Sally's Special Services

Webmaster and Social Media Manager

SCAM ALERT! POSING AS AT&T!!

DO NOT CLICK ON THIS LINK! IT IS A SCAM FROM IYOGI.COM

I WAS WORKING ONLINE ALL DAY, AND THIS ANNOYING MESSAGE CAME UP ON MY COMPUTER. IT EVEN HAD SOUND WITH IT TELLING ME TO CALL THAT NUMBER, BECAUSE MY COMPUTER HAD BEEN HACKED! BASTARDS, I HATE THIEVES!!! THEY CAN USE THIS TO HACK YOUR COMPUTER, AND PROMISES TO REPAIR OR CLEAN YOUR COMPUTER FOR A PRICE! IT IS NOT AT&T!

SCAM ALERT

DO NOT BE FOOLED!! SCAM ALERT!!

SCAM BY IYOGI

You are in the internet’s crosshairs – Being anonymous is vital — partneringwitheagles

Thanks to a fellow blogger, I switched my default search engine from Startpage, to Duck Duck Go. I took a tour in the use of this site; it is a better way to start viewing my YouTube page, and other third party locations. Just beginning to make use of it: https://duckduckgo.com/tour Here is one reason a […]

via You are in the internet’s crosshairs – Being anonymous is vital — partneringwitheagles

Female Entrepreneurs Want To Inspire Young Girls With Miss Possible

Female Entrepreneurs Want To Inspire Young Girls With Miss Possible

225da-successfull-women

I think it is an excellent idea! Growing up in the sixties, girls had very few choices for careers. 

We were expected to be mothers, teachers, or nurses. 

We were never encouraged to be interested in or to apply ourselves to math or science.  

We were told that girls were not good in math and science, and all that they had to do is to get married and become a Homemaker. 

And…we positively were never encouraged to be doctors or lawyers or entrepreneurs.

Today, little girls need to know that they can be whatever they want to be, if they do the “footwork”. No one is going to give you anything that you are not willing to work for. 

TechCrunch

Looking around their engineering classes at the University of Illinois, Supriya Hobbs and Janna Eaves noticed something was missing — other girls.

And so like good engineers, they set out to solve that problem. The recent graduate and college senior invented Miss Possible, a doll and accompanying app aiming to spark an interest in math and science among young girls.

The Miss Possible dolls are based on real women who have been trailblazers in the fields of math and science. The first Miss Possible will be Marie Curie, the famed chemist and physicist who remains the only person to win the Nobel Prize in multiple science fields. In the app that will accompany the Miss Possible doll, girls can learn about the famous woman’s story, do hands-on activities with materials found around the house or play in-app games.

Miss Possible: Dolls to Inspire Girls Across Generations from Supriya Hobbs

View original post 487 more words

How Small Businesses Can Create A Better Website Experience For Their Customers

DIY website building platform Webs is shedding light on how small businesses can create a better website experience for their customers.

According to a new infographic from the company, the majority of experts (50 percent) say that website visitors expect the sites they visit to offer clear navigation and be easy to use. Conversely, 29 percent say visitors expect websites to feature a good layout and include attractive visuals, while 21 percent think that site visitors care most about well-written and understandable content.

The data also shows that websites not offering a good experience are turning customers away, with 64 percent of the study’s respondents admitting that a website’s design or content has kept them from completing a conversion. Some of the things that small businesses can do to create a better experience include avoiding too much text on a page, leaving space between navigation links and offering a simple contact form.

Discover more tips for how small businesses can create a better performing website by taking a look at Webs‘ infographic below:

How Small Businesses Can Create A Better Website Experience For Their Customers

Human Error Is The Number One Cause Of Data Breaches

Recent research at the beginning of this year claimed that 22,000 USBs are left in Dry Cleaners every year.

With ample research to suggest that human error is the biggest cause of data breaches, we have to ask, if this is really surprising? The proliferation of data loss stories in the media proves that the problem of human error, or indeed, human nature, isn’t going anywhere so isn’t it time that enterprises woke up, smelled the coffee and invested in technologies that protect itself from its employees?

The USB research, by internet security firm ESET found that on average, four USBs are left in dry cleaners every year, equating to 22,266 USBs nationwide. Devices were only returned to their rightful owners 45% of the time.

There were more amusing things left such as viagra, condoms, and dentures, but these are significantly less likely to breach your corporate network. Nevertheless, it shows human nature’s propensity to make mistakes.

Human error is the number one cause of data breaches

There is broad agreement within the industry that human error is the cause of most data breaches. The IT Policy Compliance Group says 75% of ALL data loss is due to human error. The Aberdeen Group says 64%, CompTIA said 52% of the root cause of security breaches are caused by human error and most recently, Databarracks said the top cause of data loss was employee accident (24%). 

Protect yourself from your employees

As it is human nature to make mistakes, and those mistakes are very clearly the top cause of data breaches, enterprises need to start protecting themselves from human error. They need to put themselves in a position where it doesn’t matter how many mistakes are made, or USBs get lost. To do this, they need both the right technologies and the right culture.

The kinds of technology that can help

Opting for technology solutions which includes location tracking means that the lost USB can often be found after a loss. Location tracking technology also allows the enterprise to limit access on an adhoc basis or via rules, so that data is only available within certain geographic zones.

One of the many issues with lost USBs is not knowing or not being able to prove to the ICO what was on, or not on, the device. With file auditing, the enterprise can see all the files that are added, copied, printed or deleted from all devices, at all times.

On its own, encryption isn’t enough but in combination with technologies like those above, it can be a good solution for the IT security department’s toolbox. Beware of difficult encryption that end users will find ways to disable.

The ability to delete data remotely is a very powerful one. Beware of the technologies you choose here though as some devices can only have data wiped with connected to the internet which of course, a USB may or not ever be connected to.

There are two common themes with these types of technologies.

Firstly, they take control away from the end-user and put it firmly in the hands of the enterprise.

Secondly, as well as helping the enterprise monitor its data generally, these technologies also serve to help deal with the scenario of a USB or mobile device being lost so there is something you can do should the inevitable mistakes happen.

For any data security technology to be successful, it must be introduced in an environment that includes training on how to handle corporate data not with a blame culture, but instead one that promotes that reporting a data breach to a line manager is a good thing and not something that will get them fired.

source: Norman Shaw Founder and CEO of ExactTrak