8 Things I Learned Reading 50 Books A Year For 7 Years.

This gallery contains 4 photos.

I’ve read over 300 books since the beginning of 2011, not counting the many I started but didn’t finish and the endless content we all read online. I’ve read about topics ranging from Buddhism to business, philosophy to physics, and writers ranging from feminists to pick-up artists (and even Trump’s “Art of The Deal.”) I’ve […]

5 Ways Your Business is Vulnerable to Cyber Attacks.

Hackers know a prime target when they spot one. Unfortunately, small-to-midsize businesses (SMBs) are often those prime targets. A lot of small business owners like to think that malicious attackers don’t have anything to gain by going after “the little guy,” or that they don’t have much to lose.

That’s simply not the case. Sixty-one percent of SMBs have been hit by cyber attacks, and the average cost of those breaches has exceeded $1,000,000. Here are some of the easy ways that hackers barge their way into small business networks.

Malware

Malware is malicious software designed to infiltrate computer systems and extract any important information it might find. It comes in several different forms, including viruses, spyware, Trojans, rootkits, and worms.

Without the right protection plans in place, malware can run rampant on devices, collecting all kinds of data without the user even knowing. And those protection plans have to be backed by a security team that understands the fast-paced world of malware – unfortunately, in the first quarter of 2017, a new malware specimen emerged every 4.2 seconds.

Phishing

A phishing scam occurs when cyber attackers send fraudulent emails pretending to be from a trusted source, but lead people to inadvertently deliver personal or professional information straight to a hacker via a malicious website link.

A lot of people think they’re too smart to get caught up in a phishing scam. By now, for instance, most people know that a Nigerian prince doesn’t really want to share his fortune. But hackers are constantly developing targeted, sophisticated emails that appear official and secure. For example, security experts are currently worried about a phishing attack where victims receive an email that looks like one sent from FedEx. The email instructs the recipient to click on a link that claims to help them manage a package delivery, but instead, clicking on the link gives a hacker access to their device’s system and information.

Ransomware

Like the name implies, ransomware attackers demand a payment in order to stop their attack, making this one of the most frustrating and devastating potential breaches. During a ransomware attack, hackers spread malicious software throughout a device or an entire system. The software shuts down those devices or systems until a payment has been made. In addition to deciding whether or not to fork over money to the people attacking them, SMBs also have to spend money bolstering their security systems and making up for the lost productivity.

One of those most wide-reaching ransomware attacks was the WannaCry worm of 2017, which hit more than 230,000 computers across the globe that were running outdated or vulnerable systems. The attackers demanded $300 in bitcoin from their victims, threatening to delete important files if the ransom wasn’t paid. Most didn’t pay the fee, but they still had to wait days for security fixes to be issued. The attack crippled England’s National Health System, shut down Australian speed cameras, forced a Honda factory in Japan to shut down, and all in all is estimated to have cost victims in the billions.

Spoofing

Spoofing attacks occur when the hacker sends out emails pretending they’re someone they’re not. For instance, attackers send out an email that appears to be from the company’s CEO or HR department requesting info on private company data. An employee would then send that info along to who they believe is their superior, but is actually a cyber attacker.

In a case like that, spoofing emails can harm a SMB directly. But they can also cause devastation via indirect ways, as well. For instance, German banking chain Deutsche Bank recently had to pay a $30 million fine after two of their former traders launched a successful spoofing attack that manipulated the prices of precious metals futures on the commodities market. A banking giant can afford that fee, but small businesses might not be able to afford the losses that could come from believing fraudulent, incorrect information about the markets.

Rootkit

Rootkit is sneaky and clandestine software that allows an outside user to take control of a device without the owner’s knowledge. Like some other cyber attacks, that control gives a hacker access to the device’s secure network and files. But a rootkit is extra dangerous because, in addition to accessing those files, the hacker also has complete control of the device. That means they can alter network configurations, falsify documents, override security mechanisms, and infect the device with more malware. The attacker can also spy on the device’s owner, for example by recording every websites they visit and provided credential information. Unfortunately, rootkits are very difficult to detect and almost always require the work of professionals to remove.

One of the most threatening rootkits is LoJax. Security experts worry that they have only seen the beginning of this rootkit, which is currently spreading. Right now, attackers are using it to modify security systems and then infect devices with even more malware. Since the attackers maintain control of the device, they can be sure that the malicious software is executed, all without detection. Researchers fear that attackers will develop even more sophisticated LoJax breaches in the months and years to come.

Ensuring Total Security

So what can small businesses do? For starters: get a VPN. VPN stands for Virtual Private Network, and it’s a solution that many businesses use to help minimize the chance of a cyber attack. The network is encrypted and often requires multiple authentication methods, making it easier for remote workers and employees in multiple branches to securely access the applications and systems they need to do their jobs.

It’s a great first layer of protection. But in order to ensure total security, small businesses need a security plan in place that will defend that VPN as well as make sure that every device contains several layers of protection. HP provides exactly that. The company knows that each PC decision is a security decision, and it equips each of your business’s devices with the tools they need to stop vulnerabilities from every angle.

Programs like HP Sure Start, HP Sure Recover, and HP Sure Click stop malicious software from spreading to a business’s devices and network, managing all potential threats so a small business can focus on building its business. In the case of an attack like LoJax, HP Sure Start would be able to stay one step ahead of the game by detecting the attack before it can happen. LoJax gets in by attaching itself to the BIOS, which is the first million lines of code that a device runs before being turned on. HP Sure Start recognizes rootkits like LoJax at the BIOS level, and then completely replaces the BIOS to ensure that LoJax doesn’t have a ride into the system.

The danger is real, but hope isn’t lost. With the right understanding of their own vulnerabilities and an HP cyber security plan in place, small business owners can make enterprise-level security decisions that will turn them from a hacker’s prime target to a hacker’s dead end.

Source: https://futurism.com/business-vulnerable-cyber-attack/?utm_source=Digest&utm_campaign=88d3c0ff22-EMAIL_CAMPAIGN_2018_11_16_07_53&utm_medium=email&utm_term=0_03cd0a26cd-
88d3c0ff22-247541169&mc_cid=88d3c0ff22&mc_eid=2ee79cdd84

http://www.nerdomeblog.com

7 leadership lessons from Shakespeare.

This gallery contains 1 photo.

Shakespeare, arguably the most celebrated writer who ever lived, died on 23 April in 1616. World Book Day is held on this date to recognize the passing of the Bard, as well as the death of Miguel de Cervantes and Inca Garcilaso de la Vega, two titans of Spanish-language literature, on exactly the same date. […]

Five Productivity Tips from CEO (and Factory Floor Sleeper) Elon Musk.

This gallery contains 3 photos.

It’s been a rough couple of days for poor Elon. Tesla has had to halt production on its Model 3 cars, making stocks drop and concerning investors. In an effort to catch up to those deadlines (and exceptions) it has failed to hit, Musk has taken it upon himself to oversee changes to the Model 3 production […]

Learn Stress Management To Avoid Making Mistakes

This gallery contains 11 photos.

Learn Stress Management To Avoid Making Mistakes Wrong decisions and impromptu choices are always the result of stress. If your mind has gone berserk with a problem, then you can be sure that you will be making mistakes left and right without even knowing it. You can compromise your career, destroy a business, or even […]

France and the American Revolution

france-in-the-amerev

France and the American Revolution

In March of 2003, after France opposed a UN invasion of Iraq, two US Republicans
removed all references to French fries from menus affiliated with the US House of
Representatives. In the House cafeteria, potatoes became “freedom fries”. In a time of
such Francophobia, some Americans might be surprised by the history of positive
French-American relations. In fact, it’s likely that the American colonies would not have defeated the British without French support.

the-glorious-first-of-june-by-philippe-jacques-de-loutherbourg-c-1795

In the 1770s, French enthusiasm for the American Revolution was high. Intellectually,
French Enlightenment intellectuals were agitating against their own feudal land systems and class privilege. Emotionally, French leaders had been eager to defeat arch-rival Britain since their Seven Years War. King Louis XVI had been privately supporting the colonists for some time. But now, formal support appeared more advantageous. France saw this as a strategic opportunity to secure North American landholdings and officially befriend a rising power. Ben Franklin also played a significant role in winning tangible French support; traveling with his wit and charm, Franklin visited Paris in 1776 to rally support for the colonists’ cause. France first assisted the rogue colonies in May of 1776 by sending 14 ships loaded with gunpowder and other war supplies.

the-role-of-france-in-the-american-revolution_1

In February of 1778, the colonists and the French signed a Treaty of Amity and
Commerce. This was significant because France not only offered trade concessions, but also legally recognized the colonies as the United States. Most importantly, Ben Franklin also secured a Treaty of Alliance with King Louis XVI. This stipulated that if France entered the war against Britain:

france-joins-us-against-britain

 

1) neither France nor the US would surrender; 2) neither would agree to peace with Britain without the other’s consent; and 3) each guaranteed the
other’s landholdings in America. Within a few months, British ships fired upon the
French, and the two countries were at war. France sent about 12,000 soldiers and 30,000 sailors to support the colonists.

Many Frenchmen were truly committed to the cause of liberty. A former French Navy
captain, Marquis de Lafayette, had such zeal that the French suggested he enlist in the US forces! He volunteered to become a major general for no pay. Lafayette became an
effective military leader and a lifelong friend of General George Washington. He was
eventually given honorary US citizenship.

french-aid-amervc

When France officially entered the war, Spanish interest was piqued. Motivated by the
possibility of a land grab, Spain entered the war as a French ally against Britain. Holland followed suit. This combination of European powers was a much greater threat to Britain than the colonies could produce alone, and the crucial 1781 victory at Yorktown could not have been won without the French alliance.

french-american-aid

Unfortunately for France, following the Battle at Yorktown, Ben Franklin engaged in
secret negotiations with Britain. This was particularly insulting considering the French- American treaties and France’s considerable wartime expenditures. Their hopes of becoming the main US trade partner were dashed when most American trade was contracted within the British Empire. Also, expectations of regaining French North American territories were mostly unmet.

Still, defeating the British brought France a definite taste of revenge. It also restored a
sense of French confidence and esteem alongside other European powers. Furthermore, in spirit France was now ready for a revolution of its own.

http://www.nerdomeblog.com

 

Deep Throat and his Legacy

This gallery contains 6 photos.

Deep Throat and his Legacy In the pre-dawn hours of June 17, 1972, a security guard called police officers to the Watergate Hotel in Washington, D.C. He had discovered a taped-open door. Once inside,the officers found and arrested five males in a highly unusual burglary. The burglary was unusual not only because it was inside […]

A Primer on Medical Acupuncture

This gallery contains 8 photos.

A Primer on Medical Acupuncture Have you ever had an uncontrollable urge to be pierced by a dozen needles? This is the image most people get when someone mentions the word “acupuncture”. It comes as no surprise that most view this technique with suspicion, even downright horror. The fact is, however, that this relatively painless […]