Josh Spector: “Email doesn’t have to be a nightmare. Here are a collection of concepts to help you write better emails, optimize your inbox, and keep your sanity…” Continue Reading
Josh Spector: “Email doesn’t have to be a nightmare. Here are a collection of concepts to help you write better emails, optimize your inbox, and keep your sanity…” Continue Reading
AP: “Most Americans don’t believe their personal information is secure online and aren’t satisfied with the federal government’s efforts to protect it, according to a poll. The poll by The Associated Press-NORC Center for Public Affairs Research and MeriTalk shows that 64% of Americans say their social media activity is not very or not at… Continue Reading
TechRepublic: “…In recent months, hacking groups have brought critical aspects of U.S. infrastructure to a halt, and phishing is a popular tool in cybercriminal’s seemingly ever-expanding armamentarium of attack methods. On Wednesday, Expel released a report, highlighting the top keywords used in phishing attempt subject lines. Based on the findings, employees may need to be… Continue Reading
The Verge: “Google is announcing even more Workspace features today, part of an increased cadence of changes to the company’s office and communications software suite over the past year or so. Today’s announcement is a bit of a milestone, however. Although there is still the smattering of small and coming-soon updates, the bigger change is… Continue Reading
MakeUseOf: “Sometimes, you don’t have control over an email address data breach. Nowadays, almost every app and website requires your email address. The good news is, you don’t have to use your own email address. Mozilla has a great tool that you can use to protect your address from being a target. Effectively, you can… Continue Reading
As remote work gets prolonged because of the delta variant, more companies are tracking what employees do at home: “…Business is booming for companies that make software analyzing the data employees generate during the workday. These programs present reports to superiors on how often employees are typing, when they log off and on, and what… Continue Reading
Vulture – The Spine Collector “For years, a mysterious figure has been stealing books before their release. Is it espionage? Revenge? Or a complete waste of time?,,,In the spectrum of cyberattacks, this one wasn’t very complex. There was no malicious software or actual hacking involved. Some of the earliest victims used Gmail accounts for work,… Continue Reading
Verge: “Clicking on ‘Undo’ can save you from a lot of grief – If you’ve ever hit “Send” on a Gmail email and regretted it ten seconds later, you’ll know how handy — even necessary — a delayed send function can be. It could be the sudden realization that you accidentally hit “Reply all,” or… Continue Reading
The New York Review – “Pedestrian fatalities are rising dramatically in the US, and Angie Schmitt’s Right of Way gives a rare look at why and what might be done about it….On America’s streets, such reconsideration is sorely overdue. There is no illustration of this fact starker than our disastrous pedestrian fatality numbers. In 2010,… Continue Reading
Wired: If you’re smart about how you use your space in the cloud, you don’t have to pay extra -“Sign up for a Google account and you get 15 GB of cloud storage space for free, split across three main products—Gmail, Google Drive, and Google Photos. Once you exceed that limit, you need to sign… Continue Reading
Bleeping Computer: “DuckDuckGo is rolling out an email privacy feature that strips incoming messages of trackers that can help profile you for better profiling and ad targeting. Users of the service get a free “@duck.com” email address that cleans messages of trackers and forwards them to your normal inbox. Currently in private beta, DuckDuckGo’s Email… Continue Reading
Tech Republic: “A report uses FBI data to parse out state-by-state hacking data by the number of victims and total financial losses for every 100,000 residents..In recent months, a string of high-profile cyberattacks has reverberated across critical aspects of the U.S. infrastructure ranging from petroleum and meat production to local water supplies, bringing network security… Continue Reading