to be more protected? Should they get a VPN or use Tor?
The best thing to do is to start simply. Begin with your passwords. Do you have good passwords on your accounts?
Backup just may be the panacea for computer viruses and ransomware.
The “Cloud” is a technology that provides incredible convenience and flexibility. In fact, because of the cloud, I’m able to write this from the coffee house I’m at where I sometimes go to work. However, the cloud has significant limits that may outweigh its benefits.
It seems as though my television addiction has spilled into my real life activities. I’ve been wondering if my reliance on technology has gone too far. Is this the first step on the path to becoming a Luddite?