dWeb News

dWeb News


New data shows how big the WhatsApp privacy nightmare is for Facebook

Posted: 14 May 2021 07:40 PM PDT

dWeb.News Article from Chris Smith

Facebook will roll out its controversial WhatsApp privacy policy update on Saturday. WhatsApp users will have to agree to the new policy to continue using the chat app in full. Facebook will not delete the app if you do not agree to the new terms of service, but it will gradually phase out features to the point that WhatsApp texting and calling might be impossible. Inactivity resulting from the inability to use the app might lead to account termination.

Facebook might not have canceled plans to update the WhatsApp privacy policy to collect more user data from e-commerce features inside WhatsApp, but the company's WhatsApp privacy nightmare isn't exactly over. A regulator in Germany already issued an injunction preventing Facebook from processing user data from WhatsApp. The German regulatory body urged its European peers to take similar action. Regulations aside, Facebook also has another serious problem of its own making. The WhatsApp privacy change fueled a renewed interest in competing WhatsApp chat apps, with millions of people downloading Signal and Telegram. A new report shows just how significant the problem might be for Facebook.

Today’s Top Deal


Amazon shoppers are obsessed with these Wi-Fi smart plugs – get them for just $4.72 each!

Price: $18.89
You Save: $8.10 (30%)
Coupon Code: ECHE76M7 (by 5/31)
Buy Now

Leaving a popular platform such as WhatsApp is an almost impossible task for many people. WhatsApp works on iPhone and Android, offering the same end-to-end encryption protection to chats as iMessage and Signal. Telegram also supports end-to-end encryption, but it's not turned on by default for all conversations.

Ditching WhatsApp in favor of a different chat service might mean leaving behind friends and relatives who do not want to switch to a new app or find adapting to a different chat environment difficult. Despite that, millions of people have looked at alternatives, especially early in 2021 when WhatsApp prompts started telling them that Facebook will collect more user data.

Analyzing app downloads from the App Store and Google Play, SensorTower came up with actual figures that show just how significant the WhatsApp privacy policy change nightmare turned out to be for Facebook.

Telegram and Signal app global monthly downloads. Image source: SensorTower

Telegram and Signal app downloads surged in January. Telegram reached 63.5 million installs, a 283% increase compared to January 2020. Telegram downloads have started normalizing since then, as seen in the graph above. In April, Telegram saw 26.2 million installs, 3% fewer than a year ago.

Signal's surge was even more impressive, with the app registering a 5,001% growth in January when it reached 50.6 million app installs worldwide — Signal saw 992,000 downloads in January 2020. Downloads fell dramatically in the following months, just as Facebook released explanations for the WhatsApp privacy update and extended the deadline to accept them to May 15th. Even so, Signal has been experiencing consistent year-on-year growth throughout April. Last month, Signal had 2.8 million downloads globally, more than double the 1.3 million installs from April 2020.

The report also offers stats for WhatsApp downloads, as seen below. WhatsApp experienced a drop in installs even before reminding users of the planned privacy change. Installs started declining at the onset of the coronavirus pandemic, as more people started spending more time at home. In April 2020, the app had 55.2 million installs globally, compared to 76.5 million in May.

WhatsApp app global monthly downloads. Image source: SensorTower

WhatsApp's installs dropped to 45 million in January and then to 43 million in February before a slight rebound in March. But April's figures dropped to 38 million.

The numbers prove what we've known since January. WhatsApp is the world's most important chat app, and leaving it completely might be impossible for many people. But most iPhone and Android users experience a multi-chat universe where different chat apps are used for different groups of people. The graphs above indicate that millions of people are paying attention to Facebook's handling of their privacy. And they might convince millions of others to choose Signal, Telegram, and other apps over WhatsApp in the long run.

Today’s Top Deal


Apple’s hot new AirTags are finally back in stock on Amazon – hurry before they sell out again!

Price: $29.00
Buy NowFacebook will roll out its controversial WhatsApp privacy policy update on Saturday. WhatsApp users will have to agree to the new policy to continue using the chat app in full. Facebook will not delete the app if you do not agree to the new terms of service, but it will gradually phase out features to the point that WhatsApp texting and calling might be impossible. Inactivity resulting from the inability to use the app might lead to account termination.

Facebook might not have canceled plans to update the WhatsApp privacy policy to collect more user data from e-commerce features inside WhatsApp, but the company's WhatsApp privacy nightmare isn't exactly over. A regulator in Germany already issued an injunction preventing Facebook from processing user data from WhatsApp. The German regulatory body urged its European peers to take similar action. Regulations aside, Facebook also has another serious problem of its own making. The WhatsApp privacy change fueled a renewed interest in competing WhatsApp chat apps, with millions of people downloading Signal and Telegram. A new report shows just how significant the problem might be for Facebook.

Leaving a popular platform such as WhatsApp is an almost impossible task for many people. WhatsApp works on iPhone and Android, offering the same end-to-end encryption protection to chats as iMessage and Signal. Telegram also supports end-to-end encryption, but it's not turned on by default for all conversations.

Ditching WhatsApp in favor of a different chat service might mean leaving behind friends and relatives who do not want to switch to a new app or find adapting to a different chat environment difficult. Despite that, millions of people have looked at alternatives, especially early in 2021 when WhatsApp prompts started telling them that Facebook will collect more user data.

Analyzing app downloads from the App Store and Google Play, SensorTower came up with actual figures that show just how significant the WhatsApp privacy policy change nightmare turned out to be for Facebook.

Telegram and Signal app downloads surged in January. Telegram reached 63.5 million installs, a 283% increase compared to January 2020. Telegram downloads have started normalizing since then, as seen in the graph above. In April, Telegram saw 26.2 million installs, 3% fewer than a year ago.

Signal's surge was even more impressive, with the app registering a 5,001% growth in January when it reached 50.6 million app installs worldwide — Signal saw 992,000 downloads in January 2020. Downloads fell dramatically in the following months, just as Facebook released explanations for the WhatsApp privacy update and extended the deadline to accept them to May 15th. Even so, Signal has been experiencing consistent year-on-year growth throughout April. Last month, Signal had 2.8 million downloads globally, more than double the 1.3 million installs from April 2020.

The report also offers stats for WhatsApp downloads, as seen below. WhatsApp experienced a drop in installs even before reminding users of the planned privacy change. Installs started declining at the onset of the coronavirus pandemic, as more people started spending more time at home. In April 2020, the app had 55.2 million installs globally, compared to 76.5 million in May.

WhatsApp's installs dropped to 45 million in January and then to 43 million in February before a slight rebound in March. But April's figures dropped to 38 million.

The numbers prove what we've known since January. WhatsApp is the world's most important chat app, and leaving it completely might be impossible for many people. But most iPhone and Android users experience a multi-chat universe where different chat apps are used for different groups of people. The graphs above indicate that millions of people are paying attention to Facebook's handling of their privacy. And they might convince millions of others to choose Signal, Telegram, and other apps over WhatsApp in the long run.facebook, Signal, Telegram, WhatsApp
Tech News at http://dWeb.News

The post New data shows how big the WhatsApp privacy nightmare is for Facebook appeared first on dWeb.News Daniel Webster dWeb Internet Cowboy

dWeb: My Hometown Today

Posted: 14 May 2021 06:44 PM PDT

dWeb.News Article from Daniel Webster

Here’s a look at my hometown today. Find beauty in your life and enjoy it this weekend.

Thank you to Mel Fechter, of Scott Valley News, for capturing these photos.

Daniel Webster, Publisher

The post dWeb: My Hometown Today appeared first on dWeb.News Daniel Webster dWeb Internet Cowboy

Stoke Space and Sequoia Scientific win NASA funding to advance tech innovations

Posted: 14 May 2021 05:40 PM PDT

dWeb.News Article from Alan Boyle

Stoke Space Technologies' second-stage engine injector undergoes a test firing at the company's component test facility. (Stoke Photo)

Two Washington state companies have won grants of up to $750,000 each from NASA to take space-related technologies they're already working on to the next stage of development.

The awards to Renton-based Stoke Space Technologies and Bellevue-based Sequoia Scientific are part of the latest batch of NASA Small Business Innovation Research Phase II grants. Nationwide, $105 million in awards were allocated to 140 projects proposed by 127 small businesses spread across 34 states and Washington, D.C.

The aim of the program is to encourage the development of innovations that could contribute to NASA's efforts in human exploration, space technology, science and aeronautics — and could find commercial, non-NASA applications as well. All of the Phase II awardees previously received NASA SBIR Phase I awards that were worth up to $125,000 each.

"These small businesses received Phase I awards towards the onset of the global pandemic and persevered through it to evolve promising up-and-coming technology solutions," Jim Reuter, associate administrator for NASA's Space Technology Mission Directorate, said in a news release issued Thursday. "As the government helps get small businesses back on track, we value their commitment and dedication to supporting NASA missions and goals."

Sequoia Scientific's NASA-supported project is aimed at building a new submersible imaging device for analyzing ocean color and biogeochemistry. The hyperspectral absorption spectrophotometer could provide significantly greater accuracy and resolution than existing in-water sensors, and may provide validation for future NASA ocean-color missions such as PACEGEO-CAPE and GLIMR.

Stoke Space's award will fund the development and testing of hardware for a new type of rocket engine that's designed for use in planetary landers, reusable second stages and other types of spacecraft that perform entry, descent and landing maneuvers. The engine's nozzle would serve as an actively cooled metallic heat shield as the spacecraft descends through the atmosphere, and as a shield against debris thrown up during terminal descent.

Phase II projects typically cover up to 24 months of development work. If the projects show promise, NASA's SBIR program offers additional funding opportunities to help small businesses find investors and customers outside the space agency.

"The Phase II contract period is an exciting time, as small businesses put their ideas into practice and develop prototypes attractive to NASA and private investors," said Jason Kessler, NASA's SBIR program executive. "The selected technologies have displayed great potential impacts for their respective sectors, and we are proud to continually invest in today's booming aerospace economy through these small businesses."

Stoke Space has already attracted private investors: In February, the startup raised $9.1 million in seed funding to support the development of reusable second stages.

Two Washington state companies have won grants of up to $750,000 each from NASA to take space-related technologies they're already working on to the next stage of development. The awards to Renton-based Stoke Space Technologies and Bellevue-based Sequoia Scientific are part of the latest batch of NASA Small Business Innovation Research Phase II grants. Nationwide, $105 million in awards were allocated to 140 projects proposed by 127 small businesses spread across 34 states and Washington, D.C. The aim of the program is to encourage the development of innovations that could contribute to NASA's efforts in human exploration, space technology, science… Read MoreSpace, NASA, SBIR, Sequoia Scientific, Stoke Space

The post Stoke Space and Sequoia Scientific win NASA funding to advance tech innovations appeared first on dWeb.News Daniel Webster dWeb Internet Cowboy

Samsung’s next super cheap 5G phone just leaked in full

Posted: 14 May 2021 05:40 PM PDT

dWeb.News Article from Jacob Siegal

Samsung's flagship phones are often the ones that get the most attention from publications like ours, but millions of people all around the world prefer to spend their money elsewhere, and are more than happy to use more affordable handsets rather than one that retails for over $1,000. In fact, despite their lower price tags, modern "budget" phones don't have to compromise when it comes to important features, including support for 5G networks.

5G technology has yet to fully penetrate the market, but we are already getting a smattering of cheap 5G phones to go along with all of the pricey flagships from the top vendors. To that point, on Friday, 91mobiles shared new leaked images of the Galaxy A22, which is rumored to be Samsung's cheapest 5G phone to date.

Today’s Top Deal


Deal alert: Amazon shoppers are swarming to get this 2K camera drone that folds up as small as a smartphone

Price: $64.99
You Save: $15.00 (19%)
Buy Now

As was the case for several previous Galaxy A series phones, the Galaxy A22 features a teardrop notch at the top of the display which houses the selfie camera. There will be both a 4G model and a 5G model of this phone, and though the designs are virtually identical at a glance, there are a few subtle differences worth noting.

Leaked images of Samsung's Galaxy A22 5G. Image source: 91mobiles

First up, the bezel on the 4G model appears to be slightly less obtrusive than that of the 5G model. Both phones also have a square camera module in the top left corner of the rear panel, but where the 5G model has three cameras and a flash, the 4G model squeezes four cameras into the module and shifts the LED flash beneath it.

All told, the Galaxy A22 4G is simply more powerful than its 5G sibling. Leaks claim that the 4G model will have a 6.4-inch HD+ AMOLED display, a MediaTek Helio G80 CPU, and a camera system with a 48MP+5M+2MP+2MP setup. The selfie camera clocks in at 13 megapixels, and the RAM and storage are still unknown.

As for the Galaxy A22 5G, you should expect a 6.4-inch FHD+ LCD display, a MediaTek Dimensity 700 CPU, and three cameras in a 48MP+5MP+2MP configuration. The 5G model is also slightly thicker and heavier than the 4G model, but both come with 5,000mAh batteries that support 15W fast charging.

Finally, and perhaps most important, the Galaxy A22 is expected to cost around KRW 200,000, which converts to about $180. For the sake of comparison, Samsung's Galaxy A42 5G is priced at $359.99 on Amazon and launched for KRW 449,000 in South Korea last November. If the Galaxy A22 5G really is half the price of the Galaxy A42 5G, it could end up being one of the most affordable 5G phones on the market bar none.

Today’s Top Deal


Amazon shoppers are obsessed with these Wi-Fi smart plugs – get them for just $4.72 each!

Price: $18.89
You Save: $8.10 (30%)
Coupon Code: ECHE76M7 (by 5/31)
Buy NowSamsung’s flagship phones are often the ones that get the most attention from publications like ours, but millions of people all around the world prefer to spend their money elsewhere, and are more than happy to use more affordable handsets rather than one that retails for over $1,000. In fact, despite their lower price tags, modern “budget” phones don’t have to compromise when it comes to important features, including support for 5G networks.
5G technology has yet to fully penetrate the market, but we are already getting a smattering of cheap 5G phones to go along with all of the pricey flagships from the top vendors. To that point, on Friday, 91mobiles shared new leaked images of the Galaxy A22, which is rumored to be Samsung’s cheapest 5G phone to date.

As was the case for several previous Galaxy A series phones, the Galaxy A22 features a teardrop notch at the top of the display which houses the selfie camera. There will be both a 4G model and a 5G model of this phone, and though the designs are virtually identical at a glance, there are a few subtle differences worth noting.
First up, the bezel on the 4G model appears to be slightly less obtrusive than that of the 5G model. Both phones also have a square camera module in the top left corner of the rear panel, but where the 5G model has three cameras and a flash, the 4G model squeezes four cameras into the module and shifts the LED flash beneath it.
All told, the Galaxy A22 4G is simply more powerful than its 5G sibling. Leaks claim that the 4G model will have a 6.4-inch HD+ AMOLED display, a MediaTek Helio G80 CPU, and a camera system with a 48MP+5M+2MP+2MP setup. The selfie camera clocks in at 13 megapixels, and the RAM and storage are still unknown.
As for the Galaxy A22 5G, you should expect a 6.4-inch FHD+ LCD display, a MediaTek Dimensity 700 CPU, and three cameras in a 48MP+5MP+2MP configuration. The 5G model is also slightly thicker and heavier than the 4G model, but both come with 5,000mAh batteries that support 15W fast charging.
Finally, and perhaps most important, the Galaxy A22 is expected to cost around KRW 200,000, which converts to about $180. For the sake of comparison, Samsung’s Galaxy A42 5G is priced at $359.99 on Amazon and launched for KRW 449,000 in South Korea last November. If the Galaxy A22 5G really is half the price of the Galaxy A42 5G, it could end up being one of the most affordable 5G phones on the market bar none.Galaxy A22, Samsung
Tech News at http://dWeb.News

The post Samsung's next super cheap 5G phone just leaked in full appeared first on dWeb.News Daniel Webster dWeb Internet Cowboy

dWeb ART: ‘Photo’ Shows What George Washington Might Look Like Today, if He Was Alive

Posted: 14 May 2021 05:07 PM PDT

dWeb.News Article from Daniel Webster

what george washington would look like today

By Daniel Webster dWeb.News

"Firstly, thank you all for the amazing support and reaction to the image," George Aquilla Hardy wrote. "As an individual whom as a child said 'I want to be an artist' I'm really quite taken back by the response." Hardy posted his image of George Washington on Reddit.

George Aquilla Hardy had some time on his hands during the pandemic. He put his artistic skills to works and created an image of what George Washington, the first president of the United States from 1789 to 1797, if Washington were alive today.

Hardy studied Washington's facial features and also searched for modern lookalikes online. According to the artist, he used "lots of source images of people with the correct features." These references include "Glenn Close, Michael Douglas, a wax work of Washington, and Roger Williams." He ultimately used Photoshop to create the final digital image.

"He's a blend of those people really, in reference to paintings of him," Hardy said.

A viewer could never tell Washington’s face is actually a digital mash-up. Hardy did great work. After posting the image on Reddit, Hardy’s Washington went viral—much to the surprise of the artist.

"Firstly, thank you all for the amazing support and reaction to the image," he wrote. "As an individual whom as a child said 'I want to be an artist' I'm really quite taken back by the response."

"There are many things I would have done differently with the Washington image if I had known it would garner this kind of reaction, that said, this is the first time I have [endeavored] to create such an image, and publicly display it. Perhaps some day I will redo the Washington image with your feedback in mind."

Inspired by Hardy, other Redditors went to work. with eoford and when-the-fart both used face swap software to create their own present-day figures from American history.

Eoford rendered a modern Abraham Lincoln and when-the-fart created Benjamin Franklin as if he were alive today. Both look oddly familiar.

Check out the present-day George Washington, Abraham Lincoln, and Benjamin Franklin below.

George Aquilla Hardy Shares His George Washington Look-Alike on Twitter:

Hardy’s impressive rendering inspired others to make their own present-day presidents and statesmen using face swap software.

https://old.reddit.com/r/interestingasfuck/comments/n5i3qw/i_created_a_photorealistic_image_of_abraham/

The post dWeb ART: ‘Photo’ Shows What George Washington Might Look Like Today, if He Was Alive appeared first on dWeb.News Daniel Webster dWeb Internet Cowboy

OOPS: A First Family Privacy Nightmare Applies to Everyone — President Joe Biden’s Venmo Account Exposed in 10 minute search

Posted: 14 May 2021 03:50 PM PDT

dWeb.News Article from Daniel Webster

Lo and behold, quickly a dozen Biden family members and a mapping of the Biden family social web popped up, including the first family and a wide network of people around them, including the president’s children, grandchildren, senior White House officials, and all of their contacts on Venmo.

Joe Biden Family Tree, EntiTree, Wikimedia, Wikidata

The peer-to-peer payments app Venmo leaves everyone from ordinary people to the most powerful person in the world exposed, in as quickly as 10 minutes

President Joe Biden's Venmo account was found after less than 10 minutes of looking for it by BuzzFeed News, revealing a network of his private social connections. It is a national security issue for the United States, and a major privacy concern for every Venmo user on the popular peer-to-peer payments app.

Following a passing mention in the New York Times that the president had sent his relatives money on Venmo, a search began for the president's account using only a combination of the app's built-in search tool and public friends feature. Lo and behold, quickly a dozen Biden family members and a mapping of the Biden family social web popped up, including the first family and a wide network of people around them, including the president’s children, grandchildren, senior White House officials, and all of their contacts on Venmo.

A Privacy Disaster

Sen. Joe Biden campaigns in Ankeny PHOTO: IowaPolitics.com

The president's personal financial transactions are not public, and BuzzFeed News is not identifying the usernames for the accounts mentioned in this story due to potential national security concerns.

All of Joe Biden’s friends on his Venmo account were removed, after BuzzFeed News reached out to the White House, the new site reports. The White House did not have an immediate comment regarding the issue.

"The safety and privacy of all Venmo users and their information is always a top priority, and we take this responsibility very seriously. Customers always have the ability to make their transactions private and determine their own privacy settings in the app. We're consistently evolving and strengthening the privacy measures for all Venmo users to continue to provide a safe, secure place to send and spend money," a Venmo spokesperson told BuzzFeed.

The post OOPS: A First Family Privacy Nightmare Applies to Everyone — President Joe Biden’s Venmo Account Exposed in 10 minute search appeared first on dWeb.News Daniel Webster dWeb Internet Cowboy

World’s largest crypto exchange under investigation in the US

Posted: 14 May 2021 03:40 PM PDT

dWeb.News Article from Chris Smith

Bitcoin and cryptocurrencies have had an amazing year so far. Various digital assets, including bitcoin and ethereum, reached new all-time highs, taking the entire market on a continued bull run since January. The renewed interest in bitcoin and blockchain tech came from both retail investors and institutions.

Tesla bought bitcoin, then sold electric cars for bitcoin for a few months before discontinuing the practice. PayPal embraced crypto trading last year and then allowed users to convert their crypto balance to fiat to pay for goods online. These events all pushed the prices higher and the sentiment around cryptocurrencies rose, just as more stimulus money poured into bank accounts, as countries continued to prop up their pandemic-bruised economies.

Today’s Top Deal


Apple’s hot new AirTags are finally back in stock on Amazon – hurry before they sell out again!

Price: $29.00
Buy Now

But governments have not relented when it comes to investigating blockchain companies and looking to devise or enforce regulations in an industry that's difficult to control due to the decentralized nature of blockchain.

Over the past few months alone:

The SEC sued Ripple.
The U.S. Commodity Futures Trading Commission (CFTC) started investigating Binance for giving Americans access to digital token derivatives.
The IRS looked into Kraken's US customers.
The Indian government started considering new laws that would make it harder for citizens to buy and sell cryptocurrencies.

Binance, which happens to be the world's largest crypto exchange, faces two additional probes on top of the CFTC's investigation from March. The Justice Department and the IRS are also looking into Binance's US-related operations, targeting different illicit activities that crypto trading might facilitate.

People familiar with the investigations have informed Bloomberg that the agencies have sought information about Binance's business. Money laundering and tax offenses are at the core of the probes.

The specifics of what the agencies are examining have not been determined, the paper notes. Also, not all such inquiries lead to allegations of wrongdoing. Bloomberg notes that the Justice Department's bank integrity unit and investigators from the US Attorney's Office in Seattle are involved. The separate IRS investigation goes back months, with the agency reviewing the conduct of Binance customers and employees. The CFTC's investigation concerns illegal trading that Binance might have made available to Americans — companies need to be registered with the CFTC before offering derivatives linked to digital tokens to American customers.

The probes follow a recent Chainalysis report that found most of the crime-linked digital tokens that it tracks ended up on Binance. Of the $2.8 billion worth of bitcoin that Chainalysis suspects it's connected to illegal activity moved to trading platforms in 2019. Some $756 million (or 27%) ended up on Binance.

Binance said in a statement to Bloomberg that it takes its legal obligations very seriously:

We take our legal obligations very seriously and engage with regulators and law enforcement in a collaborative fashion. We have worked hard to build a robust compliance program that incorporates anti-money laundering principles and tools used by financial institutions to detect and address suspicious activity.

Binance CEO Changpeng Zhao has said that the trading platform follows US rules closely, blocking Americans from its websites and using algorithms to flag transactions for money laundering and other illicit activities. Last year, the company warned US residents that they would have their accounts frozen if found to be trading. Binance launched Binance.US for American customers in September 2019.

Binance spokesperson Jessica Jung also addressed VPN use, which would allow Americans to circumvent restrictions. Binance never encouraged US residents to rely on VPNs, Jung said. Zhao tweeted in January that Binance's security systems can block American customers. "We have implemented strong access controls that have been tested via external audit and are under continuous review and evaluation by Binance to ensure that the appropriate restrictions are in place and are effective," Jung added.

Today’s Top Deal


AirPods Pro are finally back in stock at Amazon… at the lowest price of 2021!

Price: $197.00
You Save: $52.00 (21%)
Buy NowBitcoin and cryptocurrencies have had an amazing year so far. Various digital assets, including bitcoin and ethereum, reached new all-time highs, taking the entire market on a continued bull run since January. The renewed interest in bitcoin and blockchain tech came from both retail investors and institutions.

Tesla bought bitcoin, then sold electric cars for bitcoin for a few months before discontinuing the practice. PayPal embraced crypto trading last year and then allowed users to convert their crypto balance to fiat to pay for goods online. These events all pushed the prices higher and the sentiment around cryptocurrencies rose, just as more stimulus money poured into bank accounts, as countries continued to prop up their pandemic-bruised economies.

But governments have not relented when it comes to investigating blockchain companies and looking to devise or enforce regulations in an industry that's difficult to control due to the decentralized nature of blockchain.

Over the past few months alone:
The SEC sued Ripple.
The U.S. Commodity Futures Trading Commission (CFTC) started investigating Binance for giving Americans access to digital token derivatives.
The IRS looked into Kraken's US customers.
The Indian government started considering new laws that would make it harder for citizens to buy and sell cryptocurrencies.

Binance, which happens to be the world's largest crypto exchange, faces two additional probes on top of the CFTC's investigation from March. The Justice Department and the IRS are also looking into Binance's US-related operations, targeting different illicit activities that crypto trading might facilitate.

People familiar with the investigations have informed Bloomberg that the agencies have sought information about Binance's business. Money laundering and tax offenses are at the core of the probes.

The specifics of what the agencies are examining have not been determined, the paper notes. Also, not all such inquiries lead to allegations of wrongdoing. Bloomberg notes that the Justice Department's bank integrity unit and investigators from the US Attorney's Office in Seattle are involved. The separate IRS investigation goes back months, with the agency reviewing the conduct of Binance customers and employees. The CFTC's investigation concerns illegal trading that Binance might have made available to Americans — companies need to be registered with the CFTC before offering derivatives linked to digital tokens to American customers.

The probes follow a recent Chainalysis report that found most of the crime-linked digital tokens that it tracks ended up on Binance. Of the $2.8 billion worth of bitcoin that Chainalysis suspects it's connected to illegal activity moved to trading platforms in 2019. Some $756 million (or 27%) ended up on Binance.

Binance said in a statement to Bloomberg that it takes its legal obligations very seriously:
We take our legal obligations very seriously and engage with regulators and law enforcement in a collaborative fashion. We have worked hard to build a robust compliance program that incorporates anti-money laundering principles and tools used by financial institutions to detect and address suspicious activity.
Binance CEO Changpeng Zhao has said that the trading platform follows US rules closely, blocking Americans from its websites and using algorithms to flag transactions for money laundering and other illicit activities. Last year, the company warned US residents that they would have their accounts frozen if found to be trading. Binance launched Binance.US for American customers in September 2019.

Binance spokesperson Jessica Jung also addressed VPN use, which would allow Americans to circumvent restrictions. Binance never encouraged US residents to rely on VPNs, Jung said. Zhao tweeted in January that Binance's security systems can block American customers. "We have implemented strong access controls that have been tested via external audit and are under continuous review and evaluation by Binance to ensure that the appropriate restrictions are in place and are effective," Jung added.Binance, Bitcoin
Tech News at http://dWeb.News

The post World's largest crypto exchange under investigation in the US appeared first on dWeb.News Daniel Webster dWeb Internet Cowboy

Help Your Gut Helps Your Lungs: Probiotics associated with fewer respiratory symptoms in overweight and older people

Posted: 14 May 2021 02:47 PM PDT

dWeb.News Article from Daniel Webster

wood sign internet computer

Findings of probiotic study provide further evidence of relationship between the gut and lungs

pineapple next to bowl
Photo by Karley Saagi on Pexels.com

DIGESTIVE DISEASE WEEK

Bethesda, MD (May 14, 2021) — Daily probiotic use was associated with fewer lung upper respiratory symptoms in overweight and older people, according to a study that suggests a potential role for probiotics in preventing respiratory infections. Helping your gut helps your lungs. The study was selected for presentation at Digestive Disease Week® (DDW) 2021.

“This is not necessarily the most intuitive idea, that putting bacteria into your gut might reduce your risk of respiratory infection,” said Benjamin Mullish, MD, a lead researcher on the study and clinical lecturer in the Division of Digestive Diseases, Imperial College London, England, “but it’s further evidence that the gut microbiome has a complex relationship with our various organ systems. It doesn’t just affect how our gut works or how our liver works, it affects aspects of how our whole body works.”

Researchers re-analyzed detailed daily diaries of 220 patients who participated in an earlier double-blind placebo-controlled study on probiotics and weight loss. Reviewing the entries for common symptoms of upper respiratory infection, including cough, sore throat and wheezing, researchers found that participants who took probiotics during the six-month study had a 27 percent lower overall incidence of upper respiratory tract symptoms compared to the placebo group. The effect was largest among participants who were aged 45 years or older, as well as those with obesity.

People with obesity are at higher risk for respiratory infections. Previous research has shown that probiotics reduce upper respiratory infections in healthy adults and children, but little data exists on this vulnerable population of older, overweight and people with obesity.

“These findings add to growing interest in the gut-lung axis — how the gut and the lungs communicate with each other,” Dr. Mullish said. “It’s not just the gut sending out signals that affect how the lungs work. It works in both directions. It adds to the story that changes in the gut microbiome can affect large aspects of our health.”

The researchers did not measure immune response, only respiratory symptoms. Future randomized clinical trials could help identify the mechanisms related to the reduction in respiratory symptoms and explore the possible impact of probiotics on the immune system, Dr. Mullish said.

The post Help Your Gut Helps Your Lungs: Probiotics associated with fewer respiratory symptoms in overweight and older people appeared first on dWeb.News Daniel Webster dWeb Internet Cowboy

This might be the secret behind the shrinking notch on the iPhone 13

Posted: 14 May 2021 02:39 PM PDT

dWeb.News Article from Jacob Siegal

We're still about four months out from the launch of the iPhone 13, but rumors and leaks have been popping up at a furious pace in recent months. According to those leaks, one of the most likely design changes coming to the iPhone 13 is a smaller notch, which many iPhone owners have been clamoring for since the iPhone X launched in 2017. This alteration seemed inevitable, and the only question was how the company was going to make it happen. Now, thanks to a new report from Digitimes, we might know the secret behind the shrinking notch.

Citing industry sources, Digitimes reports that Apple has figured out a way to reduce the size of the VCSEL (vertical-cavity surface-emitting laser) chips that are used in the Face ID sensors by 40-50% in new iPhone and iPad models set to roll out later this fall. Not only could this assist Apple in making the notch take up less room, but it should also help Apple cut production costs, as even fewer wafers will need to be produced for the chips.

Today’s Top Deal


Apple’s hot new AirTags are finally back in stock on Amazon – hurry before they sell out again!

Price: $29.00
Buy Now

Providing the leaks that we've seen over the past few weeks are accurate, we already know what to expect when it comes to the design of the iPhone 13. Back in April, leaked images of a purported screen protector for the iPhone 13 made it clear that the sensor housing will be significantly smaller this time around. That assertion has been backed up by subsequent leaks, including a video from Unbox Therapy showcasing an iPhone 13 Pro Max dummy model which had been built with the specifications of all the latest rumors and reports in mind.

Scaling down the chips is one way that Apple could achieve a smaller notch on the iPhone 13 lineup, but it's certainly not the only way. Other reports claim that Apple will push the earpiece speaker from the center of the notch to the top, where it will sit in the bezel that surrounds the display. This would let Apple pack all of the sensors within the housing closer together, eliminating the need for such a wide notch at the top of the screen.

The notch will likely be the design element that we'll all be tracking when Apple unveils the iPhone 13 in September, but it won't be the only element of the iPhone to get a makeover. KGI Securities analyst Ming-Chi Kuo has claimed the iPhone 13 Pro and iPhone 13 Pro Max will come with upgraded Ultra Wide cameras that have apertures of f/1.8 and autofocus instead of fixed focus. The camera modules of the dummy unit seemingly reflect that, and as a result, the lenses are noticeably larger than they were on the iPhone 12 series.

Today’s Top Deal


AirPods Pro are finally back in stock at Amazon… at the lowest price of 2021!

Price: $197.00
You Save: $52.00 (21%)
Buy NowWe’re still about four months out from the launch of the iPhone 13, but rumors and leaks have been popping up at a furious pace in recent months. According to those leaks, one of the most likely design changes coming to the iPhone 13 is a smaller notch, which many iPhone owners have been clamoring for since the iPhone X launched in 2017. This alteration seemed inevitable, and the only question was how the company was going to make it happen. Now, thanks to a new report from Digitimes, we might know the secret behind the shrinking notch.

Citing industry sources, Digitimes reports that Apple has figured out a way to reduce the size of the VCSEL (vertical-cavity surface-emitting laser) chips that are used in the Face ID sensors by 40-50% in new iPhone and iPad models set to roll out later this fall. Not only could this assist Apple in making the notch take up less room, but it should also help Apple cut production costs, as even fewer wafers will need to be produced for the chips.

Providing the leaks that we’ve seen over the past few weeks are accurate, we already know what to expect when it comes to the design of the iPhone 13. Back in April, leaked images of a purported screen protector for the iPhone 13 made it clear that the sensor housing will be significantly smaller this time around. That assertion has been backed up by subsequent leaks, including a video from Unbox Therapy showcasing an iPhone 13 Pro Max dummy model which had been built with the specifications of all the latest rumors and reports in mind.

Scaling down the chips is one way that Apple could achieve a smaller notch on the iPhone 13 lineup, but it’s certainly not the only way. Other reports claim that Apple will push the earpiece speaker from the center of the notch to the top, where it will sit in the bezel that surrounds the display. This would let Apple pack all of the sensors within the housing closer together, eliminating the need for such a wide notch at the top of the screen.

The notch will likely be the design element that we’ll all be tracking when Apple unveils the iPhone 13 in September, but it won’t be the only element of the iPhone to get a makeover. KGI Securities analyst Ming-Chi Kuo has claimed the iPhone 13 Pro and iPhone 13 Pro Max will come with upgraded Ultra Wide cameras that have apertures of f/1.8 and autofocus instead of fixed focus. The camera modules of the dummy unit seemingly reflect that, and as a result, the lenses are noticeably larger than they were on the iPhone 12 series.Apple, Face ID, iPhone 13
Tech News at http://dWeb.News

The post This might be the secret behind the shrinking notch on the iPhone 13 appeared first on dWeb.News Daniel Webster dWeb Internet Cowboy

20 Working from Home Security Tips for 2021 By Andrew Lopez

Posted: 14 May 2021 02:39 PM PDT

dWeb.News Article from jaydiaz2013

Working From Home in 2021

While the pandemic shifted numerous industries and the work force associated with them, working from home will be a trend that remains for the foreseeable future. As more companies work with employees to set up a home office, the question for businesses is how does the company keep a high level of cybersecurity for employees while working from home? Until now, most company associates would report to the office to work within their designated offices. The cybersecurity protocols installed at the office would handle all security aspects for the employees.

The short answer is practicing good cybersecurity habits. Putting in an effort to educate and practice daily cybersecurity activities will pay dividends in the long run. We've compiled a list of 20 work from home security tips to help combat bad actors & educate work from home users.

1. Secure Your Home Office

The thought of securing a home office doesn't come to mind readily for home PC security. Generally speaking a home office will be set up in a spare bedroom, an open space area that becomes a makeshift office, or sitting on a comfy couch. With that said, how are you securing your home office? For starters, we recommend designating an area strictly for work related activities. If possible, convert a spare bedroom or area into an office to help maintain a secure area.

A lock on the home office door prevents unwelcome guests from accessing the room that has workstations and other work related hardware. In addition if you use a laptop and relocate outside of the house, be sure to bring the device in with you so no one gets any ideas of grabbing the laptop. Maintaining a consistent awareness of security is key to any proper cybersecurity hygiene.

Lastly, lock up the home office when you finish your work day. You would never leave an office without locking up behind you. Securing a home office may sound like overkill, but implementing these solutions will help keep devices secure while working from home.

2. Secure Your Home Modem / Router

Implementing a secure home office internet connection has exponentially increased within the last year. Before the pandemic most individuals didn't think twice about their home security. You would use home WiFi and the internet mostly for streaming, catching up on news, social media, and other personal activities.

Fast forward to present time, lots of folks are using their home internet connection for work purposes. What can you do to secure your home network? Glad you (virtually) asked. First, change the WiFi Service Set IDentifier (SSID), the name that broadcasts throughout the home, to a name of your choosing. Most Internet Service Providers (ISPs) configure modems/routers with default settings. Changing the default name will prevent outside forces of knowing what type of ISP your home uses.

Second, change the WiFi password to something more complex. Using a minimum of 12 – 14 characters (the more the better) to help fight malicious actors from accessing the network. While you're updating passwords be sure to update the router password. Again these devices come pre-configured with the exact same settings. If you and your neighbor have the same ISP and modem/router, chances are high both your modem/router have the same exact password.

Lastly, confirm with the ISP the WiFi connection remains secure and closed to the household. On occasion the modem/router the ISP provides may be non-secure and using an old WiFi technology named Wired Equivalent Privacy (WEP).

We won't dive too deep into WiFi security protocols, but in short all WiFi connections should be using WPA2. Call the ISP that provides internet to find out more.

3. Don't Delay Software Updates

Software updates are one of the most overlooked security measures for businesses and employees. A software update patches various bugs, security holes, and provides additional software features. For instance, when a Microsoft Office update becomes available, chances are the update is plugging up security vulnerabilities as well as adding new features to the suite. Any time a software prompt displays to perform an update, we highly recommend pushing the update through. Similarly if a business partners with a managed IT service provider the system administrators schedule a time to push these updates to the entire network.

Delaying software updates can become troublesome if not performed in a timely manner. Eventually the software will need to be updated. Don't delay and either perform the software update yourself or the manage IT service provider will set a plan to push the update during non-business hours.

4. Watch Out For Phishing Scams

The new normal of working from home became a reality during the early months of the pandemic. More and more businesses are helping employees settle into this new normal. However, because most people are working from home doesn't mean being more relaxed with company assets. For example, email phishing is a consistent hacking method bad actors use to obtain an individual's email password.

Email security awareness is a continued practice no matter where you're working. In other words remain vigilant when reading emails. Calling an individual who emailed you with a strange looking email is a good idea to receive secondary confirmation. Especially if the email doesn't look quite right. Never click on any links within an email if you're unsure of the source.

Scammers are looking for ways to target home workers now more than ever. Remain alert and always check with the sender if the email is legitimate.

5. Implement A Virtual Private Network (VPN)

A virtual private network (VPN) is by far an excellent security protocol to implement for any sized business. We discussed the benefits of implementing a VPN protocol in a separate blog post and provided a great overview.

A VPN provides an encrypted internet connection. To demonstrate how a VPN would work in the real world let's discuss an example. If you were to work in a Starbucks or other public area with a WiFi connection, chances are high the connection is not secure. Most free WiFi connections are far from secure and leave you open to malicious individuals who know how to infiltrate the wireless connection.

Say you have a VPN protocol set up for your business. When you connect to your VPN the connection becomes encrypted. In other words the connection to the Internet is unreadable by humans or computers. The encrypted connection keeps your data safe and secure. While this example is an oversimplification of VPN, understanding the importance of a VPN connection can help you make better technology decisions when away from your home network.

6. Increase Password Complexity

Passwords are one of the highest security vulnerabilities when it involves cybersecurity. Too many individuals use short or simple passwords that can be easily guessed. For example, using "password" as your password is never a good idea. Similarly, avoid using pet names, relatives, or any other closely related trait that are easily guessable associations with you or your family. We strive to enforce strong complex passwords to help mitigate potential issues down the road.

Use a minimum of 14 characters with a combination of upper and lowercase letters, special characters, and numbers. Additionally, implement and practice using complex passwords throughout other login touch points. In fact, if passwords for software, web logins, etc. remain easy to guess or don't have a password at all, we highly recommend adding and updating the password with more complex characters.

It is important to realize that passwords are the gatekeepers to access specific devices and services. The more complex the password, the harder to guess and prevent a brute force entry into said device or service. Collaborate with IT to keep all accounts secure with complex passwords.

7. Incorporate MFA For All Web Services

In addition to increasing password complexity, incorporating an extra layer of security when signing into a website is a great idea. Multi factor authentication (MFA), sometimes referred to as two-factor authentication (2FA), is defined as a security enhancement that allows you to present two pieces of evidence when logging in to an account. For instance, when logging into an email account like Gmail or Yahoo, you receive a notification to confirm it is you logging in. You will receive a code or prompt on your mobile device, which you can use to confirm your login.

Any time company employees are accessing sensitive data, implementing MFA would be an ideal security protocol. Single sign on would be easily accessible if the password were to become public knowledge. Without the second layer of security the malicious individual would be able to sign in without a second verification step. Using a smartphone, email, or other secondary device, will become the second verification method for accessing the email account, thus adding an extra layer of security to your sensitive material.

Installing an additional layer of cybersecurity will help prevent hijacking of sensitive account data. Work with your IT provider to activate MFA if you don't have the protocol implemented already.

8. Keep Personal & Work Devices Separate

The temptation of combining both a work and personal device into one is intriguing and convenient. However, work devices should be that; only related to work. To clarify, no work device should be tied to any personal information. First, all personal data will need to live on their own devices. You don't want personal data mixing with business data. Second, business data is sensitive. You have customer information, credit card numbers, and other highly classified data that will need to be separate from a personal device. Lastly, keep the company provided device in a separate location from the personal device. In fact, lock the room or store the device somewhere only you have access to.

Mixing devices can hinder security for employees, especially if data has been shared between devices. Personal and work data need to remain on their own devices. For example, you don't want a virus attacking a personal device that contains an important report or document. Imagine if that virus wiped away all of your personal and work data.

Keep personal and work devices separate at all times. You'll be happy you did.

9. Avoid Working At A Public WiFi Location

Free WiFi is a convenient connection to have when in a pinch. Did you know that most free WiFi locations have insecure connections? In fact, the reason free WiFi is readily available in coffee shops, airports, or other lounge areas is how easy it is to install a free WiFi hotspot. Although free, these connections are not safe by any stretch of the imagination. You'll be happy to know there are methods to help avoid free WiFi and insecure connections.

For starters, we recommend using a smartphone as a hotspot to tether the connection from phone to laptop. A smartphone is a more secure method in a variety of ways. First, you're the only person with the connection credentials. Second, the phone is using a cellular connection instead of an insecure WiFi connection. And lastly, that cellular connection is much more difficult to infiltrate than a free, non-secure WiFi connection.

Most smartphone service providers are offering unlimited data, which you as a traveler can take advantage of. Always use personal devices like a smartphone for internet access. Use the free WiFi sparingly for finishing time sensitive tasks if no other option is available.

10. Encrypt Data As Much As Possible

Encryption became a buzzword around the time the Internet was leaning into increased security. Encryption is a way of scrambling data so that only authorized parties can understand the information. In other words encryption takes readable data and changes it so that it appears unreadable by humans or computers.

Discussing the type of data that should be encrypted can vary. For instance, email is always a good topic when discussing what data needs to be encrypted. Modern email clients like Microsoft Outlook can provide encryption. In addition, other 3rd party tools like Hightail and ShareFile are solid options when sharing sensitive data.

Encrypting data is a must for specific industries. Financial sectors need higher data integrity standards which requires encryption of specific data. For example, any social security numbers or other personally identifiable information are encryption data candidates to deter any espionage. Similarly while performing encryption, you're also protecting the business from any liability. The more secure protocols implemented the higher the difficultly to obtain shared data.

11. Backing Up Data

The first rule of backing up is talking about actually backing up data. For example, setting a continuous schedule to back up data will be a win for any business. Similarly a backup strategy is more than simply backing up data on a computer. In fact, implementing a backup strategy entails discussing numerous topics about the company data. For instance, what data needs to be backed up? How often do we need to keep backups? How quickly do you need to retrieve lost data?

While backing up all important data will be relevant to the discussion, determining what data is crucial is another task in itself. A business will determine what data is relevant to keep the company moving forward. Take a moment to think about the impact the business would incur if a certain set of documents or data were gone. What data would paralyze the business if said data would go missing forever?

Work with IT on setting up a backup strategy. A typical backup strategy will cover all important network devices, such as servers, desktops, and network attached storage (NAS). A managed IT service provider can work with you on a plan that fits the company budget and on how fast data will need to be recovered in case of an emergency. Don't wait too long to get a backup strategy in place. The sooner the backups are running the better sleep you can get at night.

12. Use Company Provided Thumb Drives

Small flash or thumb drives are hardware devices that allow users to store data. If you're anything like me you have a handful of these lying around the house in a junk drawer. We're here to champion using company provided thumb drives to improve your overall cybersecurity. A managed IT service provider can set specific parameters on thumb drives unique to you. For example, adding a password to the thumb drive will prevent easily accessing the data on the drive. A home used thumb drive may have personal data and work data.

We highly recommend that you not use any personal or random thumb drives found at the home office or a friend's house. Unknowingly using a thumb drive can cause disaster to a computer. First, an unmanaged thumb drive may be storing personal information. This is information that you do not want on your company provided laptop. Second the thumb drive may have old, outdated software that potentially leaves the drive vulnerable and cause further damage to the computer. Lastly, using a random thumb drive without knowing what's on the drive is another cybersecurity mistake.

Work with the IT team to secure the thumb drive as much as possible. One last tip, if sending a thumb drive via mail, be sure to password protect the drive. You can call the recipient with the password once the thumb drive arrives. You can never be too careful when sending data via mail or email for that matter. Always err on the side of caution to prevent any major cyber issues down the road.

13. Keep Your Operating System Up To Date

The operating system runs the entire computer's internal system. Windows 10 and macOS Big Sur are two examples of an operating system. Stressing the point of how important updating the PC's operating system cannot be said enough. For instance, when an operating system update is available, we highly recommend installing the update towards the end of day. In fact, installing the updates at the end of the work day will prevent any stoppage. Similarly, a second option is to install the updates over the weekend, which will allow the PC to reboot as many times as needed to install the new operating system.

Lastly, partnering with a MSP will free you up of any updates moving forward. When you partner with a MSP, you can work with the provider to install updates during non-business hours and on your behalf. The MSP accommodates the company's work schedule and installs the patches during off hours. Installing operating system updates remains a smart and sound decision. While not the most exciting task to perform on a PC, running operating system updates is critical to the health of the PC and squashing any security vulnerabilities.

14. Set A Schedule With IT To Run Company Device Updates

One of the many perks of partnering with a managed IT service provider is a service called remote monitoring & management. Numerous tasks are performed remotely and running device updates is one of them. In the previous section we discussed how an entrepreneur will be able to perform security updates on their own. However, most users will ignore the prompts to update the software or OS update and instead push off at a later time. Here's how a MSP can help save you time & clicks.

For starters, a MSP will perform the updates on your behalf. In other words, the IT team will have remote support agents on company devices and will be able to perform the security updates on behalf of the end users. In addition, IT will work with the company's point of contact to determine what times are optimal for security updates. For example, when the MSP performs security patches on the second weekend of the month, the IT team downloads the updates, and installs them during non-business hours. The goal is to prevent any disruption, while maintaining full cybersecurity protocols for the entire business.

Instead of ignoring or determining the optimal time to run security updates, farm out the security updates to a MSP. You'll save time, energy, and resources.

15. Ensure Automatic Locking Is Enabled

Automatic locking will lock your device after a certain amount of time of inactivity. System administrators have come to an agreement that a device should automatically lock after 15 minutes of inactivity. In fact, implementing a device's automatic lock policy can help maintain a secure network. Many company policies require that PC lock settings are in place to meet financial or investment guidelines. In addition implementing an automatic locking policy helps keep computers from being accessed by uninvited internal guests. This allows company data to remain secure and locked away.

We encourage all businesses, no matter how big or small, to lock devices on a regular basis. Here's a fun tip: For Windows users, if you hit the Windows Key + L keys simultaneously, the screen will lock. For macOS users, tap on the keys CTRL + CMD + Q.

16. Confirm Antivirus Is Running On Device

Every workstation will need to have an antivirus (AV) software running. This point bears repeating: Every workstation will need to have an AV software running. The importance of installing and maintaining an AV app cannot be overstated. While other security tools live on the network and firewall, an AV app runs locally on the PC. A solid AV will run on a continual basis and schedule full scans outside of peak business hours. The AV does not take breaks and will run 24/7/365.

Smart AV software is able to detect whether a threat is viable and can quarantine said virus. Look for AV software that will automate and look for nefarious files or unwelcome digital guests. Confirm with your managed IT service provider and determine if an AV is installed on all business devices. The more devices with AV installed the more secure a PC will be.

17. Enable Find My Device & Remote Wipe

All Windows and macOS computers come with a "find my device" feature. The feature allows end users to wipe the computer if stolen, lost, or unrecoverable; therefore preventing data from being accessed by malicious entities. Most managed IT service providers incorporate remote wipe type features to safeguard a mobile workstation. For instance, BitLocker is an encryption feature built into computers running Windows 10 Pro. In short, BitLocker encrypts the computer's hard drive and secures your data by scrambling it so it can't be read without authenticated decrypting using a recovery key.

For macOS users, Find My Mac is a similar solution to Windows BitLocker. For instance, if a MacBook become stolen, you're able to lock your Mac or erase the Mac from another Apple device. In addition, you'll be able to pinpoint the device using an Apple iPhone and determine where the device is. In the event that the Mac device remains powered off or offline, you can still use Find My Mac to request a notification when it's located, or lock or erase it remotely.

Travel will soon be opening up and individuals will be carrying laptops, smartphones, and tablets with them for work. Make sure each device has a remote wipe capability to protect sensitive company data.

18. Work With IT On Wiping Any Non-used Devices

Data sanitization refers to wiping a hard drive once the computer no longer needs to be commissioned. A MSP works with a customer to ensure all data and personally identifiable information (PII) remains off the hard drive. Ensuring data is erased from a hard drive helps protect sensitive and company data. With that said, what is your business' protocols to wipe hard drives?

The first step requires working with the IT staff to prioritize wiping and erasing the hard drive's data. A solid method to wipe the hard drive uses the DoD 3-pass standard. In short, using the DoD data sanitization method will prevent all software-based file recovery methods — as well as hardware-based recovery methods — from recovering meaningful data from the drive. The second step signals a successful hard drive wipe. The last step determines whether the hard drive is an e-waste candidate or can be used again for another end user.

Erasing the hard drive's data practices good cybersecurity hygiene. Work with your managed IT service provider to determine the best course of action for your business.

19. Increase Cybersecurity Awareness Training

Cybersecurity awareness training became an essential part of businesses prior to the pandemic. Fast forward to 2021 and more businesses have become targets for phishing attacks under the guise of COVID-19 topics. Now is a crucial time to implement or update your cybersecurity training. Maintaining a consistent training regimen not only provides solid PC education, but the program will also help to keep employees up to date on the latest threats. For instance, running a faux phishing campaign can help increase awareness of who's paying attention to email and who needs additional cybersecurity awareness training.

The objective isn't to call someone out or publicly shame an individual, but rather the goal is to teach and coach the individual on what they missed on the phishing training session. Work with IT on providing cybersecurity training to all end users. The more educated the company on digital threats, the better off the business will be.

20. User Access Control

The philosophical IT discussion of allowing end users to have admin rights has been pontificated on numerous occasions. Although allowing individuals to have admin rights is a slippery slope we do not recommend. For example, when a user has admin rights enabled for their profile, the chances that the end user may end up accidentally downloading or installing a malicious application increase. In addition, the computer may become infected and you may be unable to access company data. We highly encourage businesses to restrict any user from having administrative rights.

The system administrators recommend limiting or completely removing admin rights from all users. If administrator rights are a must for a business, we create and assign a separate account to act as an admin for software installations or other PC needs. Keeping end users away from admin rights helps prevent ransomware, data breaches, and other catastrophic events that can lead to malicious digital guests. While it may be convenient to have admin rights, cybersecurity for the entire company should always outweigh convenience.

via Technology & Innovation Articles on Business 2 Community https://bit.ly/3oiVddL

Working From Home in 2021 While the pandemic shifted numerous industries and the work force associated with them, working from home will be a trend that remains for the foreseeable future. As more companies work with employees to set up a home office, the question for businesses is how does the company keep a highideas, innovation, management, technology, Technology & Innovation Articles on Business 2 Community

The post 20 Working from Home Security Tips for 2021 By Andrew Lopez appeared first on dWeb.News Daniel Webster dWeb Internet Cowboy

Comments

Popular posts from this blog

dWeb News

dWeb News

dWeb News