tag:blogger.com,1999:blog-53884862420162204022024-03-13T10:08:38.962-07:00Trustwire BlogTrustwire gives you strong end-to-end encryption while keeping it simple to use.Trustwirehttp://www.blogger.com/profile/12820073594704103422noreply@blogger.comBlogger52125tag:blogger.com,1999:blog-5388486242016220402.post-38269416383629001602020-10-28T10:26:00.005-07:002020-10-29T09:38:22.251-07:00Secure File Sharing for Insurance and Health Care Professionals<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:site" content="@MyTrustwire">
<meta property="og:site_name" content="Trustwire">
<meta property="og:title" content="Secure File Sharing for Insurance and Health Care Professionals">
<meta property="og:image" content="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgXwynmPR7InVkWKc6Ej5s80I-GheGtn1osklkmJYy1X2Yau6UuSZeQNHCXN1No-D8bznoI62oYw6NmJ539WIRNgo4ARddx-vbpQdR-cWs9Zv2G0mf4_SivKqXWZtoduQYT3zPZkG4QpQz/s2536/markting-image-20201029.jpeg">
<meta property="og:description" content="Medical practices and insurance companies use file sharing to store, share, and protect important information in the cloud. Health care professionals are often handling extremely sensitive patient data. Choosing trustworthy, cloud-based, file-sharing services are critical. ">
<meta content="summary_large_image" name="twitter:card"></meta><div><div class="MsoNormal"><div class="separator" style="clear: both; text-align: center;"><br /></div><div><div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgXwynmPR7InVkWKc6Ej5s80I-GheGtn1osklkmJYy1X2Yau6UuSZeQNHCXN1No-D8bznoI62oYw6NmJ539WIRNgo4ARddx-vbpQdR-cWs9Zv2G0mf4_SivKqXWZtoduQYT3zPZkG4QpQz/s2536/markting-image-20201029.jpeg" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="1240" data-original-width="2536" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgXwynmPR7InVkWKc6Ej5s80I-GheGtn1osklkmJYy1X2Yau6UuSZeQNHCXN1No-D8bznoI62oYw6NmJ539WIRNgo4ARddx-vbpQdR-cWs9Zv2G0mf4_SivKqXWZtoduQYT3zPZkG4QpQz/w640-h312/markting-image-20201029.jpeg" width="640" /></a></div><br /><div><br /></div><div><br /></div><div><br /></div><div><br /></div><div><br /></div><div><br /></div><div><br /></div><div><br /></div><div><br /></div><div><br /></div><div><br /></div><div><br /></div><div><br /></div><div><br /></div><div><br /></div><div><div>Medical practices and insurance companies use file sharing to store, share, and protect important information in the cloud. Health care professionals are often handling extremely sensitive patient data. Choosing trustworthy, cloud-based, file-sharing services are critical. </div><div><br /></div><div>Depending on where you live, some file storage may not be eligible to store, share, or transfer Electronic protected health information (ePHI).</div></div></div><br /></div></div><h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;"><span style="font-size: large;">Understanding Data Protection Regulations:</span></h2><div class="MsoNormal"><div class="MsoNormal"><div class="MsoNormal">PIPEDA - The Personal Information Protection and Electronic Documents Act is a Canadian law that governs how private sector institutions gather, use, and disclose personal information. </div><div class="MsoNormal"><br /></div><div class="MsoNormal">HIPAA - The Health Insurance Portability and Accountability Act is a federal law in the United States that requires national standards to protect sensitive patient health information. </div><div class="MsoNormal"><br /></div><div class="MsoNormal">GDPR - The General Data Protection Regulation is a regulation in the European Union that addresses personal data transfer. </div><div class="MsoNormal"><br /></div><div class="MsoNormal">Not all cloud file storage is HIPAA, PIPEDA, or GDPR compliant. We’ve created a list of the top four compliant file-sharing tools for insurance and health care professionals.</div></div></div><div><div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;"><br /></div><div class="MsoNormal"><h2 style="font-family: "PingFang TC"; font-size: medium; line-height: normal;"><span face="" style="font-size: large;">OneDrive for Business</span></h2><div class="MsoNormal"><div class="MsoNormal" style="font-family: "PingFang TC"; font-size: medium;">OneDrive for Business is HIPAA compliant and GDPR compliant. Many healthcare providers and organizations prefer OneDrive to manage their documents safely, both offline and online. OneDrive also encrypts data when in transit and when at rest. Keep in mind Microsoft requires businesses to commit to a one-year minimum when they purchase the Office 365 Essentials package.</div><div class="MsoNormal" style="font-family: "PingFang TC"; font-size: medium;"><br /></div><div class="MsoNormal"><h2 style="font-family: "PingFang TC"; font-size: medium; line-height: normal;"><span face="" style="font-size: large;">Box</span></h2><div class="MsoNormal"><div class="MsoNormal">Box is GDPR compliant and HIPPA compliant. This tool allows organizations to share large files safely. File sharing in Box uses multi-layered encryption for optimal protection. Another feature on Box is the large number of integrations the platform supports. This helps businesses update info across various applications, like Trello, Oracle Marketing Cloud, Adobe, Zendesk, RingCentral, Salesforce, and HootSuite - to name a few. The software is available for Mac and PC. The box is also mobile-friendly, but keep in mind there is no Linux support.<br /><br /><h2 style="font-size: medium; line-height: normal;"><span face="" style="font-size: large;">Hushmail</span></h2><div class="MsoNormal"><div class="MsoNormal"><div class="MsoNormal">Hushmail is an encrypted web-based email service. Insurance and health care professionals often communicate sensitive information via email. Hushmail is GDPR, HIPAA, and PIPEDA compliant. They provide a secure, private, encrypted email service to individuals and businesses around the globe, making sending emails overseas safer and easier. Hushmail is compliant with the top three privacy laws that govern their customers’ personal data. Hushmail can convey authenticated, encrypted messages in both directions, making sharing, and receiving emails a breeze.</div><div class="MsoNormal"><br /></div><div class="MsoNormal"><h2 style="font-size: medium; line-height: normal;"><span face="" style="font-size: large;">Sync</span></h2><div class="MsoNormal"><div class="MsoNormal"><div class="MsoNormal">Sync is a HIPAA & GDPR compliant cloud and file storage service. They cater to personal users and small healthcare clinics or businesses. One great thing about them is that, unlike other services, HIPAA/ GDPR is available even for the free personal plan. Their plans for healthcare professionals are cost-friendly and ideal for smaller businesses. Some of the top features include multiple user support, password protected sharing, offline file support, end-to-end encryption, secure link generation for file sharing, activity logs and more. While some of their features are only available in the premium option, many agree it’s worth the price for the peace of mind.</div></div></div></div></div></div></div><div class="MsoNormal" style="font-family: "PingFang TC"; font-size: medium;"><br /></div></div></div></div></div><div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;"><br /></div><div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div><br /></div><div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;"><br /></div><div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;"><br /></div><div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;"><br /></div><!--EndFragment--></div></div>Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-48080987312001500842020-10-23T11:05:00.007-07:002020-10-23T11:43:39.525-07:00Top 5 Must-Have Tools for Professional Journalists<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:site" content="@MyTrustwire">
<meta property="og:site_name" content="Trustwire">
<meta property="og:title" content="Top 5 Must-Have Tools for Professional Journalists">
<meta property="og:image" content="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOu-jirSNcEPAVNq1Husy-TBhgEsN1tq450-CwGRsACpCQtDlPlV-BRw8M5Vm0WaNDgJ2hi3arfM7W3h93ZozXGhz5G6l1nbvMGzEvvOr0bTz9ckwUlIVwkRFvCmo_Zkmu_DSxzmz3LdZO/s2536/Marketing-design-202001030.jpg">
<meta property="og:description" content="Capturing a story is challenging. Newshounds have to take into consideration multiple moving pieces before they can publish an article. Luckily, it’s not 1940 anymore, and today’s journalists have a slew of apps, tools, and sites that make the job easier.
Whether you need a tool to help with brainstorming, security, organization, research, or visuals, here are five journalism tools you won’t want to be without.">
<meta content="summary_large_image" name="twitter:card"></meta>
<meta content="@MyTrustwire" name="twitter:site"></meta>
<meta content="Trustwire" property="og:site_name"></meta>
<meta content="How to Protect Your Business Trade Secrets From Being Stolen " property="og:title"></meta>
<meta content="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnt86h37GPcC7-pyIu1MHV47Y57xxblzz0qA2FTJu158eqfbf1HWTbp7QH8TvMw6bhJMbd9v2SsqWQeRfgTfoF5V1MUdmonB2mUnu-qkinOa89Tgc8wiAqZR7RcLael9oznfyG8D6771Pr/s2536/Marketing-design-202000927.jpg" property="og:image"></meta>
<meta content="Are you familiar with the Waymo v. Uber trade secrets case? An employee took 14,000 documents containing sensitive data, which resulted in a US$1.859 billion claim and a settlement of around US$245 million. How could something like this happen? Especially with companies of this caliber? Waymo stated they had been following sufficient security precautions to protect trade secrets. Things like encryption, security cameras, and confidentiality agreements. Of course, as the case would show, that wasn’t enough. " property="og:description"></meta>
<br /><div><div class="MsoNormal"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOu-jirSNcEPAVNq1Husy-TBhgEsN1tq450-CwGRsACpCQtDlPlV-BRw8M5Vm0WaNDgJ2hi3arfM7W3h93ZozXGhz5G6l1nbvMGzEvvOr0bTz9ckwUlIVwkRFvCmo_Zkmu_DSxzmz3LdZO/s2536/Marketing-design-202001030.jpg" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="1240" data-original-width="2536" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOu-jirSNcEPAVNq1Husy-TBhgEsN1tq450-CwGRsACpCQtDlPlV-BRw8M5Vm0WaNDgJ2hi3arfM7W3h93ZozXGhz5G6l1nbvMGzEvvOr0bTz9ckwUlIVwkRFvCmo_Zkmu_DSxzmz3LdZO/w640-h312/Marketing-design-202001030.jpg" width="640" /></a></div><div class="separator" style="clear: both; font-family: "PingFang TC"; font-size: medium; text-align: center;"><br /></div><div style="font-family: "PingFang TC"; font-size: medium;"><br /></div><div><div><div>Remember the time when the only tools a journalist needed were a pencil and a notepad? </div><div><br /></div><div>Capturing a story is challenging. Newshounds have to take into consideration multiple moving pieces before they can publish an article. Luckily, it’s not 1940 anymore, and today’s journalists have a slew of apps, tools, and sites that make the job easier. </div><div>Whether you need a tool to help with brainstorming, security, organization, research, or visuals, here are five journalism tools you won’t want to be without.</div></div><br /></div></div><h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;"><span style="font-size: large;">1. Pocket</span></h2><div class="MsoNormal" style="font-family: "PingFang TC"; font-size: medium;"><div class="MsoNormal">The Pocket App makes saving articles, videos, and content from other publications, web pages, and apps simple. Think of it as your personal reading list. If you don’t have time to read an article as soon as you come across it or watch a video clip, save it for later. Pocket is available on iOS and Android devices, plus the base app is free!</div></div><div><div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;"><br /></div><div class="MsoNormal"><h2 style="font-family: "PingFang TC"; font-size: medium; line-height: normal;"><span face="" style="font-size: large;">2. Trustwire</span></h2><div class="MsoNormal"><div class="MsoNormal" style="font-family: "PingFang TC"; font-size: medium;">Part of being a journalist is sharing and receiving sensitive information online. Cyber threats are at an all-time high. Share documents securely with Trustwire. Trustwire allows a reporter or source to send and collect information safely, even in high-risk environments. All files shared via Trustwire are encrypted, meaning only the file owner and the rightful recipient will be able to see it.</div><div class="MsoNormal" style="font-family: "PingFang TC"; font-size: medium;"><br /></div><div class="MsoNormal"><h2 style="font-family: "PingFang TC"; font-size: medium; line-height: normal;"><span face="" style="font-size: large;">3. Representation Matters</span></h2><div class="MsoNormal"><div class="MsoNormal">As a journalist, visuals are likely a huge part of your day job. You may be familiar with other stock image libraries like Pixabay, Shutterstock, or Pexels. While those are all great tools to source images, Representation Matters is an all-inclusive stock image library. They focus on diverse and inclusive photos with themes, including body positivity, disabilities, LGBT, and more.<br /><br /><h2 style="font-size: medium; line-height: normal;"><span face="" style="font-size: large;">4. Echosec</span></h2><div class="MsoNormal"><div class="MsoNormal"><div class="MsoNormal">Echosec is a free online app that allows users to generate location-based social media data from the most popular social networks. If you work at a local level, this tool can help fill your pages or create website copy as you get info from events as they unfold in real-time. For example, Echosec allows users to concentrate on an area on a map where it will then provide you with a list of Tweets (or other social media posts) that have been made from that area. The free version offers Twitter data, but if you invest in the premium version, you get results from other platforms like Instagram and YouTube.</div><div class="MsoNormal"><br /></div><div class="MsoNormal"><h2 style="font-size: medium; line-height: normal;"><span face="" style="font-size: large;">5. Hemingway</span></h2><div class="MsoNormal"><div class="MsoNormal"><div class="MsoNormal">Part of being a great journalist is captivating an audience with words. The Hemingway App makes your writing bold and clear. This tool highlights common errors, complex sentences, and lengthy or hard-to-understand sentences in your typing. The text is color-coded to make things as simple as possible. If a sentence is highlighted in yellow, it’s too long, and if it has a red highlight, it’s too hard to read. Journalists can appeal to a broader audience with high-quality, user-friendly text. This online app is free, but a paid premium version is also available.</div></div></div></div></div></div></div><div class="MsoNormal" style="font-family: "PingFang TC"; font-size: medium;"><br /></div></div></div></div></div><div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;"><br /></div><div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div><br /></div><div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;"><br /></div><div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;"><br /></div><div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;"><br /></div><!--EndFragment--></div></div>Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-65271611919222376802020-09-23T05:26:00.005-07:002020-09-25T00:27:28.035-07:00How to Protect Your Business Trade Secrets From Being Stolen <meta name="twitter:card" content="summary_large_image">
<meta name="twitter:site" content="@MyTrustwire">
<meta property="og:site_name" content="Trustwire">
<meta property="og:title" content="How to Protect Your Business Trade Secrets From Being Stolen ">
<meta property="og:image" content="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnt86h37GPcC7-pyIu1MHV47Y57xxblzz0qA2FTJu158eqfbf1HWTbp7QH8TvMw6bhJMbd9v2SsqWQeRfgTfoF5V1MUdmonB2mUnu-qkinOa89Tgc8wiAqZR7RcLael9oznfyG8D6771Pr/s2536/Marketing-design-202000927.jpg">
<meta property="og:description" content="Are you familiar with the Waymo v. Uber trade secrets case? An employee took 14,000 documents containing sensitive data, which resulted in a US$1.859 billion claim and a settlement of around US$245 million. How could something like this happen? Especially with companies of this caliber? Waymo stated they had been following sufficient security precautions to protect trade secrets. Things like encryption, security cameras, and confidentiality agreements. Of course, as the case would show, that wasn’t enough. ">
<br><div><div class="MsoNormal"><div><div class="separator" style="clear: both; font-family: "PingFang TC"; font-size: medium; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnt86h37GPcC7-pyIu1MHV47Y57xxblzz0qA2FTJu158eqfbf1HWTbp7QH8TvMw6bhJMbd9v2SsqWQeRfgTfoF5V1MUdmonB2mUnu-qkinOa89Tgc8wiAqZR7RcLael9oznfyG8D6771Pr/s2536/Marketing-design-202000927.jpg" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="1240" data-original-width="2536" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnt86h37GPcC7-pyIu1MHV47Y57xxblzz0qA2FTJu158eqfbf1HWTbp7QH8TvMw6bhJMbd9v2SsqWQeRfgTfoF5V1MUdmonB2mUnu-qkinOa89Tgc8wiAqZR7RcLael9oznfyG8D6771Pr/w640-h312/Marketing-design-202000927.jpg" width="640" /></a></div><div style="font-family: "PingFang TC"; font-size: medium;"><br /></div><div style="font-family: "PingFang TC"; font-size: medium;"><br /></div><div style="font-family: "PingFang TC"; font-size: medium;"><br /></div><div style="font-family: "PingFang TC"; font-size: medium;"><br /></div><div style="font-family: "PingFang TC"; font-size: medium;"><br /></div><div style="font-family: "PingFang TC"; font-size: medium;"><br /></div><div style="font-family: "PingFang TC"; font-size: medium;"><br /></div><div style="font-family: "PingFang TC"; font-size: medium;"><br /></div><div style="font-family: "PingFang TC"; font-size: medium;"><br /></div><div style="font-family: "PingFang TC"; font-size: medium;"><br /></div><div style="font-family: "PingFang TC"; font-size: medium;"><br /></div><div style="font-family: "PingFang TC"; font-size: medium;"><br /></div><div style="font-family: "PingFang TC"; font-size: medium;"><br /></div><div style="font-family: "PingFang TC"; font-size: medium;"><br /></div><div style="font-family: "PingFang TC"; font-size: medium;"><br /></div><div><div>Are you familiar with the Waymo v. Uber trade secrets case? An employee took 14,000 documents containing sensitive data, which resulted in a US$1.859 billion claim and a settlement of around US$245 million. How could something like this happen? Especially with companies of this caliber? Waymo stated they had been following sufficient security precautions to protect trade secrets. Things like encryption, security cameras, and confidentiality agreements. Of course, as the case would show, that wasn’t enough. </div><div><br /></div><div>A Waymo competitor likely obtained access to Waymo’s information. During the court hearings, Waymo had to explain the measures they used were consistent with the Defend Trade Secrets Act (DTSA). Yet, somehow over 14,000 documents filled with sensitive data were leaked. </div><div>The question we have to be asking ourselves here is: How can a company take “reasonable measures” to satisfy DTSA requirements and protect it against theft of trade secrets?</div><div>Here are some ways that can help your business trade secrets from ending up in the wrong hands.</div><br /></div></div></div><h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;"><span style="font-size: large;">Identify and mark your trade secrets:</span></h2><div class="MsoNormal" style="font-family: "PingFang TC"; font-size: medium;"><div class="MsoNormal">One way to protect a company’s trade secret is to understand what information is considered to be (and should be) guarded as a trade secret. What information requires secrecy? Once an institution can establish this, the information should be deemed a trade secret, identified, and marked confidential.</div></div><div><div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;"><br /></div><div class="MsoNormal"><h2 style="font-family: "PingFang TC"; font-size: medium; line-height: normal;"><span face="" style="font-size: large;">Limit and track access to trade secret information:</span></h2><div class="MsoNormal"><div class="MsoNormal" style="font-family: "PingFang TC"; font-size: medium;">As soon as trade secrets are marketed, access must be immediately restricted. Limit the disclosure of the information only to the people “need to know” it to perform their tasks adequately. Not sure how to control access? Taking precautionary steps like physical security, passwords, encryption, and data segregation are the best ways to start. We saw a good example of this after the Waymo case played out. Waymo employees who were working on projects unrelated to self-driving cars were prevented from obtaining the information they did not need to know.</div><div class="MsoNormal" style="font-family: "PingFang TC"; font-size: medium;"><br /></div><div class="MsoNormal"><h2 style="font-family: "PingFang TC"; font-size: medium; line-height: normal;"><span face="" style="font-size: large;">How to manage secret information:</span></h2><div class="MsoNormal"><div class="MsoNormal">Yes, you can take initial proactive steps to protect trade secret information, and that’s a great start! But now, you have to be mindful that continuing to manage the trade secrets is critical. Some steps to secure information like password-protected servers and folders, and employing a third-party internet security company to protect its servers from outside hacking is a great way to keep your info safe.<br /><br /><h2 style="font-size: medium; line-height: normal;"><span face="" style="font-size: large;">Sharing sensitive information:</span></h2><div class="MsoNormal"><div class="MsoNormal"><div class="MsoNormal">Companies and individuals will inevitably have to send and share confidential information over the internet. Especially since the COVID-19 pandemic. People don’t have the option to hand-deliver files anymore. <a href="https://www.trustwire.com/" rel="nofollow" target="_blank">Trustwire</a> is a platform that allows users to send and receive files online without the risks. Using end-to-end encryption, only the rightful receiver of the file will gain access to it. No one else, including <a href="https://www.trustwire.com/" rel="nofollow" target="_blank">Trustwire</a>, will be given access to view the file. </div><div class="MsoNormal"><br /></div><div class="MsoNormal">When you need to keep your private information safe on the internet, trust <a href="https://www.trustwire.com/" rel="nofollow" target="_blank">Trustwire</a>.</div></div></div></div><div class="MsoNormal" style="font-family: "PingFang TC"; font-size: medium;"><br /></div></div></div></div></div><div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;"><br /></div><div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div><br /></div><div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;"><br /></div><div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;"><br /></div><div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;"><br /></div><!--EndFragment--></div></div>Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-42723031360744036572020-09-19T13:16:00.006-07:002020-09-19T13:57:53.878-07:00Privacy in The Era of Big Data <meta content="summary_large_image" name="twitter:card"></meta>
<meta content="@MyTrustwire" name="twitter:site"></meta>
<meta content="Trustwire" property="og:site_name"></meta>
<meta content="Privacy in The Era of Big Data" property="og:title"></meta>
<meta content="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZIijMO3n0EqP0590OR4aZi-zE1Xz5oEKfepE6ZOr5eJiaOXjtC1UmNxskuBUPlBGD3FXOltsLuern2FBCSfyFW4EpyDNgfTv5xbZkOJSCkTr5xrAheLxQX79pRXqOWierlk1RD-1jTuyM/s2536/Marketing-design-202000920.jpg" property="og:image"></meta>
<meta content="Let’s face it. We live in a world where practically everything we do is being monitored and saved on the internet. Yes, we have access to tech devices that make our lives so much easier, and they come cheap. But what people tend to overlook when they’re browsing the web, downloading the new “it” app, or even sending a selfie to their friends is that they may not be as protected as they may think. When was the last time you read a company’s privacy policy or the T&C page? If you can’t answer, you’re not alone. Data protection and privacy are some of the most underrated acts of personal security." property="og:description"></meta>
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal">
<div style="text-align: left;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh06Gui1AER0aSs6j5Xab8pGLSG2KX7tHpbOyF41T1aF2820ZYLvSXK-TJh6ruWpaNwYNtV7zoKlTVWGcrNoCF3tfLxU7PMMDJlDxvzkZwy13yIKYA3VthMeyfj0QrDBcIy8LFLo0knuwuc/s2536/Marketing-design-202000920.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="1240" data-original-width="2536" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh06Gui1AER0aSs6j5Xab8pGLSG2KX7tHpbOyF41T1aF2820ZYLvSXK-TJh6ruWpaNwYNtV7zoKlTVWGcrNoCF3tfLxU7PMMDJlDxvzkZwy13yIKYA3VthMeyfj0QrDBcIy8LFLo0knuwuc/w640-h312/Marketing-design-202000920.jpg" width="640" /></a></div><br /><div><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Let’s face it. We live in a world where practically everything we do is being monitored and saved on the internet. Yes, we have access to tech devices that make our lives so much easier, and they come cheap. But what people tend to overlook when they’re browsing the web, downloading the new “it” app, or even sending a selfie to their friends is that they may not be as protected as they may think. When was the last time you read a company’s privacy policy or the T&C page? If you can’t answer, you’re not alone. Data protection and privacy are some of the most underrated acts of personal security.<br /><br /></div></div></div>
<h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Do you know how valuable your data is?</span></h2>
<div class="MsoNormal"><div class="MsoNormal">While you may think you’re just another user in the pool of thousands, brands do whatever it takes to find out more about you, your browsing habits, and even your spending history. Machine learning has enabled companies to learn things about you, like where you tend to shop, your personal contact information, and where you’re geographically located. Sounds invasive, right? Consumers must be aware of how valuable their data is, and companies must start being more transparent with their audience about their business models. Shouldn’t consumers be offered a fair and transparent trade for data about THEM?</div></div>
<div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal">
<h2 style="line-height: normal;"><span face="" style="font-size: large;">Government’s are exploiting user data:</span></h2>
<div class="MsoNormal"><div class="MsoNormal">While we may not be entirely shocked to learn that corporate institutions are exploiting user data for their own gain, did you know that governments are doing it as well? Unfortunately, cases of identity theft are rapidly growing in developing countries. Governments who should be educating their citizens on proper data protection are instead abusing user data for their own benefits without proper consent or acknowledgment. Until appropriate laws, rules, regulations, and sensitization concerning data protection are put in place; people are at a loss. Legislation should be used to help serve their community; instead, government officials are using it for personal and financial gain. People all around the globe are simply not told about the dangers of having their information stolen. And it seems like the governments in some countries are hoping to keep it that way.</div><div class="MsoNormal"><br /></div><div class="MsoNormal"><h2 style="line-height: normal;"><span face="" style="font-size: large;">Trustwire can help keep you protected:</span></h2><div class="MsoNormal"><div class="MsoNormal">Everyday people online are unknowingly exposing themselves to cases of identity theft and data fraud. With the lack of rules and regulations concerning data protection laws in most countries, people are forced to take matters into their own hands. There’s a severe lack of consequences for the mishandling of private or personal information. <a href="https://www.trustwire.com/" rel="nofollow" target="_blank">Trustwire</a> is tool businesses and individuals can use to ensure the data they share over the internet remains safe. Using end-to-end encryption, all files sent through Trustwire are protected from vicious internet predators.</div><div class="MsoNormal"><br /></div><div class="MsoNormal">Identity theft is at an all-time high. How do you know you’re not giving hackers exclusive access to your most sensitive information? With <a href="https://www.trustwire.com/" rel="nofollow" target="_blank">Trustwire</a>, never fear your personal information being in the hands of the wrong people.</div><div class="MsoNormal"><br /></div></div></div></div>
</div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<!--EndFragment--><br /></div>
Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-35130468245801491142020-08-27T09:54:00.006-07:002020-08-27T10:04:26.325-07:00The top 5 Best Startup Tools for 2020<meta content="summary_large_image" name="twitter:card"></meta>
<meta content="@MyTrustwire" name="twitter:site"></meta>
<meta content="Trustwire" property="og:site_name"></meta>
<meta content="The top 5 Best Startup Tools for 2020" property="og:title"></meta>
<meta content="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhb9OICG7yl4eBGEyc9mGMq2Or0ZRDWP0xLDKuxT3Fg8TYvwdXfHLsMMY5N6UbrqYQbHNzvxXVc_cmTWzb4GbwbT5JpgjOZ86ngC-yzvapaP83wfVH4OZU2X5leIhI0LOG70heoiW-D7fJ7/s2536/Marketing-design-202000825.jpg" property="og:image"></meta>
<meta content="Startups need to be fully equipped with the proper tools in their arsenal to survive in the highly-competitive industry. With limited resources (specifically money and time), startup founders seek help from security, accounting, and team management tools online. Luckily, three are plenty of tools that help minimize startup costs and help save a new entrepreneur’s precious time. " property="og:description"></meta>
<meta content="summary_large_image" name="twitter:card"></meta><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhb9OICG7yl4eBGEyc9mGMq2Or0ZRDWP0xLDKuxT3Fg8TYvwdXfHLsMMY5N6UbrqYQbHNzvxXVc_cmTWzb4GbwbT5JpgjOZ86ngC-yzvapaP83wfVH4OZU2X5leIhI0LOG70heoiW-D7fJ7/s2536/Marketing-design-202000825.jpg" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="1240" data-original-width="2536" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhb9OICG7yl4eBGEyc9mGMq2Or0ZRDWP0xLDKuxT3Fg8TYvwdXfHLsMMY5N6UbrqYQbHNzvxXVc_cmTWzb4GbwbT5JpgjOZ86ngC-yzvapaP83wfVH4OZU2X5leIhI0LOG70heoiW-D7fJ7/s640/Marketing-design-202000825.jpg" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal">
<div style="text-align: left;"><div>Startups need to be fully equipped with the proper tools in their arsenal to survive in the highly-competitive industry. With limited resources (specifically money and time), startup founders seek help from security, accounting, and team management tools online. Luckily, there are plenty of tools that help minimize startup costs and help save a new entrepreneur’s precious time. </div><div><br /></div><div>Now, business owners can significantly enhance efficiency with just a few great tools. Below are the top 5 tools and resources you can use to help make your landing into the startup world a little smoother.</div></div>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span></div>
<h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">1. Slack</span></h2>
<div class="MsoNormal"><div class="MsoNormal">Work better at home or in the office by organizing all of your projects in one comfortable place. Slack is an incredible communication tool for both groups and one-on-one chat flows. The app is an all-in-one meeting space that helps keep teams organized. It’s incredibly useful when working remotely as well! Slack allows users to categorize their conversations in “channels,” making relevant information quick and easy to find. If you’re working on the go, Slack also has a user-friendly mobile app and integrates with other tools like Trello and Twitter.</div></div>
<div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal">
<h2 style="line-height: normal;"><span face="" style="font-size: large;">2. Trello</span></h2>
<div class="MsoNormal"><div class="MsoNormal">Trello is a web-based project management tool that was built for improving workflow. It’s quickly becoming a household name among startups owners across the globe. This project management software allows project managers to organize multiple projects with specific tasks inside each project. This fast Kanban tool is for anyone who needs to capture, organize, and provide real-time insights regarding project status. Plus, it’s free! Trello is known for being ultra user-friendly, and the free plan offers all the tools and functionality a small startup needs.</div><div class="MsoNormal"><br /></div><div class="MsoNormal"><h2 style="line-height: normal;"><span face="" style="font-size: large;">3. Zoom</span></h2><div class="MsoNormal"><div class="MsoNormal">While Zoom may have gained worldwide popularity during 2020 because of COVID-19, it was actually ranked the #1 meeting tool by Gartner in 2018. The fast and reliable video conferencing software makes remote working a breeze. Startups and major corporations alike are relying on Zoom to conduct team meetings. To keep everyone in the loop, users can integrate Zoom with Slack to automatically share the recording with participants after the call ends.</div><div class="MsoNormal"><br /></div><div class="MsoNormal"><h2 style="line-height: normal;"><span face="" style="font-size: large;">4. BambooHR</span></h2><div class="MsoNormal"><div class="MsoNormal">BambooHR provides human resources software as a service. Brand new startups often ignore ‘corporate’ functions like HR - which is a big mistake. BambooHR is a handy online tool that makes hiring, transitioning, and recruiting a breeze. With onboarding tools and applicant tracking features, BambooHR users can easily keep track of potential applicants. The app also gives users the ability to track time-off, performance management, and e-signing.</div><div class="MsoNormal"><br /></div><div class="MsoNormal"><h2 style="line-height: normal;"><span face="" style="font-size: large;">5. Trustwire</span></h2><div class="MsoNormal"><div class="MsoNormal">Surely as a startup owner, you and your employees will need to send and receive multiple files. But did you know that cybersecurity risks are at an all-time high? Trustwire is an online tool to send and receive sensitive data safely. If you think sending files over email is safe, think again. Instead, use Trustwire to ensure no one other than the rightful receiver of a file will be able to open. All data is end-to-end encrypted, meaning Trustwire or any other third party can not access your data.</div></div></div></div></div></div></div></div>
</div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<!--EndFragment--><br /></div>
Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-82117658381052188432020-08-22T06:48:00.003-07:002020-08-27T09:47:55.091-07:00It Looks Like Remote Work is Here to Stay - Can You Use it to Your Advantage?<meta content="summary_large_image" name="twitter:card"></meta>
<meta content="@MyTrustwire" name="twitter:site"></meta>
<meta content="Trustwire" property="og:site_name"></meta>
<meta content="It Looks Like Remote Work is Here to Stay - Can You Use it to Your Advantage?" property="og:title"></meta>
<meta content="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFDHJb27cZ3Lj_Oc0o5xhjaN7uTFi2-iuw-v9kpJUl6NGepQbXohYUUs0Bzvbg-h_d75jDTtA8Hgc_A0SI1ZjZ7BkIIrCgKinokr0IOYleTPnhouaYXHVURfVCm8IwU4g2o3mkf5x16w3Q/s2536/Marketing-design-202000822.jpg" property="og:image"></meta>
<meta content="It wasn’t so long ago that remote work was out of the question for many industries. In 2020, things are taking a turn. Today, working from home or anywhere outside of the office is becoming the ‘norm.’ By the looks of it, this is the future of the modern workforce.
" property="og:description"></meta>
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFDHJb27cZ3Lj_Oc0o5xhjaN7uTFi2-iuw-v9kpJUl6NGepQbXohYUUs0Bzvbg-h_d75jDTtA8Hgc_A0SI1ZjZ7BkIIrCgKinokr0IOYleTPnhouaYXHVURfVCm8IwU4g2o3mkf5x16w3Q/s2536/Marketing-design-202000822.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="1240" data-original-width="2536" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFDHJb27cZ3Lj_Oc0o5xhjaN7uTFi2-iuw-v9kpJUl6NGepQbXohYUUs0Bzvbg-h_d75jDTtA8Hgc_A0SI1ZjZ7BkIIrCgKinokr0IOYleTPnhouaYXHVURfVCm8IwU4g2o3mkf5x16w3Q/s640/Marketing-design-202000822.jpg" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal">
<div style="text-align: left;"><div><div>It wasn’t so long ago that remote work was out of the question for many industries. In 2020, things are taking a turn. Today, working from home or anywhere outside of the office is becoming the ‘norm.’ By the looks of it, this is the future of the modern workforce. </div><div><br /></div><div>According to a <a href="https://www.nytimes.com/2014/03/08/your-money/when-working-in-your-pajamas-is-more-productive.html?_r=0" target="_blank">New York Times report</a>, working from another location other than the office or a client site is on the steady incline. </div><div><br /></div><div>So, what exactly are the benefits of remote work - and could you make it work to your advantage?</div></div></div>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span></div>
<h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Positive shifts in attitudes about work:</span></h2>
<div class="MsoNormal"><div class="MsoNormal">According to Bentley University, by 2025, millennials will make up around 75% of the global workforce. If there’s one thing that’s for sure when it comes to millennial work ethics, they’re very different from their boomer parents. Millennials are going to be shaping the work environment for years to come. This new generation of talent brings radically different expectations about the nature of work and how work should be done, when, and where it’s done. Not to say millennials don’t have a solid work ethic, they just have a different approach to working than previous generations. </div><div class="MsoNormal"><br /></div><div class="MsoNormal">What’s going to happen when the boomers begin to retire, and millennials take over in management roles? According to a <a href="https://www.pwc.com/gx/en/services/people-organisation/publications/workforce-of-the-future.html" target="_blank">PWC study,</a> a healthy work-life balance is their number one priority. Millennials want flexibility, and they’re willing to go to great lengths to get it. Remote work is essentially a dream come true for most millennials. They can still earn their paycheck and get their job done, all from the comfort of their own home. Today’s generation is so tech-focused that for many young workers being in an office for eight hours a day is actually counterproductive.</div></div>
<div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal">
<h2 style="line-height: normal;"><span style="font-family: arial, times, helvetica; font-size: large;">Remote work increases employee productivity lowers stress levels & boosts morale:</span></h2>
<div class="MsoNormal"><div class="MsoNormal">There is evidence that supports that employees working from home are more productive and work longer hours. One of the biggest woes anyone going to and from a job can attest to - it’s the daunting traffic jams and commutes back and forth five days a week. Eliminating a daunting commune, getting to sleep for an extra hour, and working alone are significant perks for many people. If an employee has a hard time focusing, working remotely should pose fewer distractions. Think about it, no talking, buzzing, and ringing noises that always seem to happen in any work environment. </div><div class="MsoNormal"><br /></div><div class="MsoNormal">Remote work also lowers stress. Whether employees stress is caused by being in the presence of their boss, other co-workers, or anything else for that matter, 82% of remote workers <a href="https://www.slideshare.net/PGi/state-of-telecommuting-2014-pgi-report/1" target="_blank">reported</a> lower stress levels. Remote workers are also reporting higher morale, and are taking fewer days off when working from home. </div><div class="MsoNormal"><br /></div><div class="MsoNormal">By the looks of it, working from home has its benefits for both the employers and the employees. Business owners can have big bucks on office spaces and electricity, while employees can work in their pajamas. Is this a win-win?</div><div class="MsoNormal"><br /></div></div>
</div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<!--EndFragment--><br /></div>
Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-92057312956334917222020-07-26T03:17:00.000-07:002020-07-26T03:38:21.875-07:00COVID-19 Period Surging Traffic Is Slowing Down Your Internet<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:site" content="@MyTrustwire">
<meta property="og:site_name" content="Trustwire">
<meta property="og:title" content="COVID-19 Period Surging Traffic Is Slowing Down Your Internet">
<meta property="og:image" content="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfFb3mmet1DjUsptO2EMiOspFLFn5i0zUilis6glcAvqnw_PMutSehyphenhyphenVw-D08fuq5NMkHUURf4xo5DxQJJDDq2ah5OX7ykpCYAtYKro8H_ag3UVc04Nywoat2KiNA2O5VC3zN0AQWPbnEH/s1600/Marketing-design-202007026.jpg">
<meta property="og:description" content="In January 2020, before the novel coronavirus spread its way around the world, China locked down several provinces to contain the virus. While people were forced to self-quarantine, naturally, much of their time was spent browsing the web. Average internet speeds in the country slowed as a surge of users logged online.
">
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfFb3mmet1DjUsptO2EMiOspFLFn5i0zUilis6glcAvqnw_PMutSehyphenhyphenVw-D08fuq5NMkHUURf4xo5DxQJJDDq2ah5OX7ykpCYAtYKro8H_ag3UVc04Nywoat2KiNA2O5VC3zN0AQWPbnEH/s1600/Marketing-design-202007026.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="783" data-original-width="1600" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfFb3mmet1DjUsptO2EMiOspFLFn5i0zUilis6glcAvqnw_PMutSehyphenhyphenVw-D08fuq5NMkHUURf4xo5DxQJJDDq2ah5OX7ykpCYAtYKro8H_ag3UVc04Nywoat2KiNA2O5VC3zN0AQWPbnEH/s640/Marketing-design-202007026.jpg" width="640" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal">
<div style="text-align: left;">
In January 2020, before the novel coronavirus spread its way around the world, China locked down several provinces to contain the virus. While people were forced to self-quarantine, naturally, much of their time was spent browsing the web. Average internet speeds in the country slowed as a surge of users logged online.<br />
<br />
By mid-February, when COVID-19 was running rampant throughout European cities in Italy, Germany, and Spain, internet speeds in these countries also began to worsen. As a slew of stay-at-home orders spread across the US, broadband speeds declined. Quarantines worldwide have made people more reliant on the internet to work, communicate, study, and keep entertained.</div>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span></div>
<h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Stress on Internet Infrastructure</span></h2>
<div class="MsoNormal">
YouTube, Zoom, Netflix, Facebook, and video gaming have risen to new heights globally, especially in Europe and the US. What does this mean for your internet speed? Will the new 'normal' slower internet have any effect on security?<br />
<br />
European countries asked major streaming services, like Netflix, to degrade their services to keep up with the wave of new users. In India, Australia, and Latin America, Netflix switched its high-definition video streams to a slightly lower quality to reduce traffic. YouTube committed to making all global streams standard definition.<br />
<br />
The US, however, decided to take another approach. The Federal Communications Commission granted Verizon, AT&T, and T-Mobile temporary access to more airwaves to try and support the slew of internet browsers.<span style="background-color: white;"> </span></div>
<div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal">
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Internet Providers, We're Not Prepared</span></h2>
<div class="MsoNormal">
Major service providers like Comcast, Vodafone, Verizon, and Telefónica have been working on improving their security, internet speeds, and building up their networks for years. While they did predict an increase in internet users, no one could have imagined such a steep, sudden rush of users. The increasing demand came as a surprise. Enrique Blanco, the CTO of Telefónica, a Spanish telecommunications company, said, "In just two days we grew all the traffic we had planned for 2020."<br />
<br />
Online gaming, video conferencing, and video calls have more than doubled since the start of the pandemic, while messages over WhatsApp, the free messaging platform owned by Facebook, more than quadrupled. All this extra traffic has slowed down internet networks, web pages, and apps.<br />
<br />
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Is There a Solution?</span></h2>
<div class="MsoNormal">
With most of the globe prepping for the "second wave" of COVID-19, many cities and states will likely reimplement shelter in place orders. More people are expected to be home, with not much to do other than using the internet for work and entertainment. Meaning, we can expect to see a lot more activity on a network.<br />
<br />
By the looks of it, until we have a cure for COVID-19, we may have to put up with slower internet speeds for the foreseeable future. Internet traffic hasn't been slowing down, and the demand is on the steady incline. While internet providers are doing all they can to ensure their users have access to all of their videos, apps, games, and messenger services, there really isn't a whole lot they can do to speed up the internet.</div>
<br /></div>
</div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<!--EndFragment--><br /></div>
Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-88695226204423919422020-07-19T03:40:00.001-07:002020-07-19T03:55:29.070-07:00Technology Giants Suspend the Processing of the Hong Kong Government's Request for User Data<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:site" content="@MyTrustwire">
<meta property="og:site_name" content="Trustwire">
<meta property="og:title" content="Technology Giants Suspend the Processing of the Hong Kong Government's Request for User Data">
<meta property="og:image" content="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVDnT9-XNq5GM2cyBv8izGWNdkNkeA24mVg9y7Gqqkio_Hw6w0JcnvZ3seFWmrvnK3XyWVo_isVKTdy0YSI1ahw3QypuSOWwpDAAoR-C3FM5r9cKzV6ft4ww8YfORUiUIhgMoUxhBLUFHm/s1600/Marketing-design-202007019.jpg">
<meta property="og:description" content="Google, Facebook, and Twitter announced they are evaluating China's new national security law for the city. We're witnessing major American tech companies question the Chinese policy - an extremely rare occurrence. The national security law was put in place to help suppress the anti-government demonstrations that have been on the rise in Hong Kong for more than a year.
">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVDnT9-XNq5GM2cyBv8izGWNdkNkeA24mVg9y7Gqqkio_Hw6w0JcnvZ3seFWmrvnK3XyWVo_isVKTdy0YSI1ahw3QypuSOWwpDAAoR-C3FM5r9cKzV6ft4ww8YfORUiUIhgMoUxhBLUFHm/s1600/Marketing-design-202007019.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="783" data-original-width="1600" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVDnT9-XNq5GM2cyBv8izGWNdkNkeA24mVg9y7Gqqkio_Hw6w0JcnvZ3seFWmrvnK3XyWVo_isVKTdy0YSI1ahw3QypuSOWwpDAAoR-C3FM5r9cKzV6ft4ww8YfORUiUIhgMoUxhBLUFHm/s640/Marketing-design-202007019.jpg" width="640" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal">
<div style="text-align: left;">
Google, Facebook, and Twitter announced they are evaluating China's new national security law for the city. We're witnessing major American tech companies question the Chinese policy - an extremely rare occurrence. The national security law was put in place to help suppress the anti-government demonstrations that have been on the rise in Hong Kong for more than a year.<br />
<br />
The tech giants mentioned above have temporarily stopped processing the Hong Kong government requests for user data. The new national security law in Hong Kong has already been used to arrest citizens who have requested Hong Kong's independence. Is this a human rights violation? Facebook has said its review of the new law would rely heavily on human rights considerations. This is one of the few times in recent history major American internet giants are questioning Chinese policy.<br />
<br />
What about Chinese-born companies? TikTok, owned by the Chinese internet giant, ByteDance, announced they would withdraw the TikTok app from Hong Kong stores. Within a few days, the app will be unusable.</div>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span></div>
<h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">The New Laws:</span></h2>
<div class="MsoNormal">
What exactly are the new national security rules in Hong Kong? The new law permits the police force to take down internet posts that they feel threaten national security and prosecute companies who don't comply with data requests. If the organization refuses to comply with user data requests, it could result in jail time for the employees and a significant fine for the company. These new rules will force some companies to choose between releasing data or facing six months of jail time for an employee. According to the HK government, if a company refuses to turn over user data in national security cases, it could be fined around $13,000. If someone is ordered to remove a post and they deny, that could lead to a one-year jail sentence.<br />
<br />
<span lang="EN" style="background: white; mso-highlight: white;"><span style="mso-spacerun: yes;"><span style="background-color: transparent;">Google, Facebook, and Twitter did not say whether they would eventually decide to cooperate with parts of the law, but they have temporarily stopped fielding government requests. Their final decisions will likely change the future of internet freedom in Hong Kong. Many HK citizens fear the city will succumb to the ultra tight-knit internet laws that suffocate others in China where Facebook, Twitter, and Google are currently blocked. Thus far, the web hasn't been so tightly censored in Hong Kong, and needless to say, residents want to keep it that way.</span> </span><o:p></o:p></span></div>
<div>
<div style="text-indent: -24px;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal">
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Is There a Safer Way to Communicate?</span></h2>
<div class="MsoNormal">
Groups of people in Hong Kong are seeking ways to go around the city's internet blockades. Some have deleted posts in fear of being prosecuted, and some are downloading encrypted messaging platforms. Trustwire is an end-to-end encrypted file sharing platform. Only the rightful owner and receiver can access the shared data.<br />
<br />
While there's still no saying what the HK government will do next, we'll have to wait and see what the American tech giants decide.<br />
<br /></div>
</div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<!--EndFragment--><br /></div>
Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-68711839847938135582020-06-27T11:48:00.000-07:002020-06-27T12:30:43.859-07:00Freelancers Are the New Cloud Computing| What Does The Future Hold?<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:site" content="@MyTrustwire">
<meta property="og:site_name" content="Trustwire">
<meta property="og:title" content="Freelancers Are the New Cloud Computing| What Does The Future Hold?">
<meta property="og:image" content="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYDh1DaNaf1j5At86dB2nkSkI7SS64a4Z0kOi_Toka3BjkV-qQjT_vlpZwV0WNkSPpSsh-236ncv1LqIDdf0PFY7pLzIFH00-oCWz6b2LkTyiGQqG4wwGgWtQeMwBWvUVdDHb3TZ39Ta9L/s1600/Marketing-design-20200628.jpg">
<meta property="og:description" content="Cloud computing has changed the tech game forever. Cloud computing is undoubtedly one of the most beneficial innovations for tech entrepreneurs since the invention of high-speed internet. They now have the power to move capital expenses to and scale their computing power as the business changes. It seems as though we’re entering a new phase of the future, and coronavirus aside, we’re seeing more and more employees being replaced by freelancers who live and work remotely.">
<br />
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal">
<div style="text-align: left;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYDh1DaNaf1j5At86dB2nkSkI7SS64a4Z0kOi_Toka3BjkV-qQjT_vlpZwV0WNkSPpSsh-236ncv1LqIDdf0PFY7pLzIFH00-oCWz6b2LkTyiGQqG4wwGgWtQeMwBWvUVdDHb3TZ39Ta9L/s1600/Marketing-design-20200628.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="783" data-original-width="1600" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYDh1DaNaf1j5At86dB2nkSkI7SS64a4Z0kOi_Toka3BjkV-qQjT_vlpZwV0WNkSPpSsh-236ncv1LqIDdf0PFY7pLzIFH00-oCWz6b2LkTyiGQqG4wwGgWtQeMwBWvUVdDHb3TZ39Ta9L/s640/Marketing-design-20200628.jpg" width="640" /></a></div>
<span lang="EN" style="background: white; mso-highlight: white;"><i>Will we see a spike in traditional employees being replaced more and more by freelancers who live and work remotely?</i></span><br />
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;">Cloud computing has changed the tech game forever. Cloud computing is undoubtedly one of the most beneficial innovations for tech entrepreneurs since the invention of high-speed internet. They now have the power to move capital expenses to and scale their computing power as the business changes. It seems as though we’re entering a new phase of the future, and coronavirus aside, we’re seeing more and more employees being replaced by freelancers who live and work remotely.</span></div>
</div>
<div class="MsoNormal">
<br /></div>
<div>
<div class="MsoNormal">
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">The advantages of a remote team of employees?</span></h2>
<div class="MsoNormal">
<ul>
<li>Save money. No more renting pricey office spaces.</li>
<br />
<li>Acquire talent from all around the world. Freelancer platforms like Upwork and Fiverr are jam-packed with rockstar people looking for work. Maybe the best fit for the job is a person who lives in Canada, Nebraska, or Tel Aviv.</li>
<br />
<li>Working from home is fun for most. People like the freedom of working remotely. No more dressing up for work or having to be in the office at 9 am sharp.</li>
<span lang="EN" style="background: white; mso-highlight: white;"><div>
<br /></div>
</span></ul>
</div>
</div>
</div>
<div>
<div style="text-indent: -24px;">
<br /></div>
</div>
<div class="MsoNormal">
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">The disadvantages and challenges:</span></h2>
<div>
<span style="font-size: large;"><br /></span></div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Of course, there are some considerable downsides to think about. Like, how can you develop a reliable team without ever meeting in person, and can you really rely solely on remote workers to do a job? It depends on the line of work, but many companies are saying they need their workers to be on the front line in the office.
<br /><br />
One of the biggest challenges during this new remote working trend is undoubtedly the added security risk. Major corporations have already been the target of cybersecurity threats for years. What happens when their workers do their jobs remotely on unsecured wi-fi networks from their home or a cafe? Well, for hackers, you might as well say Christmas came early. This new breeding ground of vulnerable employees poses a significant threat to security. To avoid any security mishaps, employers are asking their workers to use secure software systems to send and receive sensitive information securely. Trustwire is 100% end-to-end encrypted, meaning no one other than the owner and rightful recipient of a file will be able to access it. The trick to outsmarting dangerous online predators is never to give them the option to hack into your system.
</span><br />
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<br />
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">What’s the Solution?</span></h2>
<span lang="EN" style="background: white; mso-highlight: white;"></span><br />
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Because this new working from home era is still so fresh, it’s hard to say what will happen if 50% of employees work from home in five years? Some experts suggest hiring remote freelancers for more mundane and menial tasks, and it’s proven to be very useful. However, the difference between a simple lead gen task and a sophisticated marketing strategy could not be more different. Will companies continue to allow employees to work from home, even after the pandemic passes? Only time will tell.</span></div>
</div>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;">To learn more about how <a href="https://www.trustwire.com/" target="_blank">Trustwire</a> can be a useful tool against ransomware attacks and other cybercrimes.</span></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<!--EndFragment--><br />Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-37285026347662277682020-06-21T02:45:00.000-07:002020-06-21T03:05:14.804-07:00Remote Working is Becoming the New “Norm” for Twitter, Facebook
<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:site" content="@MyTrustwire">
<meta property="og:site_name" content="Trustwire">
<meta property="og:title" content="Remote Working is Becoming the New “Norm” for Twitter, Facebook">
<meta property="og:image" content="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSVMqqYTFF-emyfxjLTZNulMqJ-5FvjWLk1G7JShj2Hj1EmGLn9I6uqXbV3xzzT4mHW-Ivk3pWudF8h4cj1-n9qA8hApKkpQ24_W6iOMfKk0SI5WDK0ny-ocML1Dv2dp1o35hLgm-XXqdQ/s1600/Marketing-design-20200621.jpg">
<meta property="og:description" content="The world’s most famous tech companies are spearheading full-time remote work opportunities for their employees amid the coronavirus pandemic. Jack Dorsey made headlines recently when he announced all Twitter employees now have the option to work from home indefinitely. While in late May, Mark Zuckerberg declared that up to half of Facebook’s employees (48,268 people) could be working remotely in five to 10 years. Offices won’t be disappearing from Silicon Valley altogether, but we should expect a significant shift toward working remotely."><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSVMqqYTFF-emyfxjLTZNulMqJ-5FvjWLk1G7JShj2Hj1EmGLn9I6uqXbV3xzzT4mHW-Ivk3pWudF8h4cj1-n9qA8hApKkpQ24_W6iOMfKk0SI5WDK0ny-ocML1Dv2dp1o35hLgm-XXqdQ/s1600/Marketing-design-20200621.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="783" data-original-width="1600" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSVMqqYTFF-emyfxjLTZNulMqJ-5FvjWLk1G7JShj2Hj1EmGLn9I6uqXbV3xzzT4mHW-Ivk3pWudF8h4cj1-n9qA8hApKkpQ24_W6iOMfKk0SI5WDK0ny-ocML1Dv2dp1o35hLgm-XXqdQ/s640/Marketing-design-20200621.jpg" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal">
<div style="text-align: left;">
<span lang="EN" style="background: white; mso-highlight: white;">The world’s most famous tech companies are spearheading full-time remote work opportunities for their employees amid the coronavirus pandemic. Jack Dorsey made headlines recently when he announced all Twitter employees now have the option to work from home indefinitely. While in late May, Mark Zuckerberg declared that up to half of Facebook’s employees (48,268 people) could be working remotely in five to 10 years. Offices won’t be disappearing from Silicon Valley altogether, but we should expect a significant shift toward working remotely.
<o:p></o:p></span></div>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span></div>
<h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Are there benefits to working remotely?</span></h2>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Venturing out of offices could mean more job opportunities for people who live outside of the traditional ‘tech hubs’ like the Bay Area, Seattle, and Austin. Many big tech companies are waking up and realizing allowing employees to work from home may not be such a bad idea, after all. Companies can save money on wages by paying employees based on the cost of living where they work, while also lowering rental expenses. If they don’t have to rent an office, especially in the pricey areas like the Bay Area, they can potentially save millions of dollars.
Many are saying that it’s time to spread digital opportunities across the country. If there’s anything our nation needs right now, coronavirus cure aside, it’s more job opportunities.
<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div>
<div style="text-indent: -24px;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal">
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">What are the drawbacks?
</span></h2>
<span lang="EN" style="background: white; mso-highlight: white;"></span><br />
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Nothing is perfect. Cybersecurity is posing a major issue for employees. Hackers are already targeting Americans working from home. Because the average person uses unsecured Wi-Fi networks at home, it’s leaving them more vulnerable to security threats. The good news is that there are means and resources you can use to help boost your personal online security. Trustwire is one of the easiest online collaboration tools that allow users to send and receive files from anywhere in the world securely. The data is end-to-end encrypted, meaning no one except the rightful owner and receiver will be able to access the data.
</span><br />
<br />
<br />
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Another downfall of the new work from home trend is that in-person collaboration is precious. Will employees miss the feeling of camaraderie or even just chatting around the water cooler?</span></h2>
<span lang="EN" style="background: white; mso-highlight: white;"></span><br />
<div class="MsoNormal">
Experts are still unsure if Zoom conferences and a daily phone call will be enough.<br />
Major tech companies like Twitter and Facebook have never permitted their workers to operate remotely. We’re entering brand new territory. If it weren’t for COVID-19, would we have ever witnessed this shift? What are the long-term ramifications, and will employee morale remain the same? It’s impossible to say what effects short and long term remote work will have on a company, its profits, and its employees.<br />
<br />
Working remotely isn’t a trend, and it looks like it’s here to stay. It’s also not going to be limited to just the big tech companies. More and more businesses are vowing to allow their employees to work remotely, even after the coronavirus pandemic is a thing of the past.<br />
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span></div>
</div>
</div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Trustwire is a browser-based file transfer method. Using the latest end-to-end encryption software, Trustwire guarantees your files will be shared safely with only the rightful recipient. Our free service means no more trips hand-delivering data, worrying about cybersecurity breaches, and knowing the information you divulge to your CPA, lawyer, or doctor remains secure. With Trustwire, you can easily exchange and access files anywhere in the world, and no downloads or installations are required. Are you ready to start surfing the internet securely? Sign up for a <a href="https://www.trustwire.com/" target="_blank">free account Trustwire here</a>.</span></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<!--EndFragment--><br /></div>
Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-49188504468189018642020-05-30T12:25:00.000-07:002020-06-21T02:34:23.555-07:00Take Control of Your Digital Life: 7 Ways to Protect Your Privacy
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSQMLUb9HTknbWeUfOmpLTuXsCb7D3xd-1pMihd0VAp29wibQ8Q48ZM8gn8QyBaJ0ggcCwuaIzrsQKPxh5bTvcHqgRcvsSxR3auS7Q1P1y1deX88g4YOwJbj9i7zXAyiCBCImf7V1i36Xy/s1600/Marketing-design-20200529.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="783" data-original-width="1600" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSQMLUb9HTknbWeUfOmpLTuXsCb7D3xd-1pMihd0VAp29wibQ8Q48ZM8gn8QyBaJ0ggcCwuaIzrsQKPxh5bTvcHqgRcvsSxR3auS7Q1P1y1deX88g4YOwJbj9i7zXAyiCBCImf7V1i36Xy/s640/Marketing-design-20200529.png" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal">
<div style="text-align: left;">
<span lang="EN" style="background: white; mso-highlight: white;">
Technology has changed our lives. It’s made our lives more convenient. We can shop for pretty much anything under the sun, order food, talk to loved ones, and even be treated by a doctor, all over the internet. While tech advances have incredible advantages, like everything else, it also comes with a slew of disadvantages. Website hackers are waiting to gain access to your personal information. Malicious online behavior is nothing new, and the hackers are only getting smarter. That’s why data security is so important.
Here are 7 ways that you can protect yourself and your identity.
<o:p></o:p></span></div>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span></div>
<h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">1. Be cautious of phishing</span></h2>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Phishing is one of the most common ways hackers try to get a hold of your personal information. Usually, the hackers will attach a link containing malware or other viruses in an email. Once you click the link, they have access to all of your info. Always be wary of opening email attachments, even if you think you know it’s from a reputable sender.
<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div>
<div style="text-indent: -24px;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal">
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">2. Remember that incognito mode doesn’t mean you’re invisible</span></h2>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">The privacy feature, available on Chrome, Safari, and Firefox may sound secure, but pay attention to the clear warnings. On Chrome, for example, it says, “Going incognito doesn’t hide your browsing from your employer, your internet service provider, or the websites you visit.” So, it doesn’t help when it comes to data security, but it will prevent anyone using your computer from seeing which sites you visited.
</span><br />
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<br />
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">3. Practice safe texting</span></h2>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Signal is an excellent tool for people who want to protect their texts. It’s free, easy to use, and available for iPhone and Android. WhatsApp is another popular chat tool, which uses Signal’s software to encrypt its messaging.</span><br />
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<br />
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">4. Use Strong Passwords</span></h2>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Did you know that 83% of Americans still use weak passwords? According to Avast Press, it’s a good idea to change your passwords often and pick something more clever than your dog’s name or your birthday.</span><br />
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<br />
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">5. Use a VPN</span></h2>
<div class="MsoNormal">
A Virtual Private Network (VPN) lets you surf the internet without anyone tracking your IP address. The good ones aren’t free, but worth the investment in your privacy and data security. You can also use them across all of your devices, like your smartphones, tablets, and<br />
computers.<br />
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<br />
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">6. Use an encrypted file-sharing software</span></h2>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">For anyone who deals with sensitive information on the internet, surely privacy is a top concern. Business owners, doctors, journalists, and lawyers are continually sending files containing their own or their client’s info. <a href="https://www.trustwire.com/" target="_blank">Trustwire</a> is one of the easiest and safest ways to send and receive files online. The software uses end-to-end encryption so you can ensure hackers won’t be able to crack the codes to your data.</span><br />
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<br />
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">7. Keep your data backed up</span></h2>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Online backup services like CrashPlan, back up your data and encrypt it at the same time. The backups help protect your photos and documents during a technical malfunction and from ransomware and other malicious attacks.</span></div>
</div>
</div>
</div>
</div>
<br /></div>
</div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<!--EndFragment--><br /></div>
Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-30049702118317072902020-05-23T03:45:00.000-07:002020-05-23T04:46:48.994-07:00FaceApp Lets You Peek Into The Future. Does It Also Violate Your Privacy?<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:site" content="@MyTrustwire">
<meta property="og:site_name" content="Trustwire">
<meta property="og:title" content="FaceApp Lets You Peek Into The Future. Does It Also Violate Your Privacy?">
<meta property="og:image" content="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtZf7Gh2tK8C8XYjjcYZgylvXw57MgSou4SSDCApE2WNoEhFU3cLbAiiEAR13GtQ94-_XdLW3YP4mFQ4A1tqgmBgKCg9J5SeyA-BJ7lI_bBJMLtcJgI2jWzG8muXLg-hfECL2LYI2m52b6/s1600/Marketing-design-20200521.png">
<meta property="og:description" content="FaceApp is the photo-altering smartphone application that takes one of your photos and 'ages' it by decades. The app works scarily well, and the modified photographs do give users a realistic glimpse of what they could look like in 30 to 40 years, or what they may have looked like as young children.
The app was created by Wireless Lab of St. Petersburg, Russia, and quickly soared to be amid the top free apps in both the Apple and Android app stores. This could have something to do with the major social media and celeb following. Once A-List celebrities like The Jonas Brothers, Drake, and Chris Hemsworth began shouting out the app on social media, needless to say, the buzz around FaceApp was swarming. ">
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtZf7Gh2tK8C8XYjjcYZgylvXw57MgSou4SSDCApE2WNoEhFU3cLbAiiEAR13GtQ94-_XdLW3YP4mFQ4A1tqgmBgKCg9J5SeyA-BJ7lI_bBJMLtcJgI2jWzG8muXLg-hfECL2LYI2m52b6/s1600/Marketing-design-20200521.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="783" data-original-width="1600" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtZf7Gh2tK8C8XYjjcYZgylvXw57MgSou4SSDCApE2WNoEhFU3cLbAiiEAR13GtQ94-_XdLW3YP4mFQ4A1tqgmBgKCg9J5SeyA-BJ7lI_bBJMLtcJgI2jWzG8muXLg-hfECL2LYI2m52b6/s640/Marketing-design-20200521.png" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal">
<div style="text-align: left;">
<span lang="EN" style="background: white; mso-highlight: white;">FaceApp is the photo-altering smartphone application that takes one of your photos and 'ages' it by decades. The app works scarily well, and the modified photographs do give users a realistic glimpse of what they could look like in 30 to 40 years, or what they may have looked like as young children. </span><br />
<span lang="EN" style="background: white; mso-highlight: white;"><br />The app was created by Wireless Lab of St. Petersburg, Russia, and quickly soared to be amid the top free apps in both the Apple and Android app stores. This could have something to do with the major social media and celeb following. Once A-List celebrities like The Jonas Brothers, Drake, and Chris Hemsworth began shouting out the app on social media, needless to say, the buzz around FaceApp was swarming. </span><br />
<span lang="EN" style="background: white; mso-highlight: white;"><br />The Russian hacker jokes are endless. Many influencers have taken to Twitter to poke fun at the fact that Russia now has access to many of our personal photos and potentially our information. While there is no hard evidence that FaceApp is stealing photos and taking them back to Russia for some evil project, there are a couple of privacy issues.
<o:p></o:p></span></div>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span></div>
<h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">FaceApp And Your Privacy, What You Need To Know </span></h2>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">FaceApp's privacy policy and terms and conditions have been raising eyebrows, and growing concerns over cybersecurity and the app are on the steady incline. One clause that stands out is that FaceApp holds extensive rights to its user's photos. Do keep in mind that many other apps do as well, though, and this is the unfortunate "norm" in the world of photo applications.
According to Jeremy Gillula, who is a project director at the Electronic Frontier Foundation (a nonprofit civil liberties group) does say there is cause for concern. </span><br />
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;">According to Gillula, "The fact that a lot of apps and services usually contain this catch-all clause that says you grant us worldwide license to reproduce, modify, adapt, create derivative works from, distribute, publicly perform and display your user content always seems a little over the top to me.
<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div>
<div style="text-indent: -24px;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal">
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Is FaceApp Safe To Use?
</span></h2>
<span lang="EN" style="background: white; mso-highlight: white;"></span><br />
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">It's always disheartening when a seemingly fun, harmless smartphone application can create serious concerns surrounding privacy and cybersecurity. Many of the app's young users don't give a second thought to whether or not their information is protected. However, for working professionals, people who own/operate businesses, and anyone who wants to keep their privacy, using FaceApp may not be the best idea.
</span><br />
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;">Reps from FaceApp have divulged that most of the images uploaded from their serves have a 48-hour lifespan until deleted. They claim to never sell or share user data with third parties; however, in their privacy policy, it does say they reserve the right to share some information. </span><br />
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;">This info includes analytic tools to help measure traffic and usage trends, and these are done with third-party organizations. </span><br />
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;">All in all, FaceApp most likely isn't using your photos for some kind of world-domination scheme, but you should still be cautious of everything you post on the app.
</span><br />
<br />
<br /></div>
</div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Trustwire is a browser-based file transfer method. Using the latest end-to-end encryption software, Trustwire guarantees your files will be shared safely with only the rightful recipient. Our free service means no more trips hand-delivering data, worrying about cybersecurity breaches, and knowing the information you divulge to your CPA, lawyer, or doctor remains secure. With Trustwire, you can easily exchange and access files anywhere in the world, and no downloads or installations are required. Are you ready to start surfing the internet securely? Sign up for a <a href="https://www.trustwire.com/" target="_blank">free account Trustwire here</a>.</span></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<!--EndFragment--><br /></div>
Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-13741851483755041692020-04-28T06:22:00.000-07:002020-04-29T10:32:11.012-07:00 Is Zoom Protecting Your Sensitive Information<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:site" content="@MyTrustwire">
<meta property="og:site_name" content="Trustwire">
<meta property="og:title" content=" Is Zoom Protecting Your Sensitive Information">
<meta property="og:image" content="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmCAGTRSX4Q65_wwPhs76QWmyDjWxkWP5rpOODDXejmrfsMBrDNCZ-idv6yuPoMI-Ney0I692rzX3mzfaHS78jjE5XE_6wDeP2brEUcVsPcAkbGLb7kgeOmY7FUCLSewL4E8Q_H8YuRHIW/s1600/Marketing-design-2020430.png">
<meta property="og:description" content="Since the worldwide outbreak of COVID-19, many people have been forced to stay at home, either to practice self-distancing or in mandatory quarantine. While we may be living in the middle of a pandemic, work must go on, even if we're doing it from our living rooms. In comes the popular video conferencing app, Zoom. This easy-to-use app is currently being utilized by millions to host work meetings, interviews, virtual birthday parties, dinners, and more. While the user-friendly, free app may be one of the most popular during the pandemic to see familiar faces online, it does come with a slew of privacy and cybersecurity issues">
<br />
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal">
<div style="text-align: left;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmCAGTRSX4Q65_wwPhs76QWmyDjWxkWP5rpOODDXejmrfsMBrDNCZ-idv6yuPoMI-Ney0I692rzX3mzfaHS78jjE5XE_6wDeP2brEUcVsPcAkbGLb7kgeOmY7FUCLSewL4E8Q_H8YuRHIW/s1600/Marketing-design-2020430.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="783" data-original-width="1600" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmCAGTRSX4Q65_wwPhs76QWmyDjWxkWP5rpOODDXejmrfsMBrDNCZ-idv6yuPoMI-Ney0I692rzX3mzfaHS78jjE5XE_6wDeP2brEUcVsPcAkbGLb7kgeOmY7FUCLSewL4E8Q_H8YuRHIW/s640/Marketing-design-2020430.png" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;">Since the worldwide outbreak of COVID-19, many people have been forced to stay at home, either to practice self-distancing or in mandatory quarantine. While we may be living in the middle of a pandemic, work must go on, even if we're doing it from our living rooms. In comes the popular video conferencing app, Zoom. This easy-to-use app is currently being utilized by millions to host work meetings, interviews, virtual birthday parties, dinners, and more. While the user-friendly, free app may be one of the most popular during the pandemic to see familiar faces online, it does come with a slew of privacy and cybersecurity issues.</span></div>
</div>
<br />
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Zoom's Past Privacy Blunders:</span></h2>
<span lang="EN" style="background: white; mso-highlight: white;"></span><br />
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Zoom is no stranger to privacy snafus and data breaches. You may be familiar with the term "Zoombombing," where cybercriminals and trolls hijacked user's web cameras and bombarded them with inappropriate materials during their videoconferences. Zoom's chief executive, Eric Yuan, has addressed the security concerns and has apologized for the application's recent problems. While the company has promised to fix their privacy and security issues, can we trust it? When a company fails to protect its user's privacy, more often than not, it does leave a bad taste in their customer's mouths. However, so many of us are relying on the software to comply with work orders, or keep up with family and friends during the coronavirus pandemic.</span><br />
<br /></div>
<div>
<div class="MsoNormal">
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Should You Still Use Zoom?
</span></h2>
<span lang="EN" style="background: white; mso-highlight: white;"></span><br />
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">We get it; in these difficult times, many of us don't have any better options than to continue to use Zoom. Keep these tips in mind to ensure your privacy remains protected while using the app. </span><br />
<br />
<ul>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;"><b>Zoom is safer on mobile devices:</b></span></li>
<span lang="EN" style="background: white; mso-highlight: white;">Use the app on an iPad, iPhone, or Android smartphone, rather than on a Mac or PC. Mobile apps that go through Apple's App Store and Google's Play store go through more rigorous review processes, including inspection for security flaws.</span>
<br />
<br />
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;"><b>Turn on Zoom security settings:</b></span></li>
<span lang="EN" style="background: white; mso-highlight: white;">Be sure to create a meeting password to help prevent any unwanted visitors Zoombombing your video calls. </span>
<br />
<br />
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;"><b>Don't rely on Zoom to relay sensitive information:</b></span></li>
<span lang="EN" style="background: white; mso-highlight: white;">Try to avoid using Zoom on work calls relating to any private or confidential matters.</span><span lang="EN" style="background: white; mso-highlight: white;"><div>
<br /></div>
</span></ul>
</div>
</div>
</div>
<div>
<div style="text-indent: -24px;">
<br /></div>
</div>
<div class="MsoNormal">
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">If Privacy is Your Main Concern, Try an Alternative: </span></h2>
<span lang="EN" style="background: white; mso-highlight: white;"></span><br />
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">If Privacy is Your Main Concern, Try an Alternative:
If your line of work can survive without video calls, stop using Zoom. With so many of us working from home now, likely you'll need to implement secure file transfer software. Trustwire is the most reliable way to send and receive files online. Use Trustwire to safely send data to your customers, employees, and colleagues.
<br><br>
If you require video conferences to complete your work, there are other video chatting tools available, with better reputations. Applications like Google's Hangouts, Cisco's Webex, and FaceTime for Apple devices are safer alternatives to Zoom. While they may not be as straightforward and easy to use, you can worry less about cybersecurity.
</span></div>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;">To learn more about how <a href="https://www.trustwire.com/" target="_blank">Trustwire</a> can be a useful tool against ransomware attacks and other cybercrimes.</span></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<!--EndFragment--><br />Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-17859815356291861202020-04-25T00:35:00.001-07:002020-04-25T00:57:49.017-07:00Are Hackers Stealing Your Information on TikTok?
<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:site" content="@MyTrustwire">
<meta property="og:site_name" content="Trustwire">
<meta property="og:title" content="Are Hackers Stealing Your Information on TikTok?">
<meta property="og:image" content="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpajJJ6ql5t-0XOZubV-GKQtL69XDpeud5tGIhYABNBUB5YGnM6l7Q9OpBrEo9G7CPD8PoTTLxPRbnP3vyakgDq9vh5pBvHdL_PTXzap3alTDdin_qtKmy2CAxm2Jwc7axPrX4Fajasu2r/s1600/Marketing-design-2020425.png">
<meta property="og:description" content="TikTok, the smartphone app hailing from China that allows its users to create short dance, lip-sync, comedy, and talent videos to be shared with their following. The app beloved by teenagers and used daily by hundreds of millions of people around the globe, has had its fair share of security vulnerabilities. Check Point, one of the top cybersecurity companies in Israel, published research claiming the app can potentially allow hackers to manipulate user data and divulge personal information.
">
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpajJJ6ql5t-0XOZubV-GKQtL69XDpeud5tGIhYABNBUB5YGnM6l7Q9OpBrEo9G7CPD8PoTTLxPRbnP3vyakgDq9vh5pBvHdL_PTXzap3alTDdin_qtKmy2CAxm2Jwc7axPrX4Fajasu2r/s1600/Marketing-design-2020425.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="783" data-original-width="1600" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpajJJ6ql5t-0XOZubV-GKQtL69XDpeud5tGIhYABNBUB5YGnM6l7Q9OpBrEo9G7CPD8PoTTLxPRbnP3vyakgDq9vh5pBvHdL_PTXzap3alTDdin_qtKmy2CAxm2Jwc7axPrX4Fajasu2r/s640/Marketing-design-2020425.png" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal">
<div style="text-align: left;">
<span lang="EN" style="background: white; mso-highlight: white;">TikTok, the smartphone app hailing from China that allows its users to create short dance, lip-sync, comedy, and talent videos to be shared with their following. The app beloved by teenagers and used daily by hundreds of millions of people around the globe, has had its fair share of security vulnerabilities. Check Point, one of the top cybersecurity companies in Israel, published research claiming the app can potentially allow hackers to manipulate user data and divulge personal information.
<o:p></o:p></span></div>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span></div>
<h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">What Did Check Point Find?</span></h2>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Check Point researchers tested TikTok’s security weaknesses by sending themselves links with malware that allowed them to take control of other accounts, upload content, delete videos, and make private videos available to the public. The researchers were also able to retrieve TikTok users’ personal information, including names and birth dates.
<br>
<br>
Another flaw the Check Point found was a weakness that would allow cyberattackers to send TikTok users messages containing malicious links. Once the user opened the link, the attacker would have been able to take control of their TikTok accounts. Researchers were also able to retrieve personal information from user’s accounts through the official TikTok website. Check Point did send a summary of the TikTok security flaws to the Department of Homeland Security in the United States. Oded Vanunu, Check Point’s head of product vulnerability research, Oded Vanunu said: “The vulnerabilities we found were all core to TikTok’s systems.”
<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div>
<div style="text-indent: -24px;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal">
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Is TikTok Safe to Use?
</span></h2>
<span lang="EN" style="background: white; mso-highlight: white;"></span><br />
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Upon learning of the findings of Check Point’s research, TikTok has claimed to fix all of their vulnerabilities. These changes were said to be implemented in December 2019. TikTok is one of the few Chinese success stories in the West. The app is especially popular among younger users, and predictions show by the end of next year, TikTok could surpass Facebook, Instagram, YouTube, and Snap in the number of downloads. The problem with newer apps like TikTok is that it’s a breeding ground for hackers looking to target new services that haven’t gone through years of testing and extensive security research. Plus, many of the app’s users are young and potentially not educated or mindful of cybersecurity precautions or security updates. Members of the TikTok security team are claiming the app is safe to use for all, and the privacy of their users will remain a top priority.</span><br />
<br />
<br />
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">More Shortcoming for TikTok:</span></h2>
<span lang="EN" style="background: white; mso-highlight: white;"></span><br />
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Back in February 2019, the Federal Trade Commission filed a complaint against TikTok, stating the app illegally collected personal information from minors. In the charge, another popular app Musical.ly, which is owned by TikTok, was said to violate the Children’s Online Privacy Protection Act. TikTok agreed to pay $5.7 million to settle the complaint. It’s still not the end of the road, TikTok is being investigated by the British Information Commissioner’s Office to determine if the app has violated European privacy laws. </span> </div>
<br /></div>
</div>
<br />
<div>
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Do Send Documents Securely Over the Internet with Trustwire:</span></h2>
<div style="text-indent: -24px;">
<br /></div>
</div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Trustwire is a browser-based file transfer method. Using the latest end-to-end encryption software, Trustwire guarantees your files will be shared safely with only the rightful recipient. Our free service means no more trips hand-delivering data, worrying about cybersecurity breaches, and knowing the information you divulge to your CPA, lawyer, or doctor remains secure. With Trustwire, you can easily exchange and access files anywhere in the world, and no downloads or installations are required. Are you ready to start surfing the internet securely? Sign up for a <a href="https://www.trustwire.com/" target="_blank">free account here</a>.</span></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<!--EndFragment--><br /></div>
Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-82780406634169246972020-03-28T08:13:00.000-07:002020-03-28T09:14:40.231-07:00Coronavirus: Strategies and tools for remote work during a worldwide pandemic<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:site" content="@MyTrustwire">
<meta property="og:site_name" content="Trustwire">
<meta property="og:title" content="Coronavirus: Strategies and tools for remote work during a worldwide pandemic">
<meta property="og:image" content="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbDz_tfMMu_y60oOgVprwRVi8j25muBE_-vu_zElWuKAsU9e_-hMBSRp4ReqABYmwhdxwM8MobF5J1HRs_Mhnox5Ar6fX_sMh919RyoyPcyC0tAGziOepWWnAea0bIVyo2sbcUrmkxOJVD/s1600/Marketing-design-2020328.png">
<meta property="og:description" content="Along with worldwide hysteria and fear, the novel Coronavirus is also affecting the way we work, run businesses, and go about our daily lives. Unfortunately, the viral Coronavirus isn't just a threat to our immune systems, but it can be a significant cause for concern regarding cyberattacks as well. ">
<br />
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbDz_tfMMu_y60oOgVprwRVi8j25muBE_-vu_zElWuKAsU9e_-hMBSRp4ReqABYmwhdxwM8MobF5J1HRs_Mhnox5Ar6fX_sMh919RyoyPcyC0tAGziOepWWnAea0bIVyo2sbcUrmkxOJVD/s1600/Marketing-design-2020328.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="783" data-original-width="1600" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbDz_tfMMu_y60oOgVprwRVi8j25muBE_-vu_zElWuKAsU9e_-hMBSRp4ReqABYmwhdxwM8MobF5J1HRs_Mhnox5Ar6fX_sMh919RyoyPcyC0tAGziOepWWnAea0bIVyo2sbcUrmkxOJVD/s640/Marketing-design-2020328.png" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal">
<div style="text-align: left;">
<span lang="EN" style="background: white; mso-highlight: white;">Along with worldwide hysteria and fear, the novel Coronavirus is also affecting the way we work, run businesses, and go about our daily lives. Unfortunately, the viral Coronavirus isn't just a threat to our immune systems, but it can be a significant cause for concern regarding cyberattacks as well. Whether you're in forced a two-week quarantine or taking safety precautions on your own from the virus, a major surge of folks has been working from home. With this new era of working outside the formal office, how will you ensure the integrity of your work remains unscathed? We've compiled a list of the best tips, tricks, and tools to get the most out of working remotely.
<o:p></o:p></span></div>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span></div>
<h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">How to keep business running as usual:</span></h2>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">While the Coronavirus has shaken the world, many of us still have to conduct business as usual. This can mean having employees work from home, canceling all company travel, and forgetting about any meetings in person for the foreseeable future. Follow the tips below to create a comfortable remote working environment for your employees. </span><br />
<span lang="EN" style="background: white; mso-highlight: white;"><br />1. Strong Internet Access
Some of us may take reliable WiFi for granted. Keep in mind that some of your employees may not have the luxury of lighting fast internet access at home. If that's the case, you may want to invest in mobile hotspots for your employees. </span><br />
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;">2. Remote Work Devices
Of course, your workers will need access to a laptop, but don't forget accessories like headsets, mics, and webcams too. These will be required for conducting online meetings and web conferences. If your employees don't have these items at home, it's highly recommended for the business to provide these tools.
</span><br />
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;">3. Collaboration Tools
Since meetings in person are no-go at the moment, you'll want to use collaborative meeting tools like Zoom GoToMeeting to help unify communication. This way, you and your team can still hear and speak to each other without having fears of contracting the deadly Coronavirus.
<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div>
<div style="text-indent: -24px;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<h2 style="font-size: 12pt; line-height: normal;">
<span style="font-size: large;">How to ensure your business remains safe:</span></h2>
<div class="MsoNormal" style="font-family: "PingFang TC"; font-size: medium;">
<o:p></o:p></div>
<div class="MsoNormal" style="font-family: "PingFang TC"; font-size: medium;">
<br /></div>
<div class="MsoNormal" style="font-family: "PingFang TC"; font-size: medium;">
<span lang="EN" style="background: white; mso-highlight: white;">While the Coronavirus has shaken the world, many of us still have to conduct business as usual. This can mean having employees work from home, canceling all company travel, and forgetting about any meetings in person for the foreseeable future. Follow the tips below to create a comfortable remote working environment for your employees. </span></div>
</div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;"></span><br /></div>
<div>
<div style="text-indent: -24px;">
<br /></div>
</div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">To learn more about how <a href="https://www.trustwire.com/" target="_blank">Trustwire</a> can be a useful tool against ransomware attacks and other cybercrimes.</span></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<!--EndFragment--><br /></div>
Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-2990591335130563302020-03-20T10:48:00.003-07:002020-03-20T11:19:32.141-07:00Cybersecurity: Everything you need to know to protect your important files from hackers<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:site" content="@MyTrustwire">
<meta property="og:site_name" content="Trustwire">
<meta property="og:title" content="Cybersecurity: Everything you need to know to protect your important files from hackers">
<meta property="og:image" content="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik5H-WFRGSD375KlmpBWSxoUu6qlMEh0A20r86h8wHMXjDKGAYHKEaxKvvzHgHbjNdw2bwYcuN0bER3thBGL7s9svSnPI-MZ3237D8T8Q2LgOdkD6t-fs5mCi2CdfT5UcYhK17149HqsIe/s1600/Marketing-design-2020321.png">
<meta property="og:description" content="Privacy was once thought of as our instinctual rights as humans. We used to think that our online work, data, and files were protected from malicious behaviors. With the slew of hackers in this generation, unfortunately, times have drastically changed. Many governments have complete access to all their citizen's personal online data, and cyberattacks are at an all-time high. Keeping your data safe is at the heart of the privacy pandemic we're currently experiencing. We're giving you insider tips to ensure your important files will always remain safe from hackers.">
<br />
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal">
<div style="text-align: left;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik5H-WFRGSD375KlmpBWSxoUu6qlMEh0A20r86h8wHMXjDKGAYHKEaxKvvzHgHbjNdw2bwYcuN0bER3thBGL7s9svSnPI-MZ3237D8T8Q2LgOdkD6t-fs5mCi2CdfT5UcYhK17149HqsIe/s1600/Marketing-design-2020321.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="783" data-original-width="1600" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik5H-WFRGSD375KlmpBWSxoUu6qlMEh0A20r86h8wHMXjDKGAYHKEaxKvvzHgHbjNdw2bwYcuN0bER3thBGL7s9svSnPI-MZ3237D8T8Q2LgOdkD6t-fs5mCi2CdfT5UcYhK17149HqsIe/s640/Marketing-design-2020321.png" width="640" /></a></div>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;">Privacy was once thought of as our instinctual rights as humans. We used to think that our online work, data, and files were protected from malicious behaviors. With the slew of hackers in this generation, unfortunately, times have drastically changed. Many governments have complete access to all their citizen's personal online data, and cyberattacks are at an all-time high. Keeping your data safe is at the heart of the privacy pandemic we're currently experiencing. We're giving you insider tips to ensure your important files will always remain safe from hackers.
<o:p></o:p></span></div>
<br /></div>
<div>
<div class="MsoNormal">
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">How to practice safe online habits:
</span></h2>
<span lang="EN" style="background: white; mso-highlight: white;"></span><br />
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">An Internet Service Provider or ISP always monitors your internet activity. That's normal; however, your ISP is in jeopardy of being hijacked by a hacker. While you, the consumer, can't do much about attacks on an ISP, you can take extra cybersecurity measures to ensure your information remains untouched. Follow the guidelines below to ensure your data is safe from hackers.</span><br />
<br />
<ul>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;"><b>Don't use email to send important data:</b></span></li>
<span lang="EN" style="background: white; mso-highlight: white;">Many of us believe that email is safe, and it's understandable to think why. Major media providers like Gmail, Yahoo, and Outlook make us presume that when we send a private email, it remains protected. However, that's not the case. Not only do the companies have full access to everything you send through their platforms, but they also don't always put the best cybersecurity practices to use.</span>
<br />
<br />
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;"><b>Practice secure file transferring:</b></span></li>
<span lang="EN" style="background: white; mso-highlight: white;">What exactly does secure file transferring mean? When you send data from one person to another over the internet, that data may have succumbed to an online attack. If a hacker is on the same network as you, or the person receiving the files, they can get access to them. Use file-sharing tools, like Trustwire, to ensure hackers can't steal your personal information. Trustwire uses end-to-end encryption, which encodes information and makes it unreadable by unauthorized parties. That means only you and the person receiving the file will be able to see it. Trustwire can be used from anywhere in the world, without having to clog your laptop with pesky applications.</span>
<br />
<br />
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;"><b>Invest in a mobile hotspot:</b></span></li>
<span lang="EN" style="background: white; mso-highlight: white;">While sitting in your local coffee shop with free Wi-Fi, you may want to think before you click the connect button. Yes, free Wi-Fi is enticing, but hackers may be able to access the info you are sending through these public, unsecured Wi-Fi networks. If you can, avoid all public Wi-Fi if you plan on making an online purchase, sending sensitive information, or logging in to your baking details. To avoid relying on free Wi-Fi, use a mobile 4G/LTE connection through your smartphone. Most cellular providers offer unlimited data today for fair prices. While you may have to tack on a few extra bucks at the end of the month on your phone bill, it will be well worth it in the long run.</span></ul>
</div>
</div>
</div>
<div>
<div style="text-indent: -24px;">
<br /></div>
</div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">To learn more about how <a href="https://www.trustwire.com/" target="_blank">Trustwire</a> can be a useful tool against ransomware attacks and other cybercrimes.</span></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<!--EndFragment--><br />Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-36353639288234048102020-02-27T08:22:00.001-08:002020-02-27T09:18:11.921-08:00The Best Secure File Transfer Tool all Digital Nomads Should be Using in 2020<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:site" content="@MyTrustwire">
<meta property="og:site_name" content="Trustwire">
<meta property="og:title" content="The Best Secure File Transfer Tool all Digital Nomads Should be Using in 2020">
<meta property="og:image" content="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXju44XGde6u7X4PTOgQ4qV0lpOzJFDQvG785Kn3PQirFN-AVhK-mZ2M1zybtrPlrfudkyNDhFJz9O5aB18DxhMNXXhzJp7RamNRyiyel8406CTld8a_tVQYNvyPVYTfO9C1WGPKNJmGJV/s1600/Marketing-design-2020217.png">
<meta property="og:description" content="With countless tools and software widely available on the market today, digital nomads can run a business from the comfort of their own home, on a beach, from a coffee shop, or wherever they choose. While this lifestyle sounds ideal (and we're not disagreeing), how can remote workers ensure their sensitive information remains protected? Practicing safe online secure file transferring is the only way to guarantee the integrity of your data will remain unscathed. Think of secure file sharing like an insurance policy. Give yourself the peace of mind knowing your files will stay safe and guarded against online predators with Trustwire.">
<br />
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXju44XGde6u7X4PTOgQ4qV0lpOzJFDQvG785Kn3PQirFN-AVhK-mZ2M1zybtrPlrfudkyNDhFJz9O5aB18DxhMNXXhzJp7RamNRyiyel8406CTld8a_tVQYNvyPVYTfO9C1WGPKNJmGJV/s1600/Marketing-design-2020217.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="783" data-original-width="1600" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXju44XGde6u7X4PTOgQ4qV0lpOzJFDQvG785Kn3PQirFN-AVhK-mZ2M1zybtrPlrfudkyNDhFJz9O5aB18DxhMNXXhzJp7RamNRyiyel8406CTld8a_tVQYNvyPVYTfO9C1WGPKNJmGJV/s640/Marketing-design-2020217.png" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal">
<div style="text-align: left;">
<span lang="EN" style="background: white; mso-highlight: white;">With countless tools and software widely available on the market today, digital nomads can run a business from the comfort of their own home, on a beach, from a coffee shop, or wherever they choose. While this lifestyle sounds ideal (and we're not disagreeing), how can remote workers ensure their sensitive information remains protected? Practicing safe online secure file transferring is the only way to guarantee the integrity of your data will remain unscathed. Think of secure file sharing like an insurance policy. Give yourself the peace of mind knowing your files will stay safe and guarded against online predators with Trustwire.
<o:p></o:p></span></div>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span></div>
<h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Why do Digital Nomads Need Secure File Sharing?</span></h2>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Secure file sharing is too often overlooked. This software is a critical component of how a company, large or small, sends and receives data between locations, customers, and other employees. In most cases, digital nomads are handling their client's private data and information on their own. Without a company to back them up, if there's a data breach, the business will surely fold. Trustwire is a top choice for freelance and remote workers looking for a secure, easy way to share and exchange files online. Trustwire balances reliable protection against cyber attacks while remaining easy to use, convenient, and affordable. Keep all of your passwords, sensitive client, and personal info safe from open transmission over a network.
<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div>
<div style="text-indent: -24px;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal">
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">What is the Trustwire Business Plan?
</span></h2>
<span lang="EN" style="background: white; mso-highlight: white;"></span><br />
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">The Trustwire Business Plan helps protect people, finances, devices, and businesses from fraud, online abuse, data breaches, and other security issues encountered online. Using true end-to-end encryption, all contents of files exchanged through Truswire will only be visible to the owner and the recipient. Plus, Trustwire is web-based, meaning users don't have to download or install an app to send or receive files safely online. Our monthly plan helps all digital nomads, no matter their line of work, from freelance lawyers, to journalists. We give you the confidence knowing when you share a file online with Trustwire; only the rightful owner will be able to see it. We never share, sell, or track our user's data. Our mission is to help small businesses, digital nomads, and freelance workers conduct business safely on the internet. With the threat of cyberattacks on the steady incline, what will you do to protect your business?</span><br />
<br />
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">What will you receive with the Trustwire Business Plan?</span></h2>
<ul>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">2 TB secure storage space for all your files.</span></li>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">The ability to send and access files from anywhere in the world with no download or software installation required.</span></li>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">The best end-to-end encryption software to protect your data.</span></li>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">Unlimited file exchanges.</span></li>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">Assurance knowing our encryption algorithms are 100% secure and do not have backdoors built-in.</span></li>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">Protection against malware, cyber attacks, security breaches, viruses, and malicious online activity.</span></li>
</ul>
<br /></div>
</div>
<div>
<div style="text-indent: -24px;">
<br /></div>
</div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">To learn more about how <a href="https://www.trustwire.com/" target="_blank">Trustwire</a> can be a useful tool against ransomware attacks and other cybercrimes.</span></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<!--EndFragment--><br /></div>
Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-22743341342135247952020-02-20T09:45:00.000-08:002020-02-20T10:01:17.144-08:00Encrypted file transfer software for professional teams<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:site" content="@MyTrustwire">
<meta property="og:site_name" content="Trustwire">
<meta property="og:title" content="Encrypted file transfer software for professional teams">
<meta property="og:image" content="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhe8XHY0SERUUa1YYdpTU8D_gpnd1r8kCgepsWNQpcyShIN0Zvws_9VcDd0GshIGA7exodj1Ahmoh2BAkNw1lyW9gNPNCoVaYHhGUvgsWWIFb8oDCrKhl1hVmbmgnZWfY6_sZJpFiXUMxos/s1600/Marketing-design-2020218.png">
<meta property="og:description" content="Professional teams, no matter the scope of their work, must have clear cut protocols in place for safe online practices. Cybercriminals are becoming more advanced by the minute. Is your data in jeopardy of a breach? With cyberattacks on the rise, it leaves many wondering, what is the most secure protocol for transferring files between team members? Read on to learn about the latest file transfer tools to ensure your business will remain safe from any security breaches.">
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhe8XHY0SERUUa1YYdpTU8D_gpnd1r8kCgepsWNQpcyShIN0Zvws_9VcDd0GshIGA7exodj1Ahmoh2BAkNw1lyW9gNPNCoVaYHhGUvgsWWIFb8oDCrKhl1hVmbmgnZWfY6_sZJpFiXUMxos/s1600/Marketing-design-2020218.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="783" data-original-width="1600" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhe8XHY0SERUUa1YYdpTU8D_gpnd1r8kCgepsWNQpcyShIN0Zvws_9VcDd0GshIGA7exodj1Ahmoh2BAkNw1lyW9gNPNCoVaYHhGUvgsWWIFb8oDCrKhl1hVmbmgnZWfY6_sZJpFiXUMxos/s640/Marketing-design-2020218.png" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal">
<div style="text-align: left;">
<span lang="EN" style="background: white; mso-highlight: white;">Professional teams, no matter the scope of their work, must have clear cut protocols in place for safe online practices. Cybercriminals are becoming more advanced by the minute. Is your data in jeopardy of a breach? With cyberattacks on the rise, it leaves many wondering, what is the most secure protocol for transferring files between team members? Read on to learn about the latest file transfer tools to ensure your business will remain safe from any security breaches.
<o:p></o:p></span></div>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span></div>
<h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Why Regular File Sharing Tools Aren't Enough:</span></h2>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">You may be thinking free online tools like email, Dropbox, and Google Drive are secure enough to send data between and your fellow co-workers. Unfortunately, that's not the case. These big-name companies are not only less reliable, but they have the liberty to look at any information you may send or receive to their full discretion. That means that your business's data isn't adequately protected during file transfers. With this comes the massive risk of your delicate information being stolen or leaked. This can cause irreversible damage to your company, brand image, and reputation.
<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div>
<div style="text-indent: -24px;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal">
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Encrypted File Transfer Tools:
</span></h2>
<span lang="EN" style="background: white; mso-highlight: white;"></span><br />
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Without a doubt, co-workers will have to share, send, and receive data from one another. How can you ensure a secure file transfer within a company? The most secure protocols use encrypted files to share information. Encryption has proven to be the most effective way to achieve ultimate data security and avoid cyberattacks or malicious online behaviors. Trustwire uses end-to-end encryption to ensure your data is safe from malicious acts. Any team that handles sensitive client information like layers, doctors, and journalists must uphold high standards of security to ensure the integrity of their business. </span><br />
<br />
<br />
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">What's Coming Up Next at Trustwire?</span></h2>
<span lang="EN" style="background: white; mso-highlight: white;"></span><br />
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">We fully understand the need for team members to communicate safely with one another. That's why we created "Channel," the new feature coming shortly to Trustwire. With Channel, users can create private communication channels and invite others to enter and share files. We offer the most secure transmission between business teams. Channel eliminates the possibility of data being lost or stolen on regular communication channels. Conducting all file transfers through the new Trust Wire Channel means unparalleled security against cyber attacks, identity theft, security breaches, malware, and other malicious behaviors. Our new secure file transfer service was created, especially for large and small businesses. We are here to help make file sharing easy, safe, and quick, so your projects will run smoother. Give everyone on the team access to relevant documents anytime, anywhere. </span> </div>
<br /></div>
</div>
<br />
<div>
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Do Send Documents Securely Over the Internet with Trustwire:</span></h2>
<div style="text-indent: -24px;">
<br /></div>
</div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Trustwire is a browser-based file transfer method. Using the latest end-to-end encryption software, Trustwire guarantees your files will be shared safely with only the rightful recipient. Our free service means no more trips hand-delivering data, worrying about cybersecurity breaches, and knowing the information you divulge to your CPA, lawyer, or doctor remains secure. With Trustwire, you can easily exchange and access files anywhere in the world, and no downloads or installations are required. Are you ready to start surfing the internet securely? Sign up for a <a href="https://www.trustwire.com/" target="_blank">free account here</a>.</span></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<!--EndFragment--><br /></div>
Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-84225710206786932152020-01-21T08:51:00.000-08:002020-01-21T09:07:12.377-08:00Sending Documents Safely Over The Internet: What To Do And What Not To Do<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:site" content="@MyTrustwire">
<meta property="og:site_name" content="Trustwire">
<meta property="og:title" content="Sending Documents Safely Over The Internet: What To Do And What Not To Do">
<meta property="og:image" content="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgimfgfDOvYt1Wlf5psYNS7eSzLLqVdLF4auNnI5sED_dLlYGFG7RADzwZAxzKWQHHCCM3QWWxhPEjPynfDQ0cy_NNYhBdvbovs_PXMcfZxMe8ATa-kjCcghDhjoY9IbmlPKw6569Apw8p7/s1600/Marketing-design-20200123.png">
<meta property="og:description" content="It happens to all of us; at some point, we need to send some form of sensitive information over the internet. In some cases, we can hand deliver documents, but those opportunities are few and far between. ">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgimfgfDOvYt1Wlf5psYNS7eSzLLqVdLF4auNnI5sED_dLlYGFG7RADzwZAxzKWQHHCCM3QWWxhPEjPynfDQ0cy_NNYhBdvbovs_PXMcfZxMe8ATa-kjCcghDhjoY9IbmlPKw6569Apw8p7/s1600/Marketing-design-20200123.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="783" data-original-width="1600" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgimfgfDOvYt1Wlf5psYNS7eSzLLqVdLF4auNnI5sED_dLlYGFG7RADzwZAxzKWQHHCCM3QWWxhPEjPynfDQ0cy_NNYhBdvbovs_PXMcfZxMe8ATa-kjCcghDhjoY9IbmlPKw6569Apw8p7/s640/Marketing-design-20200123.png" width="640" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal">
<div style="text-align: left;">
<span lang="EN" style="background: white; mso-highlight: white;">It happens to all of us; at some point, we need to send some form of sensitive information over the internet. In some cases, we can hand deliver documents, but those opportunities are few and far between. Instead, we have to rely on technology. Whether it's tax season, receiving test results from your doctor, or collaborating with a financial planner, do you know how to remain safe from cybercriminals? Everyone, no matter your age, location, or profession, should have a strong understanding of how to safely communicate sensitive information on the internet.
<o:p></o:p></span></div>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span></div>
<h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Don't Send Sensitive Info by Email:</span></h2>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">When it comes to cybersecurity, many of us assume that if we're using a major Email provider, like Gmail, Yahoo, or Outlook, our information is safe. This is a common misconception. Email is not encrypted, meaning a third party can easily access your chats. When you rely on Emails to send financial information like tax documents, or personally identifiable information (PII) such as medical records, you're exposing this content. Cybercriminals don't need your username or password to gain full access to all of your personal information. They can do this by attacking the recipients of your Emails. For example, if the recipient is using an unsecured public WiFi network, your personal information is within grabbing distance to the cybercriminals who know precisely how to take it.
<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div>
<div style="text-indent: -24px;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal">
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Do Hand Deliver:
</span></h2>
<span lang="EN" style="background: white; mso-highlight: white;"></span><br />
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Placing files directly in the hand of the recipient will eliminate a data breach during transfer. This may be convenient to hand documents off to a doctor, CPA, or lawyer. However, this method isn't doable for most.
Tip: If you do hand deliver, be sure to verify what the business's cybersecurity measures are and how they plan to handle your information. </span><br />
<br />
<br />
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Do Use Encryption Services:</span></h2>
<span lang="EN" style="background: white; mso-highlight: white;"></span><br />
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">You can encrypt your files with programs like 7-Zip or VeraCrypt before sending them to the recipient. Many of the encryption technologies used by these companies are up to par. However, the recipient of the files must use the same software to retrieve it. </span> </div>
<br />
<br />
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Don't Fully Trust Encrypted File-Sharing Services:</span></h2>
<br />
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Services like Dropbox allow users to store and share files using their software, but it's not without risk. Aside from being subject to several security breaches, Dropbox can access the content of your shared and personal files. </span> </div>
<br /></div>
</div>
<br />
<div>
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Do Send Documents Securely Over the Internet with Trustwire:</span></h2>
<div style="text-indent: -24px;">
<br /></div>
</div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Trustwire is a browser-based file transfer method. Using the latest end-to-end encryption software, Trustwire guarantees your files will be shared safely with only the rightful recipient. Our free service means no more trips hand-delivering data, worrying about cybersecurity breaches, and knowing the information you divulge to your CPA, lawyer, or doctor remains secure. With Trustwire, you can easily exchange and access files anywhere in the world, and no downloads or installations are required. Are you ready to start surfing the internet securely? Sign up for a <a href="https://www.trustwire.com/" target="_blank">free account here</a>.</span></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<!--EndFragment--><br /></div>
Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-72339413503090032512020-01-17T09:00:00.001-08:002020-01-21T07:29:45.433-08:00Digital Security Habits Journalists Should Adapt<br />
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzqIYHoym410Ax4yrvWuOrrt8ZKhDeNi8iZQuCnj63XWIzGu4z1z4tYBd7zNOk2fDhG-eMJ4Hcqr3lPuYqxzBAHEmsRECz-L7vSI7kuYXEqGfJoKqhCogNCMCAJ8xlZDn_sWxoguM3E8jC/s1600/Marketing-design-20200118.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="783" data-original-width="1600" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzqIYHoym410Ax4yrvWuOrrt8ZKhDeNi8iZQuCnj63XWIzGu4z1z4tYBd7zNOk2fDhG-eMJ4Hcqr3lPuYqxzBAHEmsRECz-L7vSI7kuYXEqGfJoKqhCogNCMCAJ8xlZDn_sWxoguM3E8jC/s640/Marketing-design-20200118.png" width="640" /></a></div>
<div class="MsoNormal">
<div style="text-align: left;">
<span lang="EN" style="background: white; mso-highlight: white;">Cyber-crimes are a bigger threat now than ever before. Technology evolves quickly, and journalists, especially, should incorporate additional vigilance when it comes to keeping their information safe from online predators. Investigative journalism may serve the public with secretive breaking news stories, but it comes with a price. Journalists are often the target of online attacks orchestrated by a government after reporting misconduct. Whether it be aimed at smearing a journalist's reputation, discrediting their work, or taking over an account, a journalist's career is constantly at risk. How can you run your journalism business securely? Follow these digital security precautions below to ensure your business is protected.
<o:p></o:p></span></div>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span></div>
<h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Use End-to-End Encryption Technology:</span></h2>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Encryption technology allows journalists to protect their work from the eye of the government. Unfortunately, state surveillance and monitoring put journalists at severe risks of online attacks. Encryption will enable businesses and consumers to conduct business securely. From lawyers sending financial documents to a doctor divulging personal health information, end-to-end encryption is used to ensure this sensitive data is only in the hands of the rightful owners.
<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div>
<div style="text-indent: -24px;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal">
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Always Stay Up to Date:
Are Backdoors Coming Soon to Encryption Apps?
</span></h2>
<span lang="EN" style="background: white; mso-highlight: white;"></span><br />
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">A backdoor allows unauthorized access to a computer system or encrypted data that bypasses the system's standard security measures. More government officials are pushing to introduce backdoors in all popular messaging apps that offer end-to-end encryption. What does this mean when it comes to running your business securely? These backdoors would allow the government to access any private conversations between businesses, consumers, citizens, and sources. As of now, this isn't in effect, so to best keep your intimate conversations private, always communicate on an encrypted software. </span><br />
<br />
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Operate Your Journalism Business Securely with Trustwire:</span></h2>
<span lang="EN" style="background: white; mso-highlight: white;"></span><br />
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Exposing human rights violations, shedding light onto oppressive regimes, and reporting on a government's flaws is no easy feat. The groundwork is tough, and journalists regularly put their jobs and, in more extreme cases, their lives on the line to find a story. Trustwire provides end-to-end encryption technology for free. Use Trustwire to send and receive data from any computer around the world. Using the strongest available encryption technology on the market, your sensitive information will be kept secure from cybercriminals. Only you and whomever you wish to receive the content will have access to it. When it comes to digital security, journalists must be at the top of their game. Let Trustwire help you successfully, safely, and effectively run your business. </span> </div>
<br />
<br />
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Tips for Journalists to Protect Online Communications:</span></h2>
<ul>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">Never leave your devices unattended.</span></li>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">Use passwords to protect all of your online activity.</span></li>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">Use an antivirus AND an anti-malware. </span></li>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">Regularly update your operating system. </span></li>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">Delete your digital tracks - cookies, browsing history, and always log out of social media sites.</span></li>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">Only use encrypted messaging apps, like Trustwire. </span></li>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">Install a VPN to encrypt your Internet connections.</span></li>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">Activate your firewall.</span></li>
<li><span lang="EN" style="background: white; mso-highlight: white;">Segment your digital activities. Use several email addresses like a personal one, a professional one, and one for shopping online.</span></li>
</ul>
<br /></div>
</div>
<div>
<div style="text-indent: -24px;">
<br /></div>
</div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">To learn more about how <a href="https://www.trustwire.com/" target="_blank">Trustwire</a> can be a useful tool against ransomware attacks and other cybercrimes.</span></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<!--EndFragment--><br /></div>
Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-79301147229714734852019-12-28T07:07:00.002-08:002020-01-17T08:52:43.182-08:00Encrypted File Sharing Protects Your Business Against Ransomware Attacks
<br />
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglMtS8uS7bSJy10T7qi95x5Kcsq4mPPy_zsEbDc6yVNHdHdDY9bST7pHFNZ0dxfzM4scHBQlEAHlpounlZsMUweFYdwOdP8VpA0H4Sz1XcLT3oORyzHbJq6Z_xa-bqvtp3T6NXCzAj6CKE/s1600/Marketing-design-20191222.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="783" data-original-width="1600" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglMtS8uS7bSJy10T7qi95x5Kcsq4mPPy_zsEbDc6yVNHdHdDY9bST7pHFNZ0dxfzM4scHBQlEAHlpounlZsMUweFYdwOdP8VpA0H4Sz1XcLT3oORyzHbJq6Z_xa-bqvtp3T6NXCzAj6CKE/s640/Marketing-design-20191222.png" width="640" /></a></div>
<br />
<div class="MsoNormal">
<div style="text-align: left;">
<span lang="EN" style="background: white; mso-highlight: white;">The FBI has reported ransomware is a growing cybersecurity concern among business owners. Cybercriminals are using a strain of malware to gain access to business networks and encrypting their data. Files and folders are locked down by the attackers who, in turn, demand a ransom from the victim to restore access to the data upon payment. For professionals trying to run a business, the fear of a ransomware attack and the devastating effects it can have on the business, are at the forefront of their minds. How will you ensure your business is safe from a ransomware attack?
</span></div>
</div>
<div class="MsoNormal">
<br /></div>
<h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Common Types of Cybersecurity Breaches:</span></h2>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<div style="text-align: left;">
<span lang="EN" style="background: white; mso-highlight: white;">Ransomware attacks usually happen when an employee unknowingly downloads malicious software. Encrypting ransomware will often come via an email attachment. Once the victim opens the download, malicious code is launched and allows the attacker to install a program on the employee's device. Once this happens, the employee is usually shown instructions for how to pay the ransom to get the decryption key. What's the solution? Encrypted file sharing can help protect a network from a ransomware attack.
<o:p></o:p></span></div>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span></div>
<h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Encrypted File Sharing and Ransomware:</span></h2>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Many businesses, especially those who deal with multiple client's personal data daily, understand the importance of encrypting sensitive files. Ransomware takes cyber attacks to another level. Ransomware could infiltrate a user's device just by visiting a web page, no matter if the victim agreed to download the software or not. Ransomware infiltrates a network and encrypts what is already encrypted or not. Today, end-to-end encrypted file sharing is still the safest way for businesses to share files online.
<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div>
<div style="text-indent: -24px;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal">
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">How to Prevent Ransomware Attacks:</span></h2>
<span lang="EN" style="background: white; mso-highlight: white;"></span><br />
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Practicing the best prevention methods is the easiest way to ensure your business is secure from the daunting cybercriminals flooding the internet. Education, encrypted file sharing, and maintaining backups will help keep your business and your employees safe. </span> <span lang="EN" style="background: white; mso-highlight: white;"><br /></span><br />
<ul>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">Always update software. Ransomware attackers exploit weaknesses found in software that hasn't been updated.</span></li>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">Education. Employees should be trained to be more aware of suspicious activity or emails coming from an unverified source. There must be a clear protocol on how to react if an employee receives a skeptical email. Companies should hold workshops on the best cybersecurity practices. </span></li>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">Always have a backup. If the victim does not have a backup of all the encrypted files, in most cases, they will be forced to pay the cyber attacker a ransom to get the encryption key.</span></li>
<li><span lang="EN" style="background: white; mso-highlight: white;">Use a trusted file sharing service. Platforms like Trustwire make secure file sharing for businesses easy. Using end-to-end encryption, Trustwire helps prevent against ransomware attacks and other cybersecurity attacks. </span></li>
</ul>
<br /></div>
</div>
<div>
<div style="text-indent: -24px;">
<br /></div>
</div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">To learn more about how <a href="https://www.trustwire.com/" target="_blank">Trustwire</a> can be a useful tool against ransomware attacks and other cybercrimes.</span></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<!--EndFragment--><br /></div>
Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-57086712795619847752019-12-21T10:03:00.000-08:002019-12-21T10:28:00.620-08:00Secure File Sharing with Clients - Why it's Critical For Your Business<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:site" content="@MyTrustwire">
<meta property="og:site_name" content="Trustwire">
<meta property="og:title" content="Secure File Sharing with Clients - Why it's Critical For Your Business">
<meta property="og:image" content="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgotKGYJQV6E2no9aBVLpmp0jxBYqh_7NAXr1AkGE5ajdvPrQkgjCD3cM4MSgevuv2woCspSj9F8_PUdc3TLjLwyYCVX04PDc-OJOs5rpqoVul9GToFXfDhiDl1yMyLkJdWeCSPqj1opAb_/s1600/Marketing-design-20191221.png">
<meta property="og:description" content="Have you ever heard the phrase "your business is only as important as the content you share?" Well, the same can be said when it comes to protecting your client's sensitive information. If you don't have a reliable file sharing platform, ">
<br />
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgotKGYJQV6E2no9aBVLpmp0jxBYqh_7NAXr1AkGE5ajdvPrQkgjCD3cM4MSgevuv2woCspSj9F8_PUdc3TLjLwyYCVX04PDc-OJOs5rpqoVul9GToFXfDhiDl1yMyLkJdWeCSPqj1opAb_/s1600/Marketing-design-20191221.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="783" data-original-width="1600" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgotKGYJQV6E2no9aBVLpmp0jxBYqh_7NAXr1AkGE5ajdvPrQkgjCD3cM4MSgevuv2woCspSj9F8_PUdc3TLjLwyYCVX04PDc-OJOs5rpqoVul9GToFXfDhiDl1yMyLkJdWeCSPqj1opAb_/s640/Marketing-design-20191221.png" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<div class="MsoNormal">
<div style="text-align: left;">
<span lang="EN" style="background: white; mso-highlight: white;">Have you ever heard the phrase "your business is only as important as the content you share?" Well, the same can be said when it comes to protecting your client's sensitive information. If you don't have a reliable file sharing platform, your clients can trust, your businesses may be looked over, or taken less seriously. File sharing is nothing new, and the average internet user is probably familiar with the more popular file-sharing services like Dropbox. While common file-sharing services are excellent for the average person wanting to share photos of their kid's graduation or pictures from mom's birthday party, business owners need to step up their game.
</span></div>
</div>
<div class="MsoNormal">
<br /></div>
<h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">What's Different about Business File Sharing?</span></h2>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<div style="text-align: left;">
<span lang="EN" style="background: white; mso-highlight: white;">If you're running a business, cybersecurity must be at the top of your priority list. Companies require added security, data must be readily backed up, and clients need to feel secure when they provide you with personal information. Cybersecurity breaches are at an all-time high. Anyone who works closely with their client's personal information, such as doctors, lawyers, journalists, and entrepreneurs, having a secure file sharing system is crucial to the success of the business. Clients must continually be reassured that their sensitive information is always safe.
<o:p></o:p></span></div>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span></div>
<h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Trustwire: What Makes Us Unique?</span></h2>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Use Trustwire to ensure your business is participating in the safest possible file sharing practices on the web. Trustwire uses end-to-end encryption with no built-in backdoors, making it the most reliable method when it comes to storing and sharing data. With Trustwire, your personal information will be kept private. Other file-sharing services like Dropbox and Google Drive hold the right to access your data at any time without warning. All files stored, accessed, and sent with Trustwire are not accessible by the platform. The Trustwire platform was created with convenience, easy accessibility, and user-friendliness in mind. Trustwire is simple to use and does not require previous tech knowledge. Plus, clients will not have to clog their memory systems with downloading an application or software to use Trustwire.
<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div>
<div style="text-indent: -24px;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Conduct Business Anywhere in the World</span></h2>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Trustwire is accessible from any computer, anywhere in the world. Are your employees going on a business trip? Has one of your staff members lost their laptops? With Trustwire, no matter where your device is, your information will remain secure. Use Trustwire's business-level SecureLink feature to receive files with the same level of encryption, regardless if the sender is a Trustwire user.<o:p></o:p></span><br />
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<br />
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Share Files Securely with Clients</span></h2>
<span lang="EN" style="background: white; mso-highlight: white;"></span><br />
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">A business can't be successful without clients. Any business owner will say keeping their clients satisfied is usually the most significant problem they face daily. Trustwire will never sell personal information, access your data, create profiles, or send countless marketing emails to clients. Trustwire offers 24/7 customer support. Gain peace of mind knowing your data files are safely stored, shared securely, and fully protected against cyber attacks. </span> <span lang="EN" style="background: white; mso-highlight: white;"><br /></span><br />
<br /></div>
</div>
<div>
<ul>
</ul>
<div style="text-indent: -24px;">
<br /></div>
</div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Trustwire has unparalleled ease of use, meaning that your employees can quickly adjust to working with it. Furthermore, Trustwire is available on any device, anywhere in the world. E</span><span style="text-indent: 0px;">arn more about how your business can begin protecting its valuable intellectual property with <a href="https://www.trustwire.com/" target="_blank">Trustwire</a>.</span></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<!--EndFragment--><br /></div>
Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-28806257058846861792019-11-29T22:36:00.001-08:002019-11-29T22:54:54.987-08:00How to Share Files Securely and Protect Your Device<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:site" content="@MyTrustwire">
<meta property="og:site_name" content="Trustwire">
<meta property="og:title" content="How to Share Files Securely and Protect Your Device">
<meta property="og:image" content="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkPhtJaGQND6wB51vYqwFL0dULllCE6R03bBZp8M1-OMrgAGdJmr77XZ8i_sYk7QVdRo2JOAnZOJMzhbG0Jefzb03dLTexBg1DjL2ML2jRuYvbeniZeEuEPxnR0YlFOhQCySlnH80m1Mdg/s1600/Marketing-design-2091130-06.png">
<meta property="og:description" content="If you own a business where your client's information is at risk, surely you are concerned with the safety of your customer's sensitive info being leaked, stolen, or breached. ">
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkPhtJaGQND6wB51vYqwFL0dULllCE6R03bBZp8M1-OMrgAGdJmr77XZ8i_sYk7QVdRo2JOAnZOJMzhbG0Jefzb03dLTexBg1DjL2ML2jRuYvbeniZeEuEPxnR0YlFOhQCySlnH80m1Mdg/s1600/Marketing-design-2091130-06.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="783" data-original-width="1600" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkPhtJaGQND6wB51vYqwFL0dULllCE6R03bBZp8M1-OMrgAGdJmr77XZ8i_sYk7QVdRo2JOAnZOJMzhbG0Jefzb03dLTexBg1DjL2ML2jRuYvbeniZeEuEPxnR0YlFOhQCySlnH80m1Mdg/s640/Marketing-design-2091130-06.png" width="640" /></a></div>
<div class="MsoNormal">
<div style="text-align: left;">
<span lang="EN" style="background: white; mso-highlight: white;">If you own a business where your client's information is at risk, surely you are concerned with the safety of your customer's sensitive info being leaked, stolen, or breached. It's a fear among most business owners in the US, especially small business owners like private doctors, journalists, small enterprise owners, and lawyers. Cybersecurity is a problem that business owners decades ago never had to encounter, but in 2019 we are in the midst of the digital revolution. The days of storing your client's records in a filing cabinet are over. While going digital has had massive benefits for businesses worldwide, along with it has come an immense influx of cyberattacks. Many are left wondering what the best way to share files securely is?
</span></div>
</div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span></div>
<h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Secure File Sharing - What To Do And What Not To Do</span></h2>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<ul>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">Don't: Send sensitive documents over email</span></li>
</ul>
<span lang="EN" style="background: white; mso-highlight: white;">While sending an email may feel private, keep in mind the recipient may not have a protected server and may download your file from an unencrypted HTTP connection. If they're doing so from a public wi-fi network, the chances of a security breach are much higher.
<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<br />
<div class="MsoNormal">
<ul>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">Do: Safeguard your computer</span></li>
</ul>
<span lang="EN" style="background: white; mso-highlight: white;">A cybersecurity measure you should always take it safeguarding all of your devices. Always install anti-virus programs, never leave computers unattended, and conduct software updates on the regular. When choosing passwords, go for ones that are not easily guessed and back up your files regularly.
<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<br />
<div class="MsoNormal">
<ul>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">Don't: Rely Solely on Cloud Storage</span></li>
</ul>
<span lang="EN" style="background: white; mso-highlight: white;">Cloud storage providers like Dropbox and Google Drive are among the most popular. However, note that both of these services can gain full access to your files at any given time, meaning if there is a security breach, your data could be affected. These large companies may even look at your information for marketing purposes.
<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<br />
<div class="MsoNormal">
<ul>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">Do: Use an encrypted file-sharing service</span></li>
</ul>
<span lang="EN" style="background: white; mso-highlight: white;">Many file-sharing services offer encrypted transmission for file sharing. Trustwire uses only trusted and verified open-source cryptography libraries to ensure your files are protected. Trustwire guarantees never to sell or give away data and gives its users full control over their records.
<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Secure File Sharing With Trustwire</span></h2>
<h2>
<div class="MsoNormal" style="font-size: medium; font-weight: 400;">
<o:p></o:p></div>
<div class="MsoNormal" style="font-size: medium; font-weight: 400;">
<br /></div>
<div class="MsoNormal" style="font-size: medium; font-weight: 400;">
<span lang="EN" style="background: white; mso-highlight: white;">While there are plenty of ways to share files online, most of those methods are not reliable. Many existing software platforms may offer features like document password protection, but that doesn't mean it applies to every file or folder. Plus, hackers today are smarter and more ruthless than ever before. The only way to ensure the files you wish to share remain private is with some form of end-to-end encryption. Trustwire uses real end-to-end encryption to guarantee that only the owner of the file can access and share the contents. Trustwire can not decrypt its user's files, making it the most secure file sharing service available. With cybersecurity breaches on the rise, be sure your devised are protected from malicious hackers with Trustwire.
</span></div>
</h2>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div>
<ul>
</ul>
<div style="text-indent: -24px;">
<br /></div>
</div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Trustwire has unparalleled ease of use, meaning that your employees can quickly adjust to working with it. Furthermore, Trustwire is available on any device, anywhere in the world. E</span><span style="text-indent: 0px;">arn more about how your business can begin protecting its valuable intellectual property with <a href="https://www.trustwire.com/" target="_blank">Trustwire</a>.</span></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<!--EndFragment--><br /></div>
Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-57939516737732719472019-11-21T10:58:00.002-08:002019-11-22T08:47:37.800-08:00Preventing a Data Breach in Business<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:site" content="@MyTrustwire">
<meta property="og:site_name" content="Trustwire">
<meta property="og:title" content="Preventing a Data Breach in Business">
<meta property="og:image" content="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0q4U_CY3S-oeG5eptQQvwB1mlke72ugg-vVZNQp8v11icPW2tgB2rR8FrpD6qo6pieZGjupimNP7FL9xijnxEPIBQV-Xz4FyI1mYoPa-RZ4ur-2jbRY-ZeugVfFznb4_zbfRJeLrf6IbE/s1600/Marketing-design-20190916-04.png">
<meta property="og:description" content="A data breach exposes sensitive, confidential, and protected information to an unauthorized person or cybercriminal, who may exploit it or share it without permission. "><div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0q4U_CY3S-oeG5eptQQvwB1mlke72ugg-vVZNQp8v11icPW2tgB2rR8FrpD6qo6pieZGjupimNP7FL9xijnxEPIBQV-Xz4FyI1mYoPa-RZ4ur-2jbRY-ZeugVfFznb4_zbfRJeLrf6IbE/s1600/Marketing-design-20190916-04.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="783" data-original-width="1600" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0q4U_CY3S-oeG5eptQQvwB1mlke72ugg-vVZNQp8v11icPW2tgB2rR8FrpD6qo6pieZGjupimNP7FL9xijnxEPIBQV-Xz4FyI1mYoPa-RZ4ur-2jbRY-ZeugVfFznb4_zbfRJeLrf6IbE/s640/Marketing-design-20190916-04.png" width="640" /></a></div>
<br />
<div class="MsoNormal">
<div style="text-align: left;">
<span lang="EN" style="background: white; mso-highlight: white;">A data breach exposes sensitive, confidential, and protected information to an unauthorized person or cybercriminal, who may exploit it or share it without permission. When it comes to the integrity of your business and keeping it secure, a data breach can be devastating, especially for those who work with the most sensitive client information like lawyers, doctors, and journalists. During a breach, clients will lose trust, your company loses money, and the risk of identity theft rises. How will you keep your business safe? Cybersecurity solutions are the only way to guarantee your client's info is fully protected. Read on to learn the best ways to prevent a data breach in business.
</span></div>
</div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span></div>
<h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Who Causes Data Breaches?</span></h2>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">When many of us think of a security breach, our minds go directly to hackers and internet criminals. While malicious actors conduct many cybersecurity breaches in business, insider breaches and accidental breaches happen more often than you may think.
<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div>
<div style="text-indent: -24px;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">What Causes a Data Breach in Business?</span></h2>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<ul>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">Human Error: This could happen if a co-worker reads files on another colleague's computer without permission. While it could be unintentional and harmless, the data will still be considered breached because an unauthorized person viewed it.</span></li>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">A Malicious Insider: This is a person who is employed by the company and has insider access to data. They purposely expose data with the intent to cause harm to an individual or company. While this person may have approved access to use the data, they have the intention to use it in destructive ways.</span></li>
<li><span lang="EN" style="background: white; mso-highlight: white;">Lost or Stolen Devices: If an employee forgets or loses their laptop or external hard drive somewhere and the devices aren't encrypted, the sensitive information is considered breached. </span></li>
<li><span lang="EN" style="background: white; mso-highlight: white;">Malicious Outside Cyber Attacks: These are hackers who will use various methods to alter, steal, destroy, expose, and gain unauthorized access to private information from a network or an individual. </span></li>
</ul>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<br />
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">The Damaging After-Effects of a Data Breach:</span></h2>
<span lang="EN" style="background: white; mso-highlight: white;"></span><br />
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">A data breach will not only have a damaging effect on your company's customer base, but will also lead to a bad reputation, and most importantly, a massive financial loss. A breach puts off potential customers who may be weary your business can protect their personal information.</span></div>
</div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">How Do I Keep My Business Safe?</span></h2>
<h2>
<div class="MsoNormal" style="font-size: medium; font-weight: 400;">
<o:p></o:p></div>
<div class="MsoNormal" style="font-size: medium; font-weight: 400;">
<br /></div>
<div class="MsoNormal" style="font-size: medium; font-weight: 400;">
<span lang="EN" style="background: white; mso-highlight: white;">If you think your business is unlikely to fall victim to a data breach, think again. In 2019 alone, over 36 percent of small businesses have experienced a data breach. Always educate employees on good security practices and update your software. However, that's not enough. Implementing proper cybersecurity is the only way to ensure your customer's personal information is safe from malicious cyber hackers. Trustwire uses Strong end-to-end encryption to ensure that only the rightful owner of the data can send and share it. Trustwire gives your clients the confidence they deserve when they really sensitive information.
</span></div>
</h2>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div>
<ul>
</ul>
<div style="text-indent: -24px;">
<br /></div>
</div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Trustwire has unparalleled ease of use, meaning that your employees can quickly adjust to working with it. Furthermore, Trustwire is available on any device, anywhere in the world. E</span><span style="text-indent: 0px;">arn more about how your business can begin protecting its valuable intellectual property with <a href="https://www.trustwire.com/" target="_blank">Trustwire</a>.</span></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<!--EndFragment--><br /></div>
Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0tag:blogger.com,1999:blog-5388486242016220402.post-56334135710927002792019-10-31T05:58:00.001-07:002019-11-01T04:43:42.414-07:00The future will run on 5G - How will the new era impact cybersecurity?<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:site" content="@MyTrustwire">
<meta property="og:site_name" content="Trustwire">
<meta property="og:title" content="The future will run on 5G - How will the new era impact cybersecurity?">
<meta property="og:image" content="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmwFEFnRenPMrvx4Faa1WNldO9cw0stmnt40gZWCHs-ftDHBEqQfEGfdb-adR1fweo2aExZuxHF5UQXrNy-9QWKp5dOz6FaHHrj_r-WLHpKBAyfqKD12cdT4UUvpBgrp7DYkKWQUXZCijc/s1600/Marketing-design-2091031-03.png">
<meta property="og:description" content="The fifth-generation cellular network technology, 5G, will launch a new era of wireless connections, completely changing the way we consume content.">
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmwFEFnRenPMrvx4Faa1WNldO9cw0stmnt40gZWCHs-ftDHBEqQfEGfdb-adR1fweo2aExZuxHF5UQXrNy-9QWKp5dOz6FaHHrj_r-WLHpKBAyfqKD12cdT4UUvpBgrp7DYkKWQUXZCijc/s1600/Marketing-design-2091031-03.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="783" data-original-width="1600" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmwFEFnRenPMrvx4Faa1WNldO9cw0stmnt40gZWCHs-ftDHBEqQfEGfdb-adR1fweo2aExZuxHF5UQXrNy-9QWKp5dOz6FaHHrj_r-WLHpKBAyfqKD12cdT4UUvpBgrp7DYkKWQUXZCijc/s640/Marketing-design-2091031-03.png" width="640" /></a></div>
<div class="MsoNormal">
<div style="text-align: left;">
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<br />
<span lang="EN" style="background: white; mso-highlight: white;">The fifth-generation cellular network technology, 5G, will launch a new era of wireless connections, completely changing the way we consume content. With faster speeds, more reliable connections, and lower latency, businesses need to begin supporting this explosive rate of new tech innovation. Projections show that the number of 5G users will climb to over a billion by 2023. Better cybersecurity will be part of the demands businesses must undergo to be part of the new evolution. Will the evolutionary 5G network implement new privacy challenges?
</span></div>
</div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span></div>
<h2 style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">The security risk of 5G:</span></h2>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">When we make the transition into a 5G world, several things will happen:
<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div>
<ul>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">Exponentially faster speeds, higher capacity, and more flexible service delivery.</span></li>
<li><span style="background-color: white; font-size: 12pt; text-indent: -18pt;">Organizations will provide better content and offer an excellent user experience.</span></li>
<li><span lang="EN" style="background: white; mso-highlight: white;">Greater edge-based computing. 5G servers will have the intelligence to act as application servers. </span></li>
</ul>
<div style="text-indent: -24px;">
<br /></div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">5G will enable new technology that isn’t yet available today, and the world at large should expect substantial potential benefits. However, the implementation of 5G technology will also create new opportunities for those who wish to exploit it. 5G will disrupt the traditional relationships between networks, computing resources, and end-users, causing a notable impact on cybersecurity.
<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">5G and your privacy:</span></h2>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Challenges such as access to local info, health and lifestyle data, and leakage of personal voice are very real privacy concerns when it comes to 5G security. Remember, adequate 5G protection will not be a one-size-fits-all approach. With the upcoming different 5G entities, each will require different security needs.<o:p></o:p></span><br />
<span lang="EN" style="background: white; mso-highlight: white;"><br /></span>
<br />
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">5G and end-to-encryption:</span></h2>
<span lang="EN" style="background: white; mso-highlight: white;"></span><br />
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">When it comes to secure file sharing, end-to-end encryption has been the go-to for the past decade. How will you ensure your sensitive info is safe when we make the change to 5G? Cybersecurity solutions will have the challenge of deciphering which web traffic contaminated and conclude if any traffic is malicious. One way people are choosing to keep their sites safe is through Encrypted Traffic Analytics. ETA uses advanced algorithms to detect malicious traffic patterns of encrypted traffic. The technology can identify potential threats hiding in encrypted traffic. Exploring the potential benefits of ETA may be the key to keeping your website secure when 5G is in full swing.</span></div>
</div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">What can you do?</span></h2>
<h2>
<div class="MsoNormal" style="font-size: medium; font-weight: 400;">
<o:p></o:p></div>
<div class="MsoNormal" style="font-size: medium; font-weight: 400;">
<br /></div>
<div class="MsoNormal" style="font-size: medium; font-weight: 400;">
<span lang="EN" style="background: white; mso-highlight: white;">Whether you’re ready or not, 5G is on its way, and it’s best to prepare as soon as possible.
</span></div>
</h2>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<h2 style="font-family: "arial" , "times" , "helvetica"; font-size: 12pt; line-height: normal;">
<span style="font-size: large;">Three steps to preparing for 5G</span></h2>
<h2>
<div class="MsoNormal" style="font-size: medium; font-weight: 400;">
<o:p></o:p></div>
<div class="MsoNormal" style="font-size: medium; font-weight: 400;">
<br /></div>
<div class="MsoNormal" style="font-size: medium; font-weight: 400;">
<span lang="EN" style="background: white; mso-highlight: white;">1. Cybersecurity technologies are a must. Don’t look at them as an added cost; instead, see them as strategies to ensure your organization remains safe during the changing times.
<br /><br />
2. Don’t let security woes ruin the opportunity for your organization to reap the benefits of 5G.
<br /><br />
3. Start preparing now, so when the time comes, you will be ready. Don’t wait until you deploy 5G to implement a better security strategy. Start using cybersecurity technology now to stay ahead of the game.</span></div>
</h2>
<div>
<ul>
</ul>
<div style="text-indent: -24px;">
<br /></div>
</div>
<div class="MsoNormal">
<span lang="EN" style="background: white; mso-highlight: white;">Trustwire has unparalleled ease of use, meaning that your employees can quickly adjust to working with it. Furthermore, Trustwire is available on any device, anywhere in the world. E</span><span style="text-indent: 0px;">arn more about how your business can begin protecting its valuable intellectual property with <a href="https://www.trustwire.com/" target="_blank">Trustwire</a>.</span></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s1600/Marketing-design-20190913-03.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="606" data-original-width="1600" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilZf-FwYG9NRbkjWB7_stTujg2j5PJ7Mxt9837-srwxOqLhsMsUZnLL1G9H4yr1qb_1u2jSdzp1gzjHT9XEQ8LzszUuV8CgPm-ywVjbtZDp9ZnB-mmVwu6w5OvKabLN9Z8MqO9s-j3KCWi/s640/Marketing-design-20190913-03.png" width="640" /></a></div>
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<div class="MsoNormal" style="font-family: arial, times, helvetica; font-size: 12pt; line-height: normal;">
<br /></div>
<!--EndFragment--><br /></div>
Esther Chouhttp://www.blogger.com/profile/07699713189026832849noreply@blogger.com0