Ryan loved tweaking photos on his Android phone.
He’d heard rave reviews from his friends with iPhones about Prisma, a new iOS app for image editing. So when he heard Prisma would soon be released for Android, he logged in to the Google Play Store to see if it was there yet.
To his surprise, he found one that looked just like what his friends were describing. Delighted, he downloaded and started using it. Meanwhile, the app—a fake—was busy installing a Trojan horse on his phone.
When he got to work the next day, he logged his phone into the company network as usual. The malware jumped from his phone to the network. Yet no one knew. Not yet, but that was about to change…
Now, this isn’t necessarily a true story (at least, not one we’ve heard of—yet…), but it absolutely could have been. And similar situations are unfolding as you read this. Yes, possibly even at your company…
Fake apps exploded onto iTunes and Google Play last November, just in time for holiday shopping. Apple “cleaned up” iTunes in an effort to quell users’ concerns, but hackers still find workarounds. Unfortunately, these fake apps pose a real threat to the security of your network. Especially if your company has anything but the strictest BYOD (bring your own device) policies in place. And the more your network’s users socialize and shop on their smartphones, the greater the risk of a damaging breach on your network.
Fake apps look just like real apps. They masquerade as apps from legitimate merchants of all stripes, from retail chains like Dollar Tree and Footlocker, to luxury purveyors such as Jimmy Choo and Christian Dior. Some of the more malicious apps give criminals access to confidential information on the victim’s device. Worse yet, they may install a Trojan horse on that device that can infect your company’s network next time the user logs in.
So what can you do?
First, keep yourself from being fooled. Anyone can easily be tricked unless you know what to look for. Take the following advice to heart and share it with your team:
Beware of Fake Apps!
In case you weren’t aware, one of the latest and most dangerous Internet scams is fake apps. Scammers create apps that look and behave like a real app from a legitimate store. These fake apps can infect your phone or tablet and steal confidential information, including bank account and credit card details. They may also secretly install on your device malicious code that can spread, including to your company network.
Take a moment and reflect on these five tips before downloading any app:
- When in doubt, check it out. Ask other users before downloading it. Visit the store’s main website to see if it’s mentioned there. Find out from customer support if it’s the real McCoy.
- If you do decide to download an app, first check reviews. Apps with few reviews or bad reviews are throwing down a red flag.
- Never, EVER click a link in an e-mail to download an app. Get it from the retailer’s website, or from iTunes or Google Play.
- Offer as little of your information as possible if you decide to use an app.
- Think twice before linking your credit card to any app.
Most importantly, get professional help to keep your network safe. It really is a jungle out there. New cyberscams, malware and other types of network security threats are cropping up every day. You have more important things to do than to try and keep up with them all.
The Most “Bullet-Proof” Way To Keep Your Network Safe
Let’s not let your company become yet another statistic, hemorrhaging cash as a result of a destructive cyber-attack. Call me TODAY at (610) 628-2470, or e-mail me at firstname.lastname@example.org, and let’s make sure your systems are safe. I’ll provide you with a Cyber Security Risk Assessment to check for and safeguard against any points of entry for an attack. This service is FREE, but DO NOT RISK WAITING: contact me NOW before the next scam puts your network at risk.
Help Us Out And We’ll Give You A Brand-New Kindle Fire For Your Trouble
We love having you as a customer and, quite honestly, wish we had more like you! So instead of just wishing, we’ve decided to hold a special “refer a friend” event during the month of February.
Simply refer any company with 10 or more computers to our office to receive a FREE Computer Network Assessment (a $397 value). Once we’ve completed our initial appointment with your referral, we’ll rush YOU a free Kindle Fire of your choice as a thank-you.
Simply call us at 610-433-1000or e-mail us at Help@ET-T.com with your referral’s name and contact information today!
Mevo Puts You In The Director’s Chair
A single static video camera can make for some pretty boring sto- rytelling...but who’s got multiple cameras, a crew to run them and a team of editors?
Well, now your videos can look like you have an entire crew be- hind the scenes, with Mevo. Mevo is a new type of video camera and app that lets you shoot and edit multiple video shots on the fly,
all while recording and/or lives- treaming.
Let’s say you’re shooting a band concert. You get to mix in shots of the guitarist, the drummer and bass player together, and
a wide-angle view of the whole band. Plus Mevo follows their faces as they move around so you don’t have to. You just sit back, and cut and zoom on the fly.
On the downside, Mevo’s battery lasts only an hour, and image quality is limited to mobile viewing. Still, with all the cool possibilities you get with Mevo, you may start getting ideas about becoming the next Spielberg. GetMevo.com
Smart Closing Technique, Step 2
By Dr. Geoff Smart
Let’s say you’re closing a deal and you’ve already taken the first step: you’ve summarized the client’s underlying need...
Now you’re ready for Step 2: Say what you plan to do.
Describe exactly what you’ll do to help the client successfully satisfy their underlying need. Even smart people worry about putting themselves out there by offering a plan. They worry that someone may disagree with them. They worry about proposing a plan that doesn’t work. That’s why many advisors stay “safely vague” rather than offering a specific plan.
But being vague doesn’t help leaders solve some of their biggest problems. You have to have the courage to propose a plan. For example: “I have some ideas about how you can achieve your goals. Want to hear them?”
“Yes!” (the client says, while taking out a notebook and a pen).
“There are five parts to what I think you need to do, in this order. They are designed to increase your power score, starting with priorities, who is on your team and relationships. First, there is no way you are going to be able to take the company in a whole new strategic direc- tion without the board’s support.”
“So first we have to articulate your vision and your priorities on paper, with goals and strategy and budget implications, and then get the board’s support.”
“Right, it’s going to change our budget, so rather than let the board nix it this fall, I
should get out in front of this and get their support from the beginning.”
“Second, you seem to have questions about the capabilities of many of the key leaders in the US, Europe and in your Asia region. It would be helpful to assess your team, to have a clear view of who is going to fit in the new organization, and who is not a fit.”
“Yes, that would be helpful—to have an X- ray of the org chart and figure out who needs to go where to align with the new strategy.”
“Third, fourth and fifth will be all about culture change. Change the incentives. Change the meeting cadences of what metrics are tracked and discussed—who meets when to discuss what. And what some of our most successful clients have done in situations like this is design work- shops—like a roadshow—for you and key leaders to educate and train the next two levels on what you expect from them, and why, in the new world order. This gets the troops aligned behind your new vision.”
“Wow! Yes, yes and yes.”
“And even if you do all of that, I only give it a 70% chance you will fully actualize your goal within three years—in the mar- ket and culturally. Still, that’s a lot better than the 5% chance you give yourself today.”
“I’d take 70% over 5%.”
Now that you’ve stated your plan, you are in a much better position to close the deal.
Your phone may be spying on you, warns Edward Snowden. While TV is a medium you watch, the Internet is a medium that watches you, as you watch… For example, intelligence agencies—or anyone else, for that matter—can run a nifty little piece of malware called “Nosey Smurf” on your phone to listen in on everything going on all around you. And it’s not just phones. Internet-enabled devices—from Amazon’s Echo to your new toaster—can have “ears,” waiting for your command…or be used for more nefarious purposes. Snowden’s warnings presaged last year’s DDoS attack on DNS host Dyn that used connected devices like DVRs and even baby monitors to take down major sites like Twitter, Spotify and Amazon. Forbes, 16.11.02
This simple, 30-second breathing exercise wakes you up like a cup of coffee. Whether you skip caffeine to get a better night’s rest, or just wake up slowly, here’s a quick way to activate your brain and give yourself an energy boost. It can help you beat that mid-afternoon slump, or to just get going in the morning. If you’re doing it in the office, find a quiet place, like an unused corner or stairwell. Stand up straight, arms gently at your sides. Leaving your elbows pointing down, raise your hands up to shoulder level. Now, inhale deeply and raise your hands and arms straight up over your head. Quickly exhale and lower your arms. Repeat for 30 seconds, or until you’re re-energized. Lifehacker, 11.28.16
No bigger than a water bottle when folded, this “personal drone” is packed with features. DJI’s new “pro-sumer” drone, the Mavic Pro, crams lots of excitement into its compact size. Unlike other, more confusing foldable drones, it’s a snap to fold or unfold. Yet, at $999, including a light yet rugged remote, it’s not just a toy. The Mavic Pro can climb at 16.4 feet per second up to 1,640 feet, and can fly as far as eight miles away at speeds up to 40 mph, though you’ll start in newbie mode, at a top speed of 27 mph and max height of 400 feet. Its camera features obstacle detection and gesture recognition, and shoots 4K video, stored or streamed. Mashable, 11.22.16
Uh-oh…these AI machines just created their own secret language. And they’re probably talking about us right now… Well, sort of. And the last part is certainly not true. As far as we know… Google’s AI team recently ran across something curious. Back in September, Google announced its Neural Machine Translation system had gone live. Using deep learning, it improves translation from one language to another. But the AI guys decided to take it a step further. Until then, they had to teach the machine how to translate. But having learned the process, could the machines then translate unfamiliar languages on their own? Turns out they can. So can they now talk among themselves? We don’t know… Don’t panic (yet), but do stay tuned. TechCrunch.com 11.22.16
Get a downloadable copy of this Newsletter HERE.