Archive for November 9, 2017

Tech Companies Continue Decade-Plus History of Setting LGBTQ Workplace Inclusion Standards

Posted in Commentary with tags on November 9, 2017 by itnerd

The nation’s computer tech companies continue to lead on LGBTQ workplace equality and inclusion, according to the 2018 Corporate Equality Index (CEI) issued today by the Human Rights Campaign (HRC) Foundation, the educational arm of the nation’s largest lesbian, gay, bisexual, transgender and queer (LGBTQ) civil rights organization.

A record-breaking 609 businesses nationwide earned 100-point scores in the CEI, and 48 of these companies are in the internet services and retailing, computer hardware, software and data services areas of the tech sector. An additional 17 companies earned a score of between 80 and 95.

Box Inc., Cloudera Inc., GODADDY Inc., Indeed Inc., Lyft Inc., Medallia Inc., New Relic Inc., Nuance Communications, Rackspace, SYNNEX Corp., Workday Inc. are debuting on the CEI.

In the first CEI report published in 2002, tech companies began distinguishing themselves as leaders in workplace equality, with Apple and Xerox leading the way. Those two companies are among only nine nationwide that have received perfect scores in every CEI.

Employer Name

City

State

Score

Acer America Corp. San Jose CA

25

Adobe Systems Inc. San Jose CA

100

ADP Roseland NJ

100

Airbnb Inc. San Francisco CA

100

Akamai Technologies Inc. Cambridge MA

100

Allscripts-Misys Healthcare Solutions Inc. Chicago IL

40

Amazon.com Inc. Seattle WA

100

AOL New York NY

85

Apple Inc. Cupertino CA

100

Arrow Electronics Centennial CO

80

Autodesk Inc. San Rafael CA

100

Avaya Inc. Santa Clara CA

70

Avnet Inc. Phoenix AZ

80

BMC Software Inc. Houston TX

70

Box Inc. Redwood City CA

80

CA Technologies Inc. New York NY

100

CDW Corp. Lincolnshire IL

100

Citrix Systems Inc. Fort Lauderdale FL

100

Cloudera Inc. Palo Alto CA

100

Computer Sciences Corp. (CSC) Falls Church VA

75

Dell Inc. Round Rock TX

100

Dropbox Inc. San Francisco CA

100

eBay Inc. San Jose CA

100

Electronic Arts Inc. Redwood City CA

100

EMC Corp. Hopkinton MA

100

Eventbrite Inc. San Francisco CA

85

Expedia Inc. Bellevue WA

100

Facebook Inc. Menlo Park CA

100

FactSet Research Systems Inc. Norwalk CT

100

GODADDY Inc. Scottsdale AZ

90

Google Inc. Mountain View CA

100

Groupon Inc. Chicago IL

100

Hewlett Packard Enterprise Co. Palo Alto CA

100

Hortonworks Inc. Santa Clara CA

65

HP Inc. Palo Alto CA

100

IAC/InterActiveCorp. New York NY

100

Indeed Inc. Austin TX

100

Ingram Micro Irvine CA

85

Insight Enterprises Inc. Tempe AZ

75

Instacart Inc. San Francisco CA

95

Intuit Inc. Mountain View CA

100

LENOVO (UNITED STATES) INC. Morrisville NC

100

LexisNexis Group New York NY

95

Lexmark International Inc. Lexington KY

100

LinkedIn Sunnyvale CA

100

Lyft Inc. San Francisco CA

100

Medallia Inc. San Mateo CA

100

Microsoft Corp. Redmond WA

100

NCR Corp. Duluth GA

100

NetApp Inc. Sunnyvale CA

95

New Relic Inc. San Francisco CA

95

Nuance Communications Burlington MA

80

Oracle Corp. Redwood City CA

100

PayPal Holdings Inc. San Jose CA

100

Pitney Bowes Inc. Stamford CT

70

priceline.com LLC Norwalk CT

90

Rackspace San Antonio TX

100

Salesforce San Francisco CA

100

SAP America Inc. Newtown Square PA

100

Seagate Technology LLC Scotts Valley CA

25

Software AG USA Inc. Reston VA

60

Software House International Somerset NJ

10

SRA International Inc. Fairfax VA

80

Symantec Corp. Mountain View CA

100

SYNNEX Corp. Fremont CA

80

Tech Data Corp. Clearwater FL

100

TripAdvisor Inc. Needham MA

90

Twitter Inc. San Francisco CA

100

Uber Technologies Inc. San Francisco CA

100

Ultimate Software Group Inc., The Weston FL

100

Unisys Corp. Blue Bell PA

30

Veritas Technologies LLC Mountain View CA

90

VMware Inc. Palo Alto CA

100

WeddingWire Inc. Chevy Chase MD

100

Workday Inc. Pleasanton CA

100

Xerox Corp. Norwalk CT

100

Yelp Inc. San Francisco CA

100

HRC’s Corporate Equality Index (CEI) is America’s premiere benchmarking tool for LGBTQ workplace equality. The results of this year’s CEI, showcases how hundreds of U.S.-based multinational companies are not only promoting LGBTQ-friendly workplace policies in the U.S., but helping to advance the cause of LGBTQ inclusion in the workplace abroad.

The CEI rates companies and top law firms on detailed criteria falling under five broad categories:

  1. Non-discrimination policies
  2. Employment benefits
  3. Demonstrated organizational competency and accountability around LGBTQ diversity and inclusion
  4. Public commitment to LGBTQ equality
  5. Responsible citizenship

The full report is available online at www.hrc.org/cei.

 

Guest Post: NordVPN Discusses Bulk Interception and Privacy Violations In The UK

Posted in Commentary with tags on November 9, 2017 by itnerd

This November, the UK will mark the one-year anniversary since Investigatory Powers Act was passed. During this year, the bill has received widespread criticism for its intrusive techniques of extreme surveillance. Now, UK intelligence agencies will face claims in the European court of human rights for intercepting private communications in bulk.

“We’ve expressed our concerns from the beginning that an over-intrusive surveillance will backfire,” said Marty P. Kamden, CMO of NordVPN, a technology company. “Currently, numerous civil rights groups are suing the UK government for illegally retaining and examining data that belongs to various foreign organizations. No entity should be allowed to legally intercept data that belongs to a foreign company or organization. We see this as the most intrusive violation of privacy and freedom of speech. There is also a great concern that other governments may follow UK’s lead, and people will start slowly losing any freedom of expression around the world.”

Bulk interception programmes used by the UK government – such as Tempora, Upstream and Prism – enable government agencies to access and store a backup of the Internet activity entering and leaving the UK through fiber optic cables.

“One of the biggest issues is that the UK government is storing huge amounts of private and sensitive foreign communications data,” said Marty P. Kamden. “This data can be accessed and exposed by hackers and misused for any purpose, including identity theft. Overall, we are glad to see that the British people are taking matters into their own hands – NordVPN subscriptions have tripled in the UK in one year. A VPN allows people to share information online privately and securely.”

NordVPN launched very user-friendly apps in the past year that are easy to set up and use even for beginners. Users just need to turn the ON button, and they’re connected, and all their online traffic becomes encrypted.

A VPN encrypts user’s data and reroutes it through a secure tunnel before accessing the Internet – this protects any sensitive information about one’s location by hiding their IP address.

Other ways to secure online safety include strong passwords, cautious online sharing (such as one’s current location or address) and the use of encrypted email (like ProtonMail) and encrypted communications apps (such as Telegram).

 

Power Acoustik Wi-Fi Rear View & Back-up Camera Announced

Posted in Commentary with tags on November 9, 2017 by itnerd

Power Acoustik debuted their new Wi-Fi Rear View & Back-up Camera at the 2017 SEMA Show in Las Vegas, NV.

efeafddb-49ef-441a-aa2c-bc22e4fb04e4.jpg

The Wi-Fi rear view camera features do-it-yourself installation on your license plate. This Wi-Fi Rear-View and backup camera is unique with no similar product available in the 12 Volt market.

Key features include:

  • Ability to monitor trailing/towing conditions while driving
  • Easy pairing to most Android and Apple devices
  • Advanced 720P HD image resolution via CMOS color camera
  • IP65 waterproof construction and cable connections
  • 20ft installation cable included for any vehicle application

For further details please visit: http://poweracoustik.com/product/wrvc-2/

Guest Post: Choosing The Best Backup Strategy For Your Business

Posted in Commentary with tags on November 9, 2017 by itnerd

As a business owner, backing up your data should be at the top of your priority list. Protecting your bottom line and the identities of your staff and customers is integral to succeeding in business. In this unpredictable world, all documentation needed to keep your business thriving could easily disappear in a second. Yet how do you choose the right backup strategy for your business? With so many cloud servers and backup options available to you, finding the perfect match can be extremely difficult. To help businesses discover the most effective way to back up their data, TTR Data Recovery created this guide on choosing the best backup strategy for your business. You can view the guide below.

Guest Post: 6 Tips To Protect Your Company From Ransomware

Posted in Commentary with tags on November 9, 2017 by itnerd

Ransomware can quickly cripple a business and the problem appears to be growing, as evidenced recently when the U.S. government issued a warning about Bad Rabbit, a ransomware attack that spread through Russia, the Ukraine and other countries.

Such attacks can be costly for businesses because ransomware infects a computer, blocks access to computer files, and demands that money be paid before the computer is “released.”

If there’s no data backup, the business could be in serious trouble.

“Most attacks are against financial, medical and retail business sectors,” says Penny Garbus, co-founder of Soaring Eagle Consulting Inc. (www.SoaringEagle.guru) and co-author of Mining New Gold – Managing your Business Data.

“The ransoms are usually $1,000 and most companies pay it. In some cases these days, though, money isn’t the goal. I think they are moving towards more terroristic attacks and are being paid simply to create havoc.”

Unfortunately, even paying a ransom is no guarantee a company’s data will be freed because on occasion the perpetrators demand even more money, she says.

“The worst-case scenario, though, occurs when the attacker has so completely destroyed data files and infected hard drives that they are unable to get the data back,” Garbus says. “The cost can run into thousands or even millions of dollars to get the company up and running again.”

So how does a business protect itself against ransomware? Garbus suggests a few precautions.

  • Beware of viruses masquerading as virus protection. Do your research and make sure you’re purchasing your virus protection from a reputable brand, Garbus says. Be careful of virus protection software that appears magically and tells you it detected a virus. If you don’t recognize the brand, ignore the findings. That notification may be a virus itself, Garbus says.
  • Install firewall protection. Make sure your hardware and software are protected with firewalls and software that scans the environment for worms, harmful attachments and attacks.
  • Set up procedures and protocols for data access. It’s important to make sure access to data is limited. For example, the system administrator role should be handed out to a limited number of employees who should not share log-in information with each other. Also, when an employee leaves, make sure their access is taken away and passwords changed.
  • Have backups of all important data. If you have your information backed up in an offsite location, then you won’t lose it to cyber kidnappers. “Whether it’s large companies or small businesses, too often people forget to back up their data,” Garbus says.
  • Be careful about Google search results. Sometimes a Google search itself makes you vulnerable. on’t want to download anything unless you know you are on the correct site. Garbus says the criminal hackers now have very sophisticated strategies to get you to click and download their malware and can infect your environment very quickly.
  • Figure out what kind of ransomware you’re dealing with. If your system is hijacked, know this; Not all ransomware is equal and you may not need to pay the ransom. One type of ransomware basically locks you out of your applications and processes. It may create a barrier between you and the computer’s interface so you can’t get past the ransomware attack screen. But the good news is this type of ransomware can be cleansed and your files restored without paying the ransom. A second type of ransomware is more insidious. It encrypts and renames your files so you don’t have any access to them until you give in to the ransom demands.

“Businesses should review their security processes at least once a year,” Garbus says. “You may want to hire an outside source to review security and, if you believe it necessary, even hire a professional hacker to look for holes in your system.”

About Penny Garbus
Penny Garbus, co-founder of Soaring Eagle Consulting Inc. (www.SoaringEagle.guru), is co-author of Mining New Gold – Managing Your Business Data. She has been working in the data-management field since leaving college when she worked as a data entry clerk for Pitney Bowes Credit. She later ran the training and marketing department of Northern Lights Software.