Nine out of Ten Americans Concerned About Cybercriminals Leveraging AI

Posted in Commentary with tags on April 9, 2025 by itnerd

Iris® Powered by Generali (“Iris”) today released the findings of its inaugural Identity & Cybersecurity Concerns Survey, which polls consumers on their digital security practices, as well as fraud resolution experiences if previously victimized. The survey also asked respondents to identify their top concerns surrounding ID theft and areas where they feel most vulnerable, building off the findings of Iris’ annual Holiday Shopping ID Theft survey which the company has conducted over the past 8 years.

When questioned about their online security habits, only 3 in 10 respondents said they employed all recommended cybersecurity recommendations. And this is in spite of deep concerns related to a breach of their personal devices, compromised passwords, and having their home title or deed stolen. Respondents overwhelmingly identified AI when considering threats to their personal information, with 91% listing it as a concern. Women were disproportionately more likely to see AI as a threat, with 41% of females responding that they are extremely concerned compared with 32% of male participants. 

The survey also asked respondents to identify life events that they believed made them most vulnerable to identity theft, with 33% of participants listing “moving to a new location” as posing the greatest risk. This was followed by “starting a new business” (31%) and “buying or selling a home” (30%). Notably, Baby Boomer and Gen X participants were far more likely to identify buying a home as a threat (35% and 36% respectively) than Millennials or Gen Z respondents (25% and 26% respectively), which aligns with recent studies conducted by financial institutions like CitiBankthat show most younger Americans do not anticipate they will own a home in their lifetime.

Additionally, when asked who they would reach out to if notified of a data breach, most respondents (46%) indicated they would reach out to their bank or credit card company for support – ahead of just 19% who said they would reach out to their cybersecurity or identity protection provider. 

For those who had been a victim of fraud or identity theft in the past 2 years, the survey found that 93% of fraud victims say the resolution process caused them stress, with more than 1 in 2 (52%) saying it was more stress than they ever experienced or significant stress. Only 5% of respondents indicated that an identity protection provider helped them achieve a resolution. At the same time, a majority ofconsumers (66%) said they would be interested in purchasing cybersecurity protection offerings from a bank or credit card company if offered.

Survey Methodology:

This survey was conducted via an Online CARAVAN®survey conducted by Big Village among a sample of 1,010 adults ages 18 and older, live from March 12 through March 14, 2025. Respondents were voluntary members of an online panel weighted by five variables – age, gender, geographic region, race, and education – using data from the U.S. Census Bureau to verify the accuracy of the results. The generations were defined by the following ages: Gen Z (18-27), Millennials (28-43), Gen X (44-59), and Baby Boomers (60-78).

The full results of the survey, which includes additional data about cybersecurity practices, threats top of mind to consumers, and fraud resolution experiences, can be found at https://www.irisidentityprotection.com/icc-2025   

Guest Post: Why Data Sovereignty Matters More Than You Think – For Every Business

Posted in Commentary with tags on April 9, 2025 by itnerd

By Roger Brulotte, CEO, Leaseweb Canada

Data can zip across borders and into the cloud in the blink of an eye. But as convenient as that is, it’s also raising some important questions – especially around something called data sovereignty. Sounds like something only governments or giant corporations need to worry about, right? Not quite. This issue actually touches every business, no matter the size. And if you’re operating in Canada or working with Canadian customers, it’s something you really can’t afford to ignore.

So, what’s data sovereignty all about? In plain terms, it means your data is bound by the laws of the country where it actually lives. If that’s Canada, then your data needs to follow Canadian rules, specifically, a law called PIPEDA (yep, it’s a mouthful: the Personal Information Protection and Electronic Documents Act). This law lays out how businesses are supposed to collect, use, and protect personal information. For any company operating in Canada, or even just working with Canadian customers, keeping data on Canadian soil helps make sure it’s covered by Canadian protections, not someone else’s rules. It’s really about keeping control and keeping things simple.

Busting the Big Business Myth

A lot of people think data sovereignty is only something big corporations need to worry about. And yes, those companies usually have full teams dedicated to legal and data compliance. But small and mid-sized businesses (SMBs) face their own set of challenges. In fact, data sovereignty can be even more important for them. Why? Because SMBs often depend on outside cloud providers and might not have the in-house expertise to untangle all the rules around storing data across borders. That makes it even more important to know where your data is – and who has access to it.

If you’re an SMB, ask yourself: Do you know where your customer data is being stored? Who might have jurisdiction over it? If the answer is “not really,” it might be time to dig deeper.

What to Look for in a Cloud Provider

When you’re picking a cloud or infrastructure provider, it’s super easy to get swept up in the big, shiny certifications… things like ISO/IEC 27001 or SOC 2. And don’t get us wrong, those are good signs. They show that a provider is thinking about privacy and security. But if you really want to know your data is safe, those logos shouldn’t be the end of the conversation.

What really matters is this: Can your provider give you a straight answer about where your data lives?

Not a vague “we follow best practices” kind of answer, but something specific. Can they tell you if your data is sitting in a server just outside Toronto, or floating around in a data center overseas? Can they walk you through who has access to it, and how they’re keeping it locked down, without slipping into a bunch of tech-speak that leaves you more confused than reassured?

If the answers feel fuzzy or dodgy, trust your gut. It’s okay to press for clarity.

Also, take a minute to consider the bigger picture. Does this provider actually have data centers in Canada? Who owns the company behind the scenes? And what happens if there’s a political shakeup in the country where your data is stored? These might sound like “worst-case-scenario” questions, but they’re worth asking because they help you stay in control no matter what.

You don’t need to be an IT expert or a legal pro to have this conversation. You just need to care about protecting your business and the people who trust you with their information. Asking where your data lives and how it’s being handled isn’t overthinking. It’s smart, responsible, and exactly what today’s leaders should be doing.

Why Cloud Repatriation is on the Rise

Lately, a lot of companies have been hitting pause and rethinking their cloud game. More and more, we’re seeing a shift toward what’s called cloud repatriation, which is just a fancy way of saying they’re pulling some of their data and apps out of the big public cloud and bringing them back home. Sometimes that means going fully in-house, sometimes it’s a mix, a hybrid setup. Why the change? It usually comes down to wanting more control, clearer visibility, and honestly, fewer surprise bills.

Public cloud solutions are great for scalability, but they can also lead to surprises: unexpected fees, limited control, and compliance headaches. Hybrid models, on the other hand, offer a balance – keeping sensitive data local while taking advantage of cloud flexibility where it makes sense.

According to a recent IDC report, nearly 80% of businesses are planning to bring at least some of their data back from the public cloud in the next year. That’s not just a trend… it’s a sign that companies are getting more intentional about where their data lives. It’s a smart, strategic shift toward setups that give them more control, better compliance, and fewer surprises.

Industries That Care (and Why You Should Too)

It’s true that certain industries – like finance, healthcare, and government – have more stringent compliance requirements. But frankly, any organization that collects personal data should care about where that data lives. Data sovereignty helps protect that information from being accessed or compromised due to international politics, provider shutdowns, or legal loopholes.

In sectors like healthcare, the bar is even higher. In Canada, for example, patient records must remain within the country, regardless of whether the institution is public or private. It’s about trust, compliance, and ethics – all rolled into one.

Parting Thoughts…

At the end of the day, data sovereignty isn’t just something for the IT folks to deal with… it’s far bigger than that. Business leaders need to be in the loop too. After all, knowing where your data lives, who can get to it, and how it’s being protected isn’t just some technical detail. It’s about trust, staying compliant, and making sure your business can keep running smoothly – no matter what.

With regulations tightening and digital risks popping up left and right, the companies that come out ahead are the ones asking the smart questions before diving into the cloud. It’s not about being scared… it’s about being smart, prepared, and in the driver’s seat.

HellCat Ransomware Hits 4 Firms Via Jira Credentials from Infostealer Logs

Posted in Commentary with tags on April 8, 2025 by itnerd

The HellCat ransomware group has once again demonstrated its relentless focus on exploiting Jira credentials stolen through infostealer malware by targeting four new organizations.

You can get the details here: https://www.infostealers.com/article/hellcat-ransomware-group-strikes-again-four-new-victims-breached-via-jira-credentials-from-infostealer-logs/

Jim Routh, Chief Trust Officer at Saviynt had the following comment:

“This series of ransomware attacks originated from an increasingly common root cause, passwords to cloud accounts essential for software engineering (like Jira), are compromised and then sold to other criminals.

Enterprises have an opportunity (and perhaps an obligation) to treat enterprise users of cloud accounts critical to software engineering in the same way as privileged users. Continuous identity validation and risk scoring are essential for enterprise identity posture management.” 

I’ll add to that some form of passwordless solution might be helpful here. Because an infostealer can’t steal a password that doesn’t exist.

AI Image Detection: Evaluating the Accuracy of the Most Popular Tools

Posted in Commentary with tags on April 8, 2025 by itnerd

The research team at WebsitePlanet evaluated popular AI tools (ChatGPT, Google Gemini, Microsoft Copilot, and more) in their ability to detect AI-generated images and differentiating these from real digital photographs. They also included some specialized tools designed specifically to detect AI images and were surprised with the results.

Some key findings at a glance:

  • AI algorithms have allowed more sophisticated tools to recognize AI-generated images with a fair amount of accuracy, but we’re yet to find a tool that can accurately differentiate AI-generated images from real digital photographs with 100% accuracy over large datasets.
  • Google Gemini struggled with detecting AI-generated images in categories that typically include depictions of real people, the results of this test likely reveal Gemini’s continuing limitations in properly processing and evaluating images of people.
  • ChatGPT struggled to identify Society and Lifestyle images as having been AI-generated, but the platform’s overall identification score improved from 90% to 93% with the inclusion of metadata.
  • Microsoft Copilot showed similar patterns as ChatGPT, performing well for most categories. Nevertheless, even with the inclusion of metadata, Copilot was still unable to correctly identify Society and Lifestyle photos as having been AI-generated.

Considering their findings, they believe that AI detection programs need to keep pace with the growth and progression of generative AI to more accurately help organizations and individuals distinguish between authentic and AI-generated content, thus helping reduce the risks of misinformation.

You can access the report here: https://www.websiteplanet.com/blog/ai-image-detection-research/

Guest Post: Why Your Privacy Fears Keep Feeding the Data Machine

Posted in Commentary with tags on April 8, 2025 by itnerd

Supplied by International Drivers Association

Understanding Privacy Fears

In an era marked by the relentless surge of digital technologies, privacy fears have become a pervasive concern for individuals navigating the digital landscape. These fears are not unfounded; they are grounded in the reality that personal data is commodified and utilized by various online platforms without explicit user consent. The rising tide of privacy concerns stems from a perceived lack of control over personal information. A significant majority of Americans feel they have little to no control over the data collected about them by governments and corporations alike. This uncertainty is compounded by the complexity and opacity of data practices, leaving many in the dark about how their personal information is collected, used, and shared. The link between privacy fears and trust is particularly noteworthy. Traditionally, privacy concerns are thought to negatively impact trust; however, research has revealed that this relationship is not always straightforward. While privacy fears can indeed erode trust, some studies suggest that the dynamics between the two can vary based on context, such as the technology being used or the novelty of the data-handling processes involved. As such, understanding the intricacies of these relationships is crucial for addressing privacy concerns effectively. Additionally, the rapid advancement of technology and the resulting “data deluge” have exacerbated privacy fears, presenting risks that threaten to stifle innovation and trigger regulatory backlashes. The inability of consumers to grasp the full extent of data collection practices fuels these fears. For example, many users are unaware of the potential for re-identification of anonymized data, a factor that has profound implications for privacy and trust in digital systems. Misconceptions further cloud the landscape of privacy fears. Contrary to some beliefs, consumers do care deeply about having control over their private data, as opposed to only fearing data breaches by hackers. This desire for control is often overshadowed by the complexities of modern data ecosystems and the challenge of navigating privacy settings and policies. Understanding privacy fears requires acknowledging the legitimate concerns individuals have about data security, transparency, and control. As the digital age continues to evolve, addressing these fears with effective privacy measures and clearer communication of data practices becomes paramount. Only then can trust be rebuilt, and privacy fears mitigated in a world increasingly driven by data.

The Data Machine in Motion

In the ever-evolving digital age, the “data machine” operates with relentless precision, continuously driven by the wealth of information generated every second. As individuals navigate the online world, their actions create data footprints that feed into a larger network of data collection and analysis. This vast ecosystem is sustained by a complex interplay of data mining, consumer profiling, and digital marketing strategies aimed at enhancing user experiences and business outcomes. At the core of this machine is the concept of data collection, a methodological process critical to a business’s success. Organizations harness both primary and secondary data collection methods to gather insights, leveraging advanced technologies like artificial intelligence (AI) to optimize these processes. This approach not only boosts efficiency but also facilitates real-time decision-making and strategic planning. For instance, AI aids in categorizing survey responses and generating synthetic datasets, driving the speed and quality of data insights. However, the data machine is not without its challenges. Privacy concerns arise as data mining techniques become more prevalent, creating a need for transparent data practices and user empowerment. Tech companies are increasingly prioritizing user control over personal data, ensuring transparency in data handling, and implementing privacy-by-design principles to build trust with users. This is crucial, given the persistent myths and misconceptions that cloud public understanding of data privacy and security. Despite the regulatory frameworks in place, such as the Privacy Act of 1974 and HIPAA, which govern how data can be collected and used, the commodification of personal information persists. This underscores the importance of user consent and data minimization to mitigate privacy risks. Policymakers and businesses must balance innovation with privacy protection to prevent a regulatory backlash that could stifle the data economy. Ultimately, the data machine continues to evolve, fueled by advancements in technology and the insatiable demand for consumer insights. As organizations strive to navigate this complex landscape, they must remain vigilant in protecting user data while simultaneously harnessing the power of information to drive growth and innovation.

The Privacy-Data Cycle

In the digital age, the interplay between privacy concerns and data utilization has created a complex ecosystem where user data powers a multitude of online services, often at the cost of personal privacy. This cyclical relationship, dubbed the Privacy-Data Cycle, highlights the ongoing struggle to balance convenience and control in an increasingly data-driven world.

Data as Currency

Today, many online platforms operate on a model where services are offered “for free,” but with a caveat—users must agree to share their personal data, which in turn fuels targeted advertising that funds these services. This transaction creates a situation where privacy concerns are intrinsically tied to the services that users depend on daily. Despite growing apprehension about data security, this model persists due to the perceived value of the services provided.

Empowering Users with Control

One of the critical components in breaking or at least mitigating the adverse effects of the Privacy-Data Cycle is user empowerment. Enabling individuals to have control over their data is essential for safeguarding online privacy. Through informed consent, users are made aware of how their data will be collected and used, allowing them to make conscious decisions about their online interactions. This control not only enhances privacy but also builds trust between users and service providers.

The Role of Data Privacy Laws

The global nature of the internet poses a challenge to data privacy laws, which vary significantly from country to country. In the United States, for instance, a complex web of federal and state regulations governs the handling of personal data, aiming to protect individuals’ privacy while allowing for data-driven innovation. These laws strive to set boundaries on how data can be collected, processed, and shared, serving as a regulatory framework that can disrupt the Privacy-Data Cycle by ensuring data is handled responsibly.

Myths and Misconceptions

Amidst these dynamics, myths about data privacy continue to circulate, often clouding public understanding. One such misconception is that people prioritize protection against hackers over control of their personal data. In reality, both elements are crucial, and misconceptions can hinder meaningful discussions on how to address privacy concerns effectively.

Towards a Sustainable Model

As privacy concerns persist, the challenge remains to develop a sustainable model that respects individual privacy while supporting the data economy. Efforts to redefine consent mechanisms, enhance data security practices, and strengthen legal frameworks are vital steps in creating a digital ecosystem where privacy fears do not feed the data machine but rather inspire innovations that uphold user autonomy. This transformation is essential for building a future where privacy and data utilization coexist harmoniously.

Implications of the Data Machine

In the modern digital ecosystem, the “data machine” is an omnipresent force, shaping industries and influencing personal lives in ways that are both transformative and, at times, unsettling. As consumers generate unprecedented volumes of data, businesses harness this information to enhance consumer engagement and craft personalized experiences. The insights gleaned from big data analysis enable companies to optimize the customer journey, tailoring offerings to meet individual preferences and behaviors. However, this expansive use of data is not without significant implications.

Balancing Innovation with Privacy

The tension between leveraging data for innovation and protecting individual privacy is a central theme in the data-driven economy. Organizations are tasked with navigating complex regulatory landscapes designed to safeguard consumer data. Legislation like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) exemplifies efforts to address privacy concerns while maintaining the flow of data essential for business innovation. Companies that manage to achieve this balance can turn their privacy practices into a competitive advantage, differentiating themselves in a marketplace increasingly concerned with data ethics.

The Role of Consent and Ethical Considerations

As data privacy becomes a focal point, traditional models of consent are being scrutinized. Critics argue that simply opting into terms and conditions does not provide genuine protection in a complex data ecosystem. Ethical considerations come into play as businesses must ensure that data usage aligns with consumer expectations and regulatory standards. This involves not only complying with privacy laws but also fostering a culture of transparency and trust with consumers.

Challenges of Anonymization and Data Re-identification

The assumption that anonymized data can protect privacy is being challenged by advances in re-identification science. Studies have shown that even data stripped of personal identifiers can often be linked back to individuals, undermining privacy assurances and complicating compliance efforts. This revelation underscores the need for robust data governance frameworks capable of real-time monitoring and policy enforcement, ensuring that data remains secure and that privacy rights are respected.

Impacts on Individual Rights and Autonomy

The expansive collection and use of personal data affect more than just privacy—they influence fundamental individual rights. Without meaningful protections, there exists a significant power imbalance between individuals and the institutions that collect their data. This imbalance raises concerns about autonomy, as individuals may have limited control over how their personal information is used and shared in the digital realm. The implications of the data machine are multifaceted, requiring a nuanced approach to data management that considers ethical, legal, and societal dimensions. As businesses continue to harness the power of data, the challenge will be to do so in a manner that respects individual privacy and fosters consumer trust.

Breaking the Cycle

In the digital age, the cycle of privacy fears feeding the data machine seems relentless, but it doesn’t have to remain unbroken. Both individuals and enterprises can take strategic steps to regain control over personal data and mitigate the pervasive risks associated with data privacy concerns. First and foremost, transparency is a cornerstone in rebuilding trust and breaking the cycle of data misuse. By clearly communicating how data is collected, used, and shared, organizations can enhance accountability and empower individuals to make informed choices regarding their personal information. This transparency not only promotes credibility but also fosters an environment where privacy concerns are acknowledged and addressed proactively. For enterprises, implementing robust data governance frameworks is crucial. This involves documenting data usage meticulously to ensure accountability and transparency, while model cards and data cards track data provenance and context. Such measures are vital in aligning data practices with human-centered outcomes rather than mere compliance. Furthermore, education plays a pivotal role in disrupting this cycle. By educating employees and the public about data privacy best practices, companies can help safeguard personal information from unauthorized access and breaches. An informed public is better equipped to navigate the complexities of privacy in the digital era, thereby reducing the likelihood of privacy fears escalating into breaches. Additionally, adapting to evolving privacy regulations is essential. A comprehensive understanding of the patchwork of federal, state, and local privacy laws enables organizations to stay compliant and avoid penalties. This includes adhering to sector-specific privacy laws and acknowledging the implications of global legislative developments, such as the General Data Protection Regulation (GDPR), which is widely regarded as a gold standard in data privacy regulation. Ultimately, breaking the cycle requires a collaborative effort from both consumers and businesses. As privacy continues to be a contentious issue worldwide, it is incumbent upon all stakeholders to challenge the status quo, innovate on data protection strategies, and prioritize the security and privacy of individual data. By taking these steps, we can begin to dismantle the data machine’s insidious hold on our privacy.

Neptune RAT Can Destroy Windows PCs, Steal Passwords And Crypto 

Posted in Commentary with tags on April 8, 2025 by itnerd

A dangerous new strain of malware is being used by cybercriminals for infecting susceptible Windows computers in order to steal passwords and cryptocurrency and extort ransom from affected users. The Neptune RAT is being disseminated on social media sites like YouTube, Telegram, and GitHub.

Javvad Malik, Lead Security Awareness Advocate at KnowBe4had this to say: 

“The key takeaway here is that cybersecurity isn’t just an IT problem anymore – it’s everyone’s responsibility. We’re dealing with threats that are widespread, using everything from PowerShell commands to file-sharing services to break into systems. So, what can we do about it?”

“First off, education is crucial. We need to ensure everyone in the organization understands the risks of clicking suspicious links or downloading unknown files, even if they look harmless. It’s about creating a culture of security awareness where people think twice before acting.”

“Secondly, we need to rethink our approach to system access. The principle of least privilege should be the norm, not the exception. If Neptune RAT can’t get admin rights, it can’t do nearly as much damage. Lastly, we need to be proactive, not reactive. Regular security audits, keeping systems updated, and having a solid incident response plan aren’t just good practices – they’re essential defenses.”

“By focusing on education, access control, and proactive measures, we can significantly reduce our vulnerability to these evolving threats. It’s not about perfect security – it’s about making it so difficult for the attackers that they move on to easier targets.”

Paul Bischoff, Consumer Privacy Advocate at Comparitech follows with this: 

“The maker of Neptune RAT is giving their malware out for free, so it’s not just one hacker group we need to worry about. Anyone could use it to launch attacks through email, text, ads, or download links. Once the malware has infected a system, it is extremely destructive, dangerous, and hard to remove. The key is prevention. Don’t click on links or attachments in unsolicited messages, and only download files from trusted sources.”

Chris Hauk, Consumer Privacy Champion at Pixel Privacy adds this:

“It appears that the “try it before you buy it” era of malware has arrived. Neptune RAT is available as a download from GitHub, making it available to a wider variety of internet users than usual. As antivirus and anti-malware apps have not yet been able to detect and remove Neptune RAT, internet users will need to stay alert and practice safe computing by not clicking on links or opening attachments that are shared by unknown users.”

I have a suspicion that 2025 is going to be the year where there’s an explosion in increasingly dangerous ransomware. That means that organizations need to do everything possible to avoid being victims. Otherwise 2025 is going to be the year that the pendulum swung in favor of the bad guys.

UPDATE: Ensar Seker, CISO at SOCRadar adds this:

“The emergence of Neptune RAT as a publicly available malware builder, distributed through YouTube, Telegram, and GitHub, is especially dangerous because it lowers the barrier of entry for cybercriminals. We’re not just dealing with a stealthy info-stealer here; this tool combines data exfiltration, system destruction, remote access, and potential ransomware capabilities into a single package. That makes it highly attractive to both amateur hackers and advanced cybercrime groups.”

“What makes Neptune RAT stand out is its distribution model. By offering a ‘free version’ to the public and reserving a more powerful variant behind a paywall, the malware developers are adopting a Ransomware-as-a-Service (RaaS)-style business model, which has proven devastating in recent years. The inclusion of system-wiping functionality is especially concerning, as it shows a shift from simple financial theft toward purely destructive or extortion-based operations.”

“The fact that it’s being distributed openly through mainstream platforms like YouTube and GitHub also highlights a failure in platform moderation and underscores the need for greater threat monitoring on social media and developer repositories.”

“For enterprises and individual users alike, this threat reinforces the need for robust endpoint protection, credential hygiene, and awareness training. Many infections today begin with social engineering, phishing emails, fake downloads, or poisoned links in seemingly trustworthy places like YouTube video descriptions.”

“Finally, defenders need to remain vigilant and leverage threat intelligence platforms to monitor for Neptune RAT’s indicators of compromise (IOCs) and behavior-based detection techniques. Because if the ‘free’ version is already dangerous, we must prepare for the inevitable weaponization of the full version by more advanced actors.”

Fitness Trackers Are Only 67% Accurate: WellnessPulse

Posted in Commentary with tags on April 8, 2025 by itnerd

An original meta-analysis by the WellnessPulse research team reveals that fitness trackers offer moderate overall accuracy (67.40%), but their performance differs by brand and metric. Here’s a breakdown of the findings:

Key findings:

  1. Overall accuracy:
    • Fitness trackers are most accurate for heart rate (76.35%), followed by step count (68.75%) and energy expenditure (56.63%).
    • The Apple Watch leads in accuracy for heart rate (86.31%) and energy expenditure (71.02%), while Garmin excels in step count tracking (82.58%).
  2. Step count accuracy:
    • Garmin (82.58%)Apple (81.07%), and Fitbit (77.29%) show strong accuracy.
    • Jawbone (57.91%) and Polar (53.21%) are less reliable, often mistaking other movements for steps.
  3. Heart rate accuracy:
    • Apple Watch (86.31%) and Fitbit (73.56%) perform well.
    • Garmin (67.73%) and TomTom (67.63%) are less accurate, with reduced precision for darker skin tones due to reliance on light sensors.
  4. Energy expenditure accuracy:
    • Only the Apple Watch (71.02%) provides strong accuracy.
    • Other brands like Fitbit (65.57%)Jawbone (50.23%), and Polar (53.21%) show moderate accuracy, while Garmin (48.05%) is the least accurate.

Methodology

  • Researchers analyzed 45 studies, extracting 168 data points on heart rate, step count, and energy expenditure.
  • Data was compared against gold-standard measurements (e.g., electrocardiograms for heart rate and indirect calorimetry for energy expenditure).
  • A meta-analysis approach was used, with correlation coefficients converted to percentages for clarity.

To see the full report, please visit: https://wellnesspulse.com/research/accuracy-of-fitness-trackers/ 

LinkedIn’s Top Companies for Career Growth in Canada 

Posted in Commentary with tags on April 8, 2025 by itnerd

Today LinkedIn unveiled its 2025 Top Companies list for Canada, spotlighting 50 workplaces that are now hiring big, investing in employee development and fostering long-term career growth. This year, Canada’s financial sector stands out, claiming six of the top ten spots, a reflection of both the industry’s stability and its investment in talent.  These companies are not only hiring across roles in finance, tech, and operations, but also doubling down on reskilling initiatives and internal mobility to help employees grow and pivot. 

Here’s the full list of LinkedIn’s Top Companies in Canada 2025

  1. Scotiabank
  2. TD
  3. Desjardins
  4. CIBC
  5. Thermo Fisher Scientific
  6. Doane Grant Thornton
  7. Autodesk
  8. RBC
  9. Oracle
  10. BMO

These organizations are redefining the future of work by offering employees opportunities to upskill, embrace career mobility, and thrive in innovative environments.

Methodology

Their methodology uses LinkedIn data to rank companies based on eight pillars that have been shown to lead to career progression: ability to advance; skills growth; company stability; external opportunity; company affinity; gender diversity; educational background and employee presence in the country. Ability to advance tracks employee promotions within a company and when they move to a new company, based on standardized job titles. Skills growth looks at how employees across the company are gaining skills while employed at the company, using standardized LinkedIn skills. Company stability tracks attrition over the past year, as well as the percentage of employees that stay at the company at least three years. External opportunity looks at Recruiter outreach across employees at the company, signaling demand for workers coming from these companies. Company affinity, which seeks to measure how supportive a company’s culture is, looks at connection volume on LinkedIn among employees, controlled for company size. Gender diversity measures gender parity within a company and its subsidiaries. Educational background examines the variety of educational attainment among employees, from no degree up to Ph.D. levels, reflecting a commitment to recruiting a wide range of professionals. Finally, employee presence in the country looks at the company’s number of employees in the country relative to other companies, as a means of capturing companies that provide a diverse work environment and more opportunities for career advancement and networking. 

To be eligible, companies must have had at least 500 employees in the country as of Dec. 31, 2024. Attrition can be no higher than 10% over the methodology time period, based on LinkedIn data. Similarly, organizations that have had layoffs of 10% or more of their workforce based on corporate announcements or public, reliable sources between Jan. 1, 2024 and the list launch, are not eligible. These decisions are made by the LinkedIn News team based on company statements and/or reputable news outlets. Only parent companies rank on the list; majority-owned subsidiaries and data about those subsidiaries are incorporated into the parent company score. The methodology time frame is Jan. 1, 2024 through Dec. 31, 2024. This analysis represents the world seen through the lens of LinkedIn data, drawn from the anonymized and aggregated profile information of LinkedIn’s members around the world.

They exclude all staffing and recruiting firms, educational institutions and government agencies. We also exclude LinkedIn, its parent company Microsoft, Microsoft subsidiaries, and Deloitte, which is Microsoft’s independent third-party auditor, from the list.

About company insights

Company insights were sourced from LinkedIn Talent Insights and include the parent company and majority-owned subsidiaries. Data reflects aggregated public member data from active LinkedIn profiles in the relevant country and includes employee profiles associated with the parent company and majority-owned subsidiaries on LinkedIn. We exclude members who identify as interns or contractors. All insights reflect a 12-month time period looking back from January 2025. Top locations were categorized as the regions or cities that employed the largest percentage of each company. Skills data was derived from measuring the most frequent unique skills among a company’s employees, relative to other companies. Most common job titles represent the occupations most common within each company. Largest job function measures the function area most prevalent within each company. Flexible work availability measures jobs flagged as “remote” or “hybrid” by the company or containing similar keywords.

Ricoh introduces first A3 MFPs with straight path scanner

Posted in Commentary with tags on April 8, 2025 by itnerd

 Ricoh USA, Inc. today announced a new lineup of intelligent color A3 multifunction printers (MFPs) with a revolutionary automatic single-pass document feeder (SPDF) that accommodates multiple unique media types, delivering the most flexible feeding capabilities for an office MFP on the market today.

While traditional SPDFs are efficient document management tools, their media handling capacities are limited. Due to a curved path, unique format originals, such as plastic ID cards, can only be scanned on an MFP’s exposure glass, resulting in a tedious and time-consuming process. This can result in downtime for businesses due to the physical sorting and setting of originals, frustrating paper jams, and misalignment of scanned images.

The RICOH IM C3510SDRICOH IM C4510SD and RICOH IM C6010SD(RICOH SD Series) practically eliminates these challenges with a revolutionary production-class straight path SPDF. Incorporating paper transport technology from PFU – a Ricoh Company that manufactures Ricoh document scanners – it dramatically reduces jams while allowing for seamless scanning of mixed originals in a single batch. From thin cash register receipts to fragile thermal or carbonless paper to rigid ID cards, the SPDF on the RICOH SD Series accepts almost anything in its feeder. Users simply place their originals – any size, format, and orientation – in the SPDF and let the MFP do the rest. The RICOH SD Series automatically detects irregularities, and makes orientation and skew adjustments, producing a correctly sized image instantly viewable on the third-generation 10.1” Smart Operation Panel.

Click here to watch a video about the RICOH SD Series’ innovative scanning technology.


A flexible imaging platform

The RICOH SD Series provides all the advanced print, copy and fax features of a modern MFP with flexible and customizable technology that evolves with businesses’ needs. A max print resolution of 1200 x 1200 dpi, and a variety of paper tray and finisher options allow businesses to produce professional quality materials, like brochures, booklets, and presentations in-house. Smart solutions, such as RICOH Smart Integration and RICOH Streamline NX, enable users to personalize their device features, enhance document management and optimize digital workflows, while RICOH CloudStream gives businesses more control of their print infrastructures from the cloud.

Reliable security

Hybrid work has changed the way people collaborate, with information sharing no longer occurring within one location. With flexible and mobile workplaces continually evolving, businesses need assurance that their intellectual property and sensitive data remain secure. The RICOH SD Series incorporates Trusted Platform Module (TPM) version 2.0 encryption as standard, improving the strength of passwords and keys stored on the MFP, and expands the number of admin accounts to reduce the risk of ID sharing. And with RICOH Always Current Technology, businesses can stay ahead of threats with the latest security updates to protect their information and workflows, while also getting access to new features and solutions without having to wait for a technician or purchase a new device.

Advancing sustainability

As an industry leader in sustainability, the RICOH SD Series reflects Ricoh’s long-standing commitment to limiting environmental impacts and supporting sustainable outcomes for businesses worldwide. Designed with 47% post-consumer recycled plastics and using 100% recycled PET toner bottles, the Series’ innovative scanning capabilities promote more digital workflows that reduce paper consumption and waste. An advanced Sleep Mode and a reformulated high-efficiency toner that fuses at a lower temperature also contribute to significantly lower energy usage.

For more information about Ricoh’s print technology, click here.

Cyberattacks are Fewer in Number but Smarter in Strategy, Says CDW Canada Study

Posted in Commentary with tags on April 8, 2025 by itnerd

CDW Canada, today released its annual Canadian Cybersecurity Study, Canadian Cybersecurity Trends: Bridging Strategy, Technology, Artificial Intelligence and Human Expertise, which explores the evolving state of cybersecurity among Canadian organizations. The study, sponsored by CDW Canada and conducted with additional support and analysis by IDC Canada, surveyed over 704 IT security, risk and compliance professionals.

The expanding threat landscape highlights a critical pattern in 2025. Cyberattacks continue to decrease in frequency, yet successful attacks have intensified and become increasingly disruptive. In the past 12 months, 87 percent of Canadian organizations have reported experiencing a security incident, coupled with a 10 percent year-over-year increase in the length of downtime per incident. This pattern indicates a need for Canadian organizations to prioritize proactive cybersecurity to avoid these detrimental disruptions to their business.

GenAI progress stalls amid gaps in security and governance frameworks

Over the past year, organizations have raced to explore the potential of Generative Artificial Intelligence (GenAI), but the excitement has exposed a critical paradox. While organizations recognize GenAI’s transformative potential, many are facing security and compliance barriers that have slowed full-scale adoption.

Canadian organizations are particularly grappling with the complex challenges of securely integrating and scaling GenAI into business operations. Between 2023 and 2024, businesses conducted an average of 17 GenAI proof-of-concepts (PoCs), yet fewer than a third (28 percent) successfully transitioned to full production as concerns over data privacy and compliance put projects on hold.

The majority cite common barriers to adoption, including data privacy concerns (64 percent), skills shortages (57 percent) and system integration complexities (44 percent).

The rush to integrate GenAI has highlighted gaps in Canadian organizations’ foundational frameworks. However, this provides a key opportunity for organizations to strategically assess their data governance and compliance capabilities at a moment when the full potential of GenAI is still in its infancy.

Organizations must invest in strengthening their overall security posture and capabilities to benefit from the transformative potential of GenAI.

Proactive security testing is the missing link for cloud environments

As Canadian organizations expand their digital ecosystems and increasingly rely on their hybrid cloud environments, cyberattackers are keeping pace, exploiting vulnerabilities in cloud environments at an alarming rate. What was once a secondary risk has emerged as a primary concern, with public cloud infrastructures facing more attacks than any other IT infrastructure component.

More than half (61 percent) of Canadian organizations report that their public cloud environments have been the most impacted by cyberattacks. However, organizations conducting annual security testing indicated fewer infiltrations (23 incidents) and breaches (33 incidents) on average compared to 25 and 29 incidents respectively for those without regular testing. This underscores the clear value of comprehensive cloud testing to proactively mitigate risks, freeing up more time and resources for core business operations.

Structural gaps drive the shift toward third-party services

Canadian organizations are prioritizing their security capabilities by investing in Managed Detection and Response (MDR) services, which provide proactive managed solutions to enhance detection and incident response driven by a strategic shift to address internal resource gaps, improve threat detection and response speeds to increase cyber resilience.

Nearly half (41 percent) of Canadian organizations have already adopted MDR services, with more than a third (37 percent) planning to do so in the near future. As organizations continue to struggle with the impacts of breaches, MDR services are a key enabler in reducing vulnerabilities and minimizing operational disruptions.

To learn more about the state of cybersecurity for Canadian organizations, download the study here.