Why Schools Need to Extend Quarantine to the Virtual Classroom

As an educator, you might be interested to know that Merriam-Webster Dictionary defines quarantine as,“a restraint upon the activities or communication of persons or the transport of goods designed to prevent the spread of disease.” As a person living in the year 2020, you know it in practice all too well. Since COVID-19 caught the world off-guard, we’ve been sheltering in place, only interacting with a few trusted members of our social circle in-person and holding everything from work meetings to weddings online. Your school has fully embraced the new normal. You’re implementing policies that will bring all of the…

READ MORE

The New Normal COVID-19 Office Security

With continued WFH policies and multiplied COVID-19 scams and threats, the importance of good cyber security stands out. Indeed, with a workforce that is highly dependent on digital services for the foreseeable future, the new normal COVID-19 office security is necessarily stronger, more vigilant, and more dispersed. Yet, a lot of questions remain unanswered. For example, will behavioral surveillance be part of the new normal? As organizations plan to implement contact tracing, privacy advocates voice their concerns. Given the uncertainty, we expect to see these non-intrusive measures with clearly defined benefits coming to the new normal. Thermal Cameras for Passive…

READ MORE

How to Deploy Two-Factor Authentication

used with permission from HP [email protected] Put those passwords in their place Cybercrime is constantly on the rise. It seems like every quarter there is a new breach of a major website, with hackers stealing the online credentials of hundreds of thousands to millions of unwitting users, including small businesses. A Poneman Institute study showed that the average cost of a data breach increased from $7.91 million in 2018 to $8.19 million in 2019 which is the highest cost globally. Passwords offer one level of protection. But for a deeper level of protection, you also need two-factor authentication. Two-factor authentication…

READ MORE