Say ‘I Do’ to Cyber Safety
From the Cyber Security Alliance
More than ever before, mobile devices are the preferred planning tool for couples preparing to tie the knot. For better or for worse, 92 percent of brides-to-be (and some grooms, too!) are checking off to-do lists virtually via their smartphones. The icing on the cake is that these devices can be used for researching gowns, tuxes and various vendors, sharing announcements, managing registries and honeymoon travel and creating personal websites. With the whirlwind of emotions leading up to your wedding, the National Cyber Security Alliance (NCSA) proposes several tried-and-true tips to help ensure that this special time in your life is safe and secure.
How to Present in Skype for Business
Once you know how to share your screen or present your slides in Skype for Business, you will find all sorts of ways to use it. We guarantee it.
We use Skype for Business every day for messaging and meetings. Our team is far-flung, with offices in four states and remote workers. It’s extremely common to hear “Hey, can you share your screen so I can see what you’re looking at?” or “Let me present this so everyone in the meeting can see it.”
If you have Skype for Business – here’s how you do this!
Step 1: Find the Present button which looks like a computer monitor icon. It’s at the bottom of the open Skype conversation or meeting window. Click on it!
When you have a conversation open with someone, the options will look like this:
Targeted attacks now moving into the IoT security and router space
used with permission from Norton by Symantec
Recently, there have been reports in the media and online about state sponsored, targeted attacks moving into the router and IoT security space. While not an immediate threat to consumers, these kinds of attacks are examples of what could potentially be in store for router security in the coming months and years.
What does this mean for me?
Reports like these are reminders that we should pay more attention to the security of our router and home wi-fi. Once a home network is compromised via the router, an attacker can gain access to a treasure trove of information about you and your family, from just about any device connected to your home network.
This personally identifiable information can range from names, dates of birth, Social Security numbers, healthcare information, tax records and so much more. With this data in hand, attackers may be able to use stolen log in credentials to access your online accounts, use Social Security numbers to open new accounts in your name and could even get arrested and give out your information.
Business Continuity Tip: Insider Threats to Your Security
Not all security threats come from outside: human beings in organizations are often threats as well, from accidents to negligence to malicious behavior. Be wary of the inside threats as well when considering your overall security posture.
“If you don’t know anything about computers, just remember that they are machines that do exactly what you tell them but often surprise you in the result.”
— Richard Dawkins