Guest Post: Tips and strategies for network failover for business from Ericsson

Posted in Commentary with tags on May 23, 2025 by itnerd

As some Canadian businesses have recently experienced, unforeseen challenges including weather-related issues, carrier/service provider issues and networking configuration errors can cause network downtime. For organizations that rely on technology — including network and application access — for their day-to-day business, outages are costly and debilitating.

According to last year’s 2024 State of Connectivity report from Ericsson Enterprise Wireless Solutions (formerly Cradlepoint), shared downtime continued to impact Canadian businesses. More than half (53 per cent) of respondents experienced one to two hours of connectivity downtime per week on average over the previous 12 months, resulting from fixed line/fibre network failure. Additionally, 28 per cent of Canadian businesses experienced three to four hours of downtime per week. Those connectivity issues resulted in higher operational costs (45 per cent), operational inefficiencies (41 per cent), and loss of talent (36 per cent), affecting productivity and the ability for organizations to be competitive.

Tips – Failover strategies for businesses

There are, however, ways for business to protect themselves. Failover strategies enable network data to be rerouted on a secondary or back up network if the primary network link fails, enablingorganizations to continue to operate as usual.

Below are three recommended failover strategies from Jason Falovo, Vice President and General Manager, Canada at Ericsson EWS, to enable businesses to stay connected.

Add link/connection diversity: In many cases, an organization’s internet connection relies upon a single wire running to their chosen internet service provider (ISP), which could not only be affected by a provider’s outage, but also by weather or other forces of nature. While adding a second Wide Area Network (WAN) connection can be a simple and fast way to reduce the risk of losing connectivity, that second wire is just as susceptible to risks as the first. Instead, consider adding a satellite or cellular wireless link which offers not only backup, but also diversity to the network. If the wired connection goes down, rapid failover can seamlessly switch to the second connection, minimizing network and service disruption. Another option is to add a wireless connection to an existing router using a 5G or LTE adapter, then relying on its SD-WAN and failover functionality.

Ensure dual-carrier connectivity: It’s no longer practical to rely on just one telecom carrier or internet provider. Relying on a single service provider is another risk point for branch continuity. Network congestion, routing and DNS issues, and core network outages are just some of the potential incidents that can disrupt business operations.

You can reduce the risk of carrier disruptions by using two links with two different wireless carriers. The separate infrastructure adds network diversity, making it highly unlikely that both would be unavailable at the same time. You can set the two connections as a primary and a backup, or use both connections in tandem to increase bandwidth. Wireless WANs also bring greater agility and make easier to open new locations or move existing ones, which can be especially useful for short-term or temporary locations. The simplest way to employ two wireless carriers is to use a 5G or LTE router that supports two modems, providing advanced network awareness and routing capabilities. With routers that have this capability, deployment is easy as adding a second modem and SIM card to the device. A dual modem router has two active radio connections, allowing SIM cards from different carriers to be active at the same time without the downtime of switching between the two.

Add hardware redundancy: Routers can go offline for many reasons, and can often require a site visit to fix, leaving the location isolated until tech support arrives. Redundant or mirrored routers are an effective protection against router downtime. These routers monitor each other, with the backup automatically taking over if the primary router or WAN connection fails, switching back when the primary is restored.

With a primary and backup router IT can safely stage updates, configuration changes, and other periodic maintenance without risking business-critical communications.

Adding different WAN connections or carriers to each router provides additional protection from common business continuity risks. If the backup router has a lower bandwidth connection, traffic policies ensure that essential traffic is prioritized.

In today’s business environment, where organizations and their employees rely heavily on applications housed in the cloud or data centre, down time is not an option. A network failover strategy is critical to ensuring the redundancy needed to keep your business running, even when networks go down.

Meta Users Warned Of Instant Account Takeover Attack 

Posted in Commentary with tags on May 23, 2025 by itnerd

The KnowBe4 Threat Labs has published a new threat alert looking at the huge surge in phishing attacks impersonating Meta since March 2025. These attacks, through exploiting Google’s AppSheet platform, consist of a highly sophisticated campaign using tactics such as polymorphic identifiers, advanced man-in-the-middle proxy mechanisms and MFA bypass techniques to harvest credentials. 

The threat alert outlines the process of these attacks and their impacts. 

For full details please see the KnowBe4 blog which has all the details.

Power Meets Efficiency: The Perfect Tech Gift for Dads this Father’s Day From Samsung

Posted in Commentary with tags on May 22, 2025 by itnerd

We all know the struggle of finding the perfect gift for the dad who seemingly doesn’t want anything. This Father’s Day, we’re reaching out with a gift idea that will give dads what they really need: time.  

Whether it’s more time with the kids, more time relaxing, or more time for his favourite hobby, Samsung is offering the perfect tool to help dads get things done seamlessly and quickly. The Galaxy Book5 Pro is expertly designed to help you get more accomplished in less time, ensuring dads are equipped for efficiency.   

Stay connected – Any given day as a dad is a busy one. The Galaxy Book5 ensures uninterrupted connection with Wi-Fi 7 connectivity and long-lasting battery so dads can be assured they have tech they can rely on.    

Maximize your day – The Galaxy Book5 Pro is powered by the Intel Core Ultra 7 processor, delivering high-speed performance for any task. Samsung’s smart AI tools like AI Select and the dedicated AI Key help streamline everything from spreadsheets to passion projects, giving dads more time to spend offline and in the moment.  

Focus on what matters – We know dads have a lot to keep up with, so no more wasting time trying to remember where you saved last year’s files. With Recall, users can quickly and easily explore PC history to find exactly what they need.  

Give dad the gift of time with a laptop that accelerates everything he needs to do. The Galaxy Book5 Pro is available for purchase at Samsung.com/ca starting at $2,399.99.   

Claims Have Surfaced That Coca-Cola Has Been Pwned

Posted in Commentary with tags on May 22, 2025 by itnerd

It is being reported from posts on dark web forms that the Everest ransomware group claims to have compromised internal and confidential information belonging to Coca-Cola, while the Gehenna hacking group claims to have breached Coca-Cola Europacific Partners’ Salesforce database earlier this month.

According to their claims, the compromised data appears to be primarily related to the Middle East operations.

This group has previously been linked to high-profile attacks on organizations including NASA and the Brazilian government.

In a separate but potentially more damaging incident, the Gehenna hacking group claims to have successfully breached Coca-Cola Europacific Partners’ Salesforce dashboard in early May 2025.

Javvad Malik, lead security awareness advocate at cybersecurity company KnowBe4, commented:

“The recent breaches at Coca-Cola and its Europacific Partners, claimed by the Everest and Gehenna hacking groups, highlight the vulnerability of internal systems and third-party platforms like Salesforce, emphasizing the need for comprehensive cybersecurity strategies. It underscores the importance of not only robust technical defenses but also human-centric approaches to cybersecurity.

In response, organizations must prioritize data protection through layered and advanced security measures which can reduce the target area, educate and inform people of the dangers, create a culture which empowers people to make the right security decision, and protects the organization should an error occur.” 

Another day, another incident that highlights the need for organizations of all sizes to prioritize defences that keep the bad guys out regardless of the attack vector. Because incidents like these are becoming way too frequent.

Saviynt to Launch SaviTalk Podcast

Posted in Commentary with tags on May 22, 2025 by itnerd

Saviynt today announced the launch of SaviTalk, its official audio and visual podcast, with the first episode going live on Thursday, June 5. Taping of the episodes began in April at the RSA Conference in San Francisco. SaviTalk will provide an engaging platform for thought-provoking discussion on the evolving landscape of cybersecurity, identity security, and digital transformation.

Designed to be the go-to resource for security professionals, industry leaders, and enterprises navigating the complexities of modern identity security, SaviTalk will feature insightful conversations with Saviynt’s top executives, customers, and industry influencers. The podcast aims to unpack the most pressing challenges and opportunities in identity governance, privileged access management, and compliance, while also exploring the latest innovations shaping the future of cybersecurity.

The name SaviTalk was inspired by the concepts of TED Talks – concise, insightful discussions that drive thought leadership and innovation. By incorporating Savi, the podcast stays true to Saviynt’s identity while reinforcing its role as a leading voice in identity security.

Meet the Hosts

SaviTalk is hosted by some of the most influential experts in identity security, each bringing a unique perspective and wealth of experience to the conversation:

  • Henrique Teixeira, SVP of Strategy – A seasoned identity security strategist with a deep background in product and business transformation, Teixeira previously held an analyst role at Gartner, where he influenced major market shifts in identity and access management.
  • Simon Gooch, Field CIO – With decades of experience advising enterprise CIOs and CISOs, Gooch bridges the gap between technology and business needs. He has led digital transformation initiatives across Europe and North America, offering a customer-first perspective that resonates with global audiences.
  • David Lee, Field CTO – Known for his engaging communication style and sharp insights, Lee is a go-to voice in the cybersecurity community. With experience at companies like Cloudentity, AWS, and Lockheed Martin, he brings clarity to complex topics and a vision for simplifying identity security at scale.
  • Jim Routh, Chief Trust Officer – A legendary cybersecurity executive, Routh has served as CISO for organizations like Mass Mutual, Aetna, and JP Morgan Chase. He is widely respected for his forward-thinking approach to cyber risk, innovation, and building resilient security cultures.

With these industry experts at the helm, SaviTalk will deliver high-impact conversations designed to educate, challenge, and inspire listeners across the security ecosystem.

SaviTalk will debut Thursday, June 5, with an exclusive first episode featuring CEO Sachin Nayyar, where he shares his journey in identity security and the vision for Saviynt’s future. Listeners can tune in on Spotify, Apple Podcasts, and other major streaming platforms.

Additionally, Saviynt is inviting security professionals, customers, and partners to participate in upcoming episodes. Whether it’s a customer success story, a major industry trend, or an innovative security approach, SaviTalk aims to spotlight the voices shaping the future of identity security. Interested guests can submit nominations for topics and speakers through Saviynt’s website.

For more information and to listen to the latest episodes of SaviTalk, visit the website.

Father’s Day Tech Deals from Epson that Dad Will Love 

Posted in Commentary with tags on May 22, 2025 by itnerd

If you are in the market for high-quality, long-lasting tech for Dad this Father’s Day, Epson has them covered with major sales on select printers and projectors. As a trusted name in consumer technology, Epson is a go-to brand known for performance and durability — qualities any father figure can appreciate.

Epson EpiqVision Mini EF21 Portable Smart Laser Projector (MSRP: $1,149.99 CAD)

Spending quality family time together has become a rare occasion in 2025. If you want to invest in a piece that Dad can enjoy with the whole family for years to come, The Epson EpiqVision EF21 is crafted to encourage family bonding. With built-in Google TV1 and stunning picture quality, everyone can binge watch their favourite TV shows, enjoy big sporting events or even play video games together. The projector is currently on sale for $849.99, making it more attainable if everyone contributes to the gift (everyone will be enjoying it).

Where to Buy:

·       Best Buy

·       Epson

·       Amazon

ET-4850 Wireless Colour All-in-One Cartridge-Free Supertank Printer (MSRP: $599.99 CAD)

The Epson ET-4850 is a cartridge-free printer ideal for the work-from-home dad who needs an office-grade printer to support his job or business. This model is packed with time-efficient features for the dad with no time to waste, like its high-speed printing, auto-document feeder and 2.4″ colour touchscreen for faster navigation. If Dad is a businessman, he understands a good deal and will appreciate that he’ll save up to 90% with replacement ink bottles compared to traditional ink cartridges2. The ET-4850 is also currently on sale for $100 off at participating stores. Keep an eye on the links below as offers update.

Where to Buy:

·       Epson

·       Amazon

·       Staples

ET-2850 Wireless Colour All-in-One Cartridge-Free Supertank Printer (MSRP: $399.99 CAD)

The Epson ET-2850 is another cartridge-free printer designed with the simple dad in mind. If he’s been looking for a reliable, low-hassle printer, this one’s for him. The entire household will benefit from worry-free colour printing, no matter the printing job. This printer comes with up to two years of ink in the box3, designed for long-term savings that won’t put a hole in Dad’s wallet. Plus, it can also print up to 5000 pages4, making it a smart investment. Select printers are currently on sale for $100 off at participating stores. Keep an eye on the links below as offers update.

Where to Buy:

·       Epson

·       Amazon

Guest Post: Meta AI just beat Gemini as the most data-hungry chatbot 

Posted in Commentary with tags on May 22, 2025 by itnerd

It’s time for Google Gemini to step aside. Meta recently introduced its chatbot app, Meta AI, which is the new data king. According to a study by cybersecurity company Surfshark, Meta AI collects user data like no one before. It stands out among all analyzed chatbots by collecting 32 out of 35 data types, which is more than twice the average. 

Meta AI collects the most user data among the analyzed apps, gathering 32 out of 35 possible data types — over 90% of the total. It is also stands out from all the others because it is the only one chatbot app that collects data across categories such as financial information, health and fitness, and even sensitive information, which includes racial or ethnic data, sexual orientation, pregnancy or childbirth information, disability, religious or philosophical beliefs, trade union membership, political opinion, genetic information, or biometric data.

Additionally, only Meta AI and Copilot collect data linked to user identity for purposes such as displaying third-party ads in the app or sharing data with third parties that display third-party ads. While Copilot lists two data types, such as Device ID and Advertising Data, used for this purpose, Meta AI may use up to 24 different data types. 

“Meta is an ecosystem that collects user data across platforms like Facebook, Instagram, and Audience Network for displaying third-party ads, and now it’s doing the same through Meta AI. This chatbot learns from public posts, photos, and texts, as well as new data shared by users, which is an example of gross misconduct and mishandling of user data. Generative AI should not be trained on user data, and this highlights why regulations for AI are an urgent necessity,” says Karolis Kaciulis, Leading System Engineer at Surfshark.

Chatbots collect and learn from diverse data, which can have flaws

The average number of collected types of data is 13 out of a possible 35 for the analyzed AI chatbot apps. 45% of the apps collect users’ locations. Additionally, nearly 30% of these apps track user data. Tracking refers to linking user or device data collected from the app with third-party data for targeted advertising or advertising measurement purposes or sharing it with a data broker. 

AI chatbots learn from diverse sources of information, with Meta AI having the additional factor of learning from Facebook and Instagram posts and images. As they gather massive amounts of data, including public posts and user-provided content, the results we receive can vary and often be incorrect due to inaccuracies in their training data. The latest example of how X’s Grok responded to unrelated prompts and discussed white nationalist themes with X users highlights the challenge we have with current generative AI standards.

“People should keep in mind that even though these chatbots may provide you with a quick answer, the results they get are mediocre. Why is that? AI chatbots are being fed with all kinds of information and the majority of it can be inaccurate. Every person is responsible for the results they provide at their job, but generative AI is not; it is unaccountable and is not legally subject to the same scrutiny as a human,” K. Kaciulis comments.

Be careful when sharing information with chatbots

Google Gemini collects 22 unique data types. This includes precise location data, which only Gemini, Meta AI, Copilot, and Perplexity collect. Gemini also collects a significant amount of data across various other categories, such as contact info (name, email address, phone number, etc.), user content, contacts (such as a list of contacts in the user’s phone), search history, browsing history, and several other types of data.

ChatGPT collects 10 types of data, such as contact information, user content, identifiers, usage data, and diagnostics, while avoiding tracking data or using third-party advertising within the app. While ChatGPT collects chat history, it is possible to use temporary chats, which auto-delete all data after 30 days, or to request the removal of personal data from training sets.

Copilot, Poe, and Jasper are the three apps that collect data used to track you. This data could be sold to data brokers or used to display targeted advertisements in your app. While Copilot and Poe only collect device IDs, Jasper collects device IDs, product interaction data, advertising data, and other usage data, which refers to “any other data about user activity in the app”. 

According to K. Kaciulis, when using chatbots, users pay not only in money for subscriptions but also in personal data. “As a human being, especially in Europe, where GDPR protects user rights, personal data belongs to you, not to corporations or AI systems. Sharing it with generative AI can lead to it being stored, analyzed, and used without your full control, risking targeted manipulation, identity theft, or misuse. Also, people should be aware that things AI learns from your personal data can not be unlearned. It’s important to protect your privacy and online integrity in an age where personal data is increasingly treated as a commodity.” 

METHODOLOGY

We identified the 10 most popular AI chatbots, with Meta AI added as an additional app on May 20, 2025, and analyzed their privacy details on the Apple App Store. The comparison was based on how many types of data each app collects, whether it collects any data linked to you, and whether the app includes third-party advertisers. We also checked the privacy policies of DeepSeek and ChatGPT to better understand what kind of data is kept on servers and for how long.

Note on data used to track the user: “Tracking refers to the act of linking user or device data collected from your app with user or device data collected from other companies’ apps, websites, or offline properties for targeted advertising or advertising measurement purposes. Tracking also refers to sharing user or device data with data brokers.” 

Google-backed Glance launches AI commerce platform for fashion and more

Posted in Commentary with tags on May 22, 2025 by itnerd

In a pivotal moment for global commerce and AI innovation, Glance, a leading consumer technology company backed by Google, has unveiled Glance AI, an AI-native commerce platform powered by its most advanced proprietary AI models. Built to revolutionize how people shop and to reshape how intelligence drives decisions and economies, Glance AI moves online shopping beyond search to an inspiration-led discovery experience. It also marks the emergence of the ‘AI consumer’, one who doesn’t wait to browse, but expects the technology to understand them, imagine for them, and spark desire even before they know what they want.   

The standalone app launches today available worldwide on both Google Play Store and Apple App Store, with deeper integrations rolling out to Android handset makers and telecom operators. While the initial model is trained on fashion, Glance plans to extend the same experience to categories such as beauty, accessories, and travel later this year, setting a new benchmark in AI commerce.  

Unlike conventional e-commerce stores that simply display multiple products to browse or search for, Glance AI lets users discover their AI-curated stylized looks. By simply taking a selfie or uploading an image, Glance AI immerses them in a visual world where they take centre stage. Each experience is generated in real-time with an AI-native commerce engine using advanced diffusion models, personalization engines, and a live commerce layer that maps each user’s unique AI look to real, shoppable products from curated brands across the globe. With one tap, users can now explore looks and products tailored to their preferences and complete purchases seamlessly from 400+ global brands. All of this while the user retains control over their data.  

At its core, Glance AI is built on a three-layered deep tech architecture:   

  • Commerce Intelligence Model: trained on decades of global commerce data, learning from new trends, cultures, and consumer behavior.  
  • GenAI Experience Model: generating hyper-realistic visualization based on thousands of parameters such as gender, body type, ethnicity, skin tone, fit, style and season to simulate how a particular clothing will look on an individual.  
  • Transaction Journey Model: an agent that understands shopping intent before consumers do, pairing visualizations with best matched product from millions of catalogues globally.  

Glance AI has integrated its proprietary models with cutting-edge platforms including Google Gemini and Imagen on Vertex AI delivering hyper-realistic, personalized experiences to users. Glance AI is a fully opt-in platform, with privacy and user control built into its core design. Users can explore looks, save or share them, set them as wallpapers, and visualize themselves in unique looks and collections driven by global trends and occasions.   

Glance AI is beyond the app experience. It is built on an open architecture with deep integrations across hardware and software with manufacturers, telecom operators, and brands. It turns phones into AI phones, TVs into household commerce devices and brand stores into AI shopfronts.  

Early results from Glance AI’s U.S. trials signal strong consumer engagement for inspiration-led shopping. In just a few weeks, the platform has attracted more than 1.5 million active users, half of whom return weekly after trying the experience. Engagement runs deep: Users have generated over 40 million style requests, 50 percent download or share their personalized styles, 40 percent tap through to begin a shopping journey, setting a new benchmark for stickiness and social virality in AI commerce apps.  

  

Big Tech on Trial: A Systematic Review of Class Action Lawsuits

Posted in Commentary with tags on May 22, 2025 by itnerd

The research team at  vpnMentor analyzed a random sample of 79 major class action lawsuits from the past five years to highlight emerging trends, in order to study whether billion-dollar lawsuits are truly holding tech firms accountable, or if they’re simply reshaping their business strategies.

Key findings at a glance:

  • Privacy-related lawsuits account for 73.4% of tech cases. Furthermore, Most tech lawsuits are filed in the US (88.4%), with California leading among the states at (68.4%).
  • While the US remains the epicenter of privacy lawsuits (88%), countries like Australia, France, Ireland, and the Netherlands (4% each) are also tightening privacy regulations to protect consumers from tech-related risks.
  • Big tech companies have faced 43 lawsuits since 2018, with Alphabet leading at 10 cases. Privacy violations are the most common (55.8%), followed by tech product recalls (25.6%) and AI-driven privacy concerns (18.6%).
  • Notable companies like Apple, Alphabet (Google), Meta, and Samsung have faced significant regulatory fines and class action lawsuits over privacy and data security issues, with damages reaching hundreds of millions of dollars (USD).

While legal battles have led to multi-billion-dollar settlements, many cases are still pending, highlighting the challenges in resolving disputes and stopping harmful practices in tech industries. As regulatory scrutiny intensifies worldwide, the long-term impact of these legal actions on industry practices remains to be seen.

You can access the report here: https://www.vpnmentor.com/blog/tech-class-actions-research/

184M+ Credential Exposed on Suspected InfoStealer Malware Breach 

Posted in Commentary with tags on May 22, 2025 by itnerd

Recently, cybersecurity researcher Jeremiah Fowler discovered and reported to Website Planet about a non-password-protected database containing over 184 million credential records from a suspected InfoStealer malware breach affecting a wide range of services, applications, and accounts, including email providers, Microsoft products, Facebook, Instagram, Snapchat, Roblox, and many more.

What happened:

A publicly exposed database was found containing 184,162,718 records with a total size of 47.42 GB. The exposed data includes emails, login account names, passwords, authorization URLs, and more.

Why it matters:

This kind of breach could lead to targeted phishing attacks, identity theft or financial fraud, social engineering and more.

Read the full report here: https://www.websiteplanet.com/news/infostealer-breach-report/