Get out your Red Pen and GoVisually

Published on: December 28th, 2017

LET 2018 be the year of project collaboration. As with any project, having the right tool is half the battle, and today’s Tech Talk presents a review of 18 different online collaboration tools. Whether or not one of these is right for you, let the concept inspire you to explore managing your projects in a new way. For perspective, we’re taking a look back at the major data breaches that happened in 2017. Seeing the types of institutions hacked, and the information targeted, should cause concern, but we won’t leave you wondering what you can do – this is Computer Troubleshooters, and we’re giving your security the last word.

__________________________________________

Ok teams, get out your Red Pen and GoVisually

People working together, whether it be 2 or 22, in an effort to achieve a goal, is known as collaboration. A “collaboration tool” is a technology tool which can be used to help the people achieve that goal. As more businesses invest in collaboration tools (a/k/a online collaboration apps or software), more tools become available, with many being designed for specific businesses.

Want to know what people are referring to when they mention Slack, Mural, Trello, or Red Pen? Check out the article below for concise explanations for these and 14 other online collaboration tools.

Page through the 18 Tools review here

Source:
The 18 Best Tools for Online Collaboration. Craig Stewart, Creative Bloq

 

Looking back, 2017 was a year of serious data breaches such as Equifax, WannaCry and Bad Rabbit. However, if you checked out our recent article on the Internet of Things (IOT), then you know not all breaches affect just data; literally anything connected to the Web, be it your car or your camera, can be hacked. In reading the list, it is interesting to see who was hacked and what information was targeted.

Look back at what got hacked.

Click here for the full review

Source:
The Hacks That Left Us Exposed in 2017. Selena Larson, money.cnn.com

 

We wouldn’t leave the hackers with the last word – use these tips to arm yourself against the information thieves:

  1.  Be very careful with Wi-Fi! At home, be sure to set a very strong password on your router, and name it in such a way that hackers won’t be able to tell that it is a home connection. When out in public, confirm that the connection is safe prior to using it, but if you must use an unsafe connection, avoid sites that require you to send out passwords or other sensitive information, such as banking, social media, patient portals, etc.
  2. Protect your online presence by periodically reviewing your privacy and security settings on each connected device to insure that they are set to your information-sharing comfort level. Determine what data each of your devices collect, how it is managed and stored.
  3. Establish Two-Factor Authentication for your most important accounts because sometimes just having a unique password isn’t enough.
  4. Protect your computer systems with antivirus, antispyware, antimalware software, and be sure to renew your software before the expiration date.   Disable the automatic login.
  5. Be a savvy emailer: don’t open any documents or click on any links from anyone you don’t know. Oftentimes when someone’s email account gets hacked, emails are sent to all of that person’s contacts, and you may notice that the subject line doesn’t make sense or doesn’t seem like something your friend or family member would write. That’s a clue! And, there is always a link to something. Don’t click on it!
  6. In the words of The People’s Court Judge Marilyn Milian, “Say it; forget it. Write it; regret it.” Be a smart social media user – be selective about who you accept friend requests or messages from, and don’t overshare personal information. Be very careful using the “check-in” function or telling everyone what you are doing at the moment, because criminals can use that information to locate you. Please be sure to share these important tips with your children too.
  7. Remove credit card information from your cell phone. Using the credit card itself is a better safeguard for your financial information.
  8. When not in use:
    Cover cameras on your computers, etc.
    Turn off microphones or other listening devices on Smart TVs, Smart Speakers, etc.

 

SHARE IT

share in twittershare in twittershare in twitter

You might also like

With an evolving business comes expanding technological needs. If your business is sending you any of these signs that it’s time to update your technology.