FBI Pwns Ransomware Gang… Yes You Read That Right

Posted in Commentary with tags on January 27, 2023 by itnerd

The FBI revealed yesterday that it had shut down the prolific ransomware gang called Hive. To do this, they hacked the hackers. Which I have to admit is a novel approach:

At a news conference, U.S. Attorney General Merrick Garland, FBI Director Christopher Wray, and Deputy U.S. Attorney General Lisa Monaco said government hackers broke into Hive’s network and put the gang under surveillance, surreptitiously stealing the digital keys the group used to unlock victim organizations’ data.

They were then able to alert victims in advance so they could take steps to protect their systems before Hive demanded the payments.

“Using lawful means, we hacked the hackers,” Monaco told reporters. “We turned the tables on Hive.”

News of the takedown first leaked on Thursday morning when Hive’s website was replaced with a flashing message that said: “The Federal Bureau of Investigation seized this site as part of coordinated law enforcement action taken against Hive Ransomware.”

That is impressive. But I should point something out. There were no arrests. So the gang is still out there, and they perhaps they may be rebuilding to launch new attacks. Or they could be scared and not surface again. We’ll have to see.

UPDATE: Brian Johnson, Chief Security Officer of Armorblox had this to say:

This action from the US agencies is definitely a step in the right direction. Specifically looking at attack vectors like ransomware and credential phishing across our 58,000+ tenants, we see a concentration into a few different threat actors at the top – including Hive – so taking them out will have a large impact on the number of attacks that organizations would see. 

At the same time, precisely because of regulatory and law enforcement actions, we are seeing threat actors moving away from ransomware and crypto based attacks to easier attack methods to compromise organizations and steal money or credentials. In the past two years, the two most common cyber insurance claims have been business email compromise and vendor fraud, not ransomware. The arrival of chatGPT is showing attackers the art of the possible when it comes to using language models to create more realistic and successful phishing and business compromise attacks, and in response organizations will need to do the same to defend themselves against the next wave of attacks.

How To Make Your Apple Watch Ultra More “Ultra” (Also Applies To Other Apple Watch Models)

Posted in Products with tags on January 27, 2023 by itnerd

When the Apple Watch Ultra first popped up, people naturally compared it to Garmin sports watches and pointed out the shortcomings that the Apple Watch Ultra had. These shortcomings were:

  • No offline maps for the Apple Watch Workout app
  • No recovery and training advice

Now to be fair, these were shortcomings that the Apple Watch have always had. But they were magnified because of how the Apple Watch Ultra was marketed. Which was directly against established sport watches that had these features baked into their offerings. The good news is that you can easily add these features to not only your Apple Watch Ultra, but any Apple Watch actually to make either more “Ultra”. Let’s start with recovery advice as that is important to the Apple Watch Ultra’s target market.

For recovery and training advice, I have been using an app called Athlytic for the last couple of years on both my iPhone and Apple Watch. I’m going to use their definition of what their app does a great job of encapsulating it:

Athlytic is an app that works with both the iPhone and the Apple Watch to leverage the data in Apple Health, giving you daily, personalized insights into and coaching about your health and daily training.

More specifically, Athlytic uses the health data, collected by your Apple Watch, to help you gauge three things for the current day: how ready your body is to perform, how much cardiovascular exertion you should aim to put on your body, and how much cumulative cardiovascular exertion you’ve put on your body.

Athlytic generates three primary metrics: a Recovery score, a Target Exertion Zone, and an Exertion score.

So in short, it helps me to figure out how hard I can or more accurately should push myself when I work out or take it easy. Which in case you are wondering, I do a workout every day either on the bike outdoors, on the bike indoors via the Zwift platform, cross country skiing in the winter, and some other stuff like hiking and walking.

Let me walk you through how I use it.

When I wake up in the morning and open Athlytic, the recovery screen is the first place I go to. I’ve really been doing some hard workouts lately on Zwift, and it shows that over the last week that my body really isn’t recovering form the efforts that I have put in over the last few days. So based on this, I should be doing less intense workouts to get my body to fully recover. Athlytic goes deep into the weeds to help you understand how these numbers are calculated which you can read here. But the main metric that works into this recovery score is HRV or heart rate variability which Athlytic defines as follows:

The next screen that I go to is the sleep screen to see how well (or not so well) I slept the previous night. On this night, I had decent sleep as it was north of 7.5 hours.

I also pay attention to my sleep debt, which is a way of illustrating if you are consistently getting 7.5 or more hours of sleep consistently, which in turn pays off in terms of better recovery scores. I also pay attention to my sleep time consistency. Which is another way of illustrating if my bedtime is the same every night which helps me get a better nights sleep. Both of these are in a very good place at the moment.

I also tag what happened the day before. For example, the day before I had two cups of coffee in the morning. I do this because Athlytic can start trending recovery relative to different things that happen. Thus I can see what positively or negatively affects my recovery.

Athlytic measures a number of metrics via your Apple Watch, and presents them in this summary page. If anything is out of line, you’ll get an alert, as having any of these out of line may be in indication of fatigue or sickness.

The final screen that I look at is the trends screen which has my exertion or how hard I worked out in blue, and the recovery in grey. This illustrates that earlier this week, I was working out way harder than I should have and I am now paying for it later in the week as the blue line was way above the grey line. I got that under control later in the week. But by then my body was clearly fatigued. Thus something that I need to focus on is bringing those lines closer together as I am going to get more fitness gains by not over training.

So with that out of the way, my wife and I planned to go cross country skiing and given this recovery level, we planned to do two laps of a loop that was just over 5K. I would do the second lap by myself at my typical pace which is way faster than what my wife can do. That’s where another app called WorkOutDoors comes in:

The Apple Watch Workout app is really inadequate. It doesn’t have anywhere the level of customization that any dedicated sports watch such as a Garmin watch has. It also doesn’t support the paring of sensors like power meters on bikes for example. And more importantly, it doesn’t support offline maps which a lot of endurance athletes rely upon. WorkOutDoors solves all of that and really leverages the big screen of the Apple Watch Ultra as seen here. I can use the iPhone app to create custom screens like this one to display the information that I need to see, as well as download routes in .gpx file format to allow me to follow a route. Including in situations where I do not have cellular service which is something that the baked in Workout app cannot do. I will admit that when you first look at this app to try and customize your screens, it can be intimidating. But I encourage you to experiment with different views and try them out to see if you like them or not as it really isn’t that intimidating. One big plus of WorkOutDoors is that I can have it upload directly to the sports social networking site Strava because if your workout is not posted to Strava, it didn’t happen as far as your friends are concerned. WorkOutDoors has mostly replaced the Workout app on my Apple Watch Ultra as it is simply far more usable and functional with the exception of one thing. WorkOutDoors really needs to leverage the always on display as it doesn’t offer “live” views even when the screen is dimmed. If they fixed that, this app would be perfect.

So, after my wife and I did our laps of the route that we planned, I can go back to Althyltic and see how hard I worked.

This is the second lap of the just over 5K route that I spoke of earlier where I was pushing myself a bit harder. Athlytic can display the heart rate of my cross country ski run and then go into the weeds about what this means.

In this case, it showed me that while I was working hard, but not insanely hard. Most of my heart rate was in zone four which is good for building my VO2 Max capacity. I also note that this workout was scored as a 4.01 in terms of effort. Combined with my first run which was much easier, I got an exertion score of 5.9 which was well within my exertion range of 4.5 to 6.5 that I was aiming for. It also shows how intense the workout was. Because you can do a workout and think “wow that was hard” and it actually wasn’t. In this case, it validates that I was working hard but not going over the top.

In fact, Athlytic says so as 76% of this lap was anaerobic. This is the sort of workout that will help my cycling when the road season starts up again.

For me, the combination of these apps allows me to really focus on how I train, how I recover, as well as seeing the real time metrics that I need to work out effectively. And both have resulted in a significant gain in fitness for yours truly. Thus I consider these apps to be a must if you’re serious about using the Apple Watch to up your fitness game. Athlytic is a subscription app which costs $30.99 CDN a year. WorkOutDoors however is a one time payment app which is $8.49 CDN. However both support Family Sharing so others in your family who want to up their fitness game can do so easily and for one fee for up to six people. If you want to make your Apple Watch more “Ultra” regardless of whether you have an Apple Watch Ultra or some other Apple Watch so that you can really improve your fitness, and make up for the lack of this functionality from Apple, you should have a serious look at both of these apps.

Guest Post: Efficiency and visibility with the benefit of SAP monitoring

Posted in Commentary on January 27, 2023 by itnerd

By Gregg Ostrowski, Executive CTO, Cisco AppDynamics

Today, SAP is a vital part of business operations, giving enterprise companies the ability to deliver goods and services to customers around the world. From frontend to backend, several business applications depend completely on SAP to run their most critical business operations.

As IT environments become more complex and dynamic, IT teams are finding it increasingly challenging to manage the availability and performance of both SAP and non-SAP applications. Partial visibility into SAP environments and their dependencies on third-party applications can become enormous obstacles to effective problem resolution and mean time to resolution (MTTR), leading to repeated outages and multiple revenue losses.

Organizations must therefore reevaluate how they approach monitoring their SAP environments, strengthening their monitoring strategies to optimize application availability and performance, and observing the status of key business transactions live and in real time.

SAP monitoring challenges

The majority of organizations still deploy a multitude of tools to monitor dependent systems, or they have a siloed tool monitoring SAP, completely independent from the rest of their IT stack. A fragmented approach like this means they cannot see the full end-to-end flow and correlate business performance with their SAP landscape.

This requires many companies to continue to manually correlate SAP performance data with business events on an ad hoc basis or do so after business problems occur. They waste a lot of time trying to troubleshoot problems by having to manually review all the records, which adds to the MTTR, as dynamic environments create a wave of additional data, and this approach will not scale.

In fact, even if companies have the option to measure performance and monitor it in this way, it will only allow them to cope with problems. They cannot prioritize the most important business operations because they cannot establish which are the most direct customer and business-facing issues. Therefore, IT teams are exposed to just putting out fires, wasting valuable time and resources to focus on strategic priorities.

The importance of visibility in the IT environment

Without question, businesses need a single source of truth about their SAP environments and how they are driving company-wide performance.

The above means that it is necessary to ensure they have deep, end-to-end visibility to get a comprehensive view of their entire IT landscape. With this information, technologists are available to see and understand upstream service dependencies – as well as user experience – within SAP.

IT teams need a solution that can understand exclusive advanced business application programming code issues at a microscopic level so that developers can easily pinpoint the root cause of application performance issues. This level of visibility creates more stability within the application environment, enhancing technologists’ ability to respond reliably to IT, business outcomes, and customer expectations.

It is important for organizations to move on from piecemeal and heavily manual methods of monitoring SAP and non-SAP apps. Trying to recreate issues is not always possible. This approach is too time-consuming and increases the risk of ongoing performance problems that can affect end users and corrupt the bottom line.

Technologists can make use of dynamic baseline capabilities to bypass having to manually update static thresholds as priorities change and environments grow. To avoid infinite alert storms, enterprises could leverage artificial intelligence (AI) and machine learning (ML) to proactively assess the status of transactions, as well as address issues that may arise.

Through this proactive functionality, organizations can adjust their resource investment based on scenarios specific to their business and potentially affecting performance, such as high traffic volumes due to holiday shopping or other seasonal events, month-end closing, and product launches, among other business activities.

This is especially relevant when organizations take advantage of cloud-native solutions. It provides real-time performance metrics, helping technologists report issues as they identify bottlenecks to focus on innovation processes that can drive organizational growth. 

Report: Commvault Leads the Industry in Kubernetes Data Protection for Third Consecutive Year

Posted in Commentary with tags on January 27, 2023 by itnerd

Commvault, a global enterprise leader in intelligent data services across on-premises, cloud, and SaaS environments, today announced that leading industry research firm GigaOm has named Commvault a “Leader” and “Outperformer” in the new GigaOm Radar for Kubernetes Data Protection for the third year running.

Commvault was evaluated along with 14 other vendors based on execution, roadmap and ability to innovate. According to GigaOm, Commvault is “doing very well by combining solutions for SaaS applications, on-premises (VM-based) infrastructure, containers, and databases efficiently.” Commvault provides Kubernetes data protection through its Commvault Complete™ Data Protection software and Metallic Data Management as a Service (DMaaS) solutions, giving customers the flexibility to choose their preferred storage vendor through their extensive ecosystem.

Kubernetes and containers have not (yet) replaced all cloud and traditional applications – they have integrated into the application landscape and need to be protected accordingly. Over the last year, Commvault has significantly advanced its protection for Kubernetes workloads by integrating, fully automated management, replication, migration, and security enhancements across its portfolio of Intelligent Data Services. According to the GigaOm Radar for Kubernetes Data Protection, Commvault provides effective protection for “hybrid applications that run across Kubernetes, VMs, and cloud services, consolidating backup operations on a single platform.”

To learn more about how Commvault and our Metallic SaaS portfolio ranked in the GigaOm Radar for Kubernetes Data Protection, view the report here.

The TELUS Data Trust Survey Reveals Some Interesting Facts On How Canadians View Data Privacy

Posted in Commentary with tags on January 26, 2023 by itnerd

It’s Data Privacy Week – an issue that is top of mind as federal government is about to discuss.

Bill C-27, proposed to strengthen Canada’s private sector law while ensuring the privacy of Canadians will be protected and that innovative businesses can benefit from clear rules as technology continues to evolve.

In a recent poll, commissioned by TELUS, only 30 per cent of Canadians trust organizations to protect their personal information, and more than half of Canadians feel confident data and technology can be used to positively impact healthcare, education, safety and security. Here’s some other key points from the TELUS Data Trust Survey:

About the survey:

  • The purpose of TELUS’ Data Trust Survey was to explore Canadians’ feelings around data privacy and trust to drive conversations in light of rapid digital transformation of our economy and lives.
  • Trust, as it pertains to data, is essential to technological and social innovation. With data breaches on the rise, it’s more important than ever for organizations to protect the data entrusted to them and to be transparent about how data is used and protected to maintain and build trust.

Methodology:

  • Audience: Responses were nationally representative from 2,016 Canadian adults, 18years of age or older
  • Timeframe: August 31, 2022 to September 19, 2022
  • Location: Canada
  • Language: English, French
  • Sample provider: Dynata, Inc.Key Survey Findings

Canadians care about their data privacy.

  • 97% of Canadians feel they understand what personal information is.
  • More than eight-in-ten claim to understand how their personal information can be usedonline.
  • Three-quarters of Canadians take regular steps to protect their personal information.
  • More than half are extremely concerned about personal information and online privacy.

Half have experienced a breach, impacting their trust.

  • In the last two years, almost half of Canadians experienced some sort of breach.
  • Since experiencing a breach, two-thirds of Canadians have become more guarded with their personal information.
  • Since experiencing a breach30% of Canadians have lost trust with the company associated with the breach.

Canadians believe in the power of technology for good.

  • Half of Canadians are extremely excited about technology improvements.
  • More than half of Canadians feel confident data and technology can be used topositively impact healthcare, education, safety and security.
  • 42% believe that sharing data with trustworthy companies can provide them with usefulproducts and services

Trust matters to Canadians when choosing companies to engage with.

  • 79% of Canadians agree that a company’s reputation for how it treats personal information and privacy changes the way they think about the company or brand.
  • 62% are more likely to buy products or use services from companies they trust.
  • Only 31% trust organizations to protect their personal information.
  • Nearly one-quarter of Canadians say they don’t trust telecoms, 14% say they don’t trustvirtual care providers.

Apple’s Activation Lock Has Resulted In Perfectly Good Apple Products Being Scrapped

Posted in Commentary with tags on January 26, 2023 by itnerd

When Apple came out with Activation Lock which stops Apple Products from being reused if they are stolen because they are locked to the original owner, I applauded that as it makes iPhones and Macs less of a target for thieves. Or at least it should make them less of a target for thieves. But there’s one unfortunate side effect that Motherboard has detailed:

Secondhand MacBooks that retailed for as much as $3,000 are being turned into parts because recyclers have no way to login and factory reset the machines, which are often just a couple years old.

In short, Activation Lock is creating a problem with recyclers where they can’t factory reset perfectly good computers. So instead of factory resetting them and selling them on the used market, they are selling them for scrap. Or in the worst case, destroying parts that they can’t use with all sorts of health and environmental effects.

This is a huge optics issue that Apple has unintentionally created. And at least at this point, they don’t seem to want to help solve this problem. And I can see why from Apple’s point of view. If you give recyclers the tools factory reset these Macs, those tools might end up in the hands of thieves who would do the same thing with stolen Macs. And if Apple were to reset these computers themselves, it would be a logistical challenge for them as they would likely have to sort out what’s legit and what might have been stolen. Still, I think Apple may have to do something here as this is a bit of an optics issue for a company that likes to brag about their environmental “street cred.”Let’s see if they do or say something now that this is out there.

Home Depot Gave Customer Data To Meta Says Canadian Privacy Commissioner Without Customer Consent

Posted in Commentary with tags , on January 26, 2023 by itnerd

Home Depot is my go to for anything I need to fix stuff around my condo. But perhaps I should rethink that as the Canadian Privacy Commissioner has determined that Home Depot handed over customer data to Meta (aka Facebook) without consent from customers:

It is an issue highlighted in a recent investigation by the Office of the Privacy Commissioner of Canada (OPC) into Home Depot of Canada Inc. (Home Depot). By participating in Meta Platforms Inc.’s Offline Conversions program, Home Depot was found to be sharing details from e-receipts – including encoded email addresses and in-store purchase information – with Meta, which operates the Facebook social media platform, without the knowledge or consent of customers.

And:

The investigation found that Home Depot had been collecting customer email addresses at store checkouts for the stated purpose of providing customers with an electronic copy of their receipt since at least 2018. However, the investigation revealed that during this period, the encoded email addresses, along with high-level details about each customer’s in-store purchases, were also sent to Meta.

Information sent to Meta was used to verify if a customer had a Facebook account. If they did, Meta compared the person’s in-store purchases to Home Depot’s advertisements sent over the platform to measure and report on the effectiveness of those ads. Meta’s Offline Conversions contractual terms also allowed it to use the customer information for its own business purposes, including user profiling and targeted advertising, unrelated to Home Depot.

Each email address Home Depot shared with Meta was encoded so that it could not be read by individuals at Facebook. Meta employed an automated process that allowed it to match email addresses attached to Facebook accounts. Email addresses not already associated with a Facebook account could not be linked to individuals.

While the details of a person’s in-store purchases may not have been sensitive in the context of Home Depot, they could be highly sensitive in other retail contexts, where they reveal, for example, information about an individual’s health or sexuality.

During the investigation, Home Depot said that it relied on implied consent and that its privacy statement, accessible through its website and in print upon request at retail locations, adequately explained that the company uses “de-identified information for internal business purposes, such as marketing, customer service, and business analytics” and that it “may share information for business purposes,” including “with third parties.” Home Depot also relied on Facebook’s privacy statement, which explained the Offline Conversions program.

The OPC, however, rejected Home Depot’s argument as the privacy statements Home Depot relied on for consent were not readily available to customers at the check-out counter, and consumers would have no reason to seek them out. Moreover, the OPC found that Home Depot’s privacy statement did not clearly explain the practice in question.

Now I have always been suspect of getting e-receipts from companies which is why I always prefer printed copies. This revelation makes me want to double down on never getting an e-receipt. Now I tried to find a comment from Home Depot or Meta but I couldn’t find one. Which in itself says something. But in the meantime, here’s what the Privacy Commissioner says that Home Depot has to do:

As a result of the investigation, the OPC recommended that Home Depot:

  • cease disclosing the personal information of customers requesting an e-receipt to Meta until it is able to implement measures to ensure valid consent;
  • implement measures to obtain express, opt-in consent from customers prior to sharing the information with Meta, should it resume the practice; and
  • ensure meaningful consent by providing customers requesting an e-receipt with key information regarding its sharing of information with Meta at the point of sale, and by strengthening its privacy statement to include a detailed explanation of its practices and how customers can withdraw consent.

It will be interesting to see if Home Depot complies with this. Because now that this is out there, Home Depot is going have to deal with customers who do not trust them. And that’s not a good place to be in.

NIST Releases AI Risk Management Framework

Posted in Commentary with tags on January 26, 2023 by itnerd

The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) released its Artificial Intelligence Risk Management Framework (AI RMF 1.0) today, a guidance document for voluntary use by organizations designing, developing, deploying or using AI systems to help manage the many risks of AI technologies. A press release has the background on this:

The AI RMF follows a direction from Congress for NIST to develop the framework and was produced in close collaboration with the private and public sectors. It is intended to adapt to the AI landscape as technologies continue to develop, and to be used by organizations in varying degrees and capacities so that society can benefit from AI technologies while also being protected from its potential harms.

“This voluntary framework will help develop and deploy AI technologies in ways that enable the United States, other nations and organizations to enhance AI trustworthiness while managing risks based on our democratic values,” said Deputy Commerce Secretary Don Graves. “It should accelerate AI innovation and growth while advancing — rather than restricting or damaging — civil rights, civil liberties and equity for all.” 

Interesting. Christopher Prewitt, CTO of Inversion6 had this comment:

There is a significant amount of motivation to get ahead of Artificial Intelligence. As we know, governments are often slow to develop guidance, laws, executive orders around technology. The focus of this technology and frankly all new technologies are around the value they create and the risks are often not identified or focused on. The NIST AI Risk Management is attempting to provide a structure around the risk identification and management processes, so organizations can more safely develop new AI based solutions.

I’ll be interested to see where this goes as AI is very much a top of mind topic at present.

An Experian Glitch Exposed ALL Consumer Credit Files For SEVEN WEEKS Was Only Brought To The Attention Of Consumers This Week… WTF?

Posted in Commentary with tags on January 26, 2023 by itnerd

Brian Krebs has a mind blowing story on his website that you simply must read. It revolves around consumer credit reporting bureau Experian and an issue that Krebs found and reported to the company. Here’s the TL:DR of what happened from the story:

On Dec. 23, 2022, KrebsOnSecurity alerted big-three consumer credit reporting bureau Experian that identity thieves had worked out how to bypass its security and access any consumer’s full credit report — armed with nothing more than a person’s name, address, date of birth, and Social Security number. Experian fixed the glitch, but remained silent about the incident for a month. This week, however, Experian acknowledged that the security failure persisted for nearly seven weeks, between Nov. 9, 2022 and Dec. 26, 2022.

The implication of this is staggering as this information could be used to launch all sorts of identity theft campaigns. Which is not only bad, but the worst case scenario possible. And the fact that only this week Experian told consumers is an absolute #fail.

Jack Nichelson, CISO of Inversion6 added this commentary:

The fact that Experian waited over seven weeks before notifying customers of the security risk is a serious concern. This delay in notification put customers at risk of identity theft and financial loss. By waiting so long to notify customers, Experian gave identity thieves ample time to access and potentially misuse customer information.

Furthermore, the fact that the security vulnerability persisted for nearly a month is also a cause for concern. This indicates that Experian’s security systems were not effectively detecting or addressing the issue in a timely manner.

This incident highlights the importance of prompt and transparent notification in the event of a security breach. Customers have a right to know if their personal and financial information has been compromised so they can take steps to protect themselves. Additionally, this incident raises questions about the effectiveness of Experian’s security systems and the company’s overall commitment to data privacy and security.

What needs to happen here is there needs to be an investigation from the appropriate government agencies as to the behaviour of Experian in this case. Because quite frankly this is unacceptable and needs to be addressed in the strictest possible way.

BenQ Announces New High Performance Monitors

Posted in Commentary with tags on January 26, 2023 by itnerd

With many of us back to work, it’s likely that our screen time has increased significantly since the holidays. 

Veterans in the monitor industry, BenQ is constantly at the forefront of new technology features that only better the user experience for individuals reliant on their monitors, such as entrepreneurs, tech experts, graphic designers, and illustrators.

BenQ has developed eye-care technology, that puts eye-care safety at the forefront. Below is a round-up of BenQ’s monitors that offer brightness intelligence+, brightness intelligence, low blue light, low blue light+, and a flicker-free experience. This advanced technology acts as a safeguard for the eyes filtering out harmful lights that cause eye damage.

GW2485TC | 23.8″ 1080p Eye-Care IPS USB-C Monitor ($299.99 CAD)

  • Noise cancellation microphone minimizes distractions
  • USB-C & daisy chain 
  • Coding mode for easy readability and coding efficiency
  • Ergonomic design with slim bezel
  • Available online at amazon.ca

EX270QM | MOBIUZ 1ms 27″ IPS 240Hz QHD Gaming Monitor ($1,029.99 CAD)

  • 27-inch 2560 × 1440 16:9 IPS 240Hz Gaming display
  • HDRi and true sound audio by treVolo deliver immersion
  • 1ms GTG and AMD FreeSync™ Premium Pro for smooth gameplay
  • Available online at amazon.ca

PD3420Q34-inch 2K WQHD P3 USB-C Mac® Compatible Designer Monitor ($1,029.99 CAD)

  • 34-inch LED 21:9 ULTRAWIDE, 33% extra screen real estate for video editing
  • USB-C synchronizes images, videos and data seamlessly, and can charge your mobile devices with an all-in-one cable
  • Equipped with 98% Display P3 color space
  • Available online at amazon.ca