In the third in his series on presentations, Jerry Lawson recommends a simple yet powerful tool that presenters can use to improve presentation quality, especially in some special situations: Requiring audience members to submit all questions in writing.
Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Thomson Reuters collected and leaked at least 3TB of sensitive data; Criminals are starting to exploit the metaverse, says Interpol. So police are heading there too; Public Entities in Nearly Every State Use Federally-Banned Foreign Tech, Report Says; and Should you log in with Facebook or Google on other sites or apps? Short answer: No!
The fundamental concept of privacy has changed dramatically as more individuals have shifted most of their data to online platforms. There are however a wide range of personal, professional, corporate and legal issues that present significant barriers to the goal of maintaining privacy on the internet. Online privacy is not a right or even a choice when you use email, browsers and search engines, social media, ecommerce sites, online subscriptions…the list goes on and on. Trying to achieve even a modicum of online privacy now involves the use of multiple applications and services, specific software and hardware, time, due diligence, and flexibility – as the challenges continue to evolve. This pathfinder by Marcus P. Zillman will assist in your efforts to secure additional privacy when using email, conducting research, while on social media, completing online learning programs, transferring health records, shopping online, and with many other online services and system with which you interact daily. Even if you only choose to start using several applications or services that Zillman has referenced, this will establish a foundation on which you can build and execute a more effective privacy and security plan. Think about starting with choosing a new browser, search engine and email provider, and move forward from there. This is a journey, and it will take time, but it is worth the effort.