Pete Recommends – Weekly highlights on cyber security issues February 23, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Google Quiz – Can you spot when you’re being phished?; Don’t be fooled by fake images and videos online; Study of Password Managers; and Your smartphone is tracking you: How to stop it from sharing data, ads.

Subjects: Blockchain, Cybersecurity, Email Security, KM, Privacy

Pete Recommends – Weekly highlights on cyber security issues February 16 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Social Security and Medicare scam calls heating up – not just targeted at seniors; How to Wipe a Hard Drive (especially important when you upgrading to a new hard drive or computer); A secure relationship with passwords means not being attached to how you pick them; and Internet Privacy: Additional Federal Authority Could Enhance Consumer Protection and Provide Flexibility.

Subjects: Cybercrime, Cybersecurity, E-Government, Elder Law, Financial System, Healthcare, Intellectual Property, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues February 9, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Microsoft Security Lead Outlines the Perils of Still Using Internet Explorer; No more robocalls: How to block unwanted calls from iPhone, Android; How your health information is sold and turned into ‘risk scores’; and The Best Websites to Find out If You’ve Been Hacked.

Subjects: Cybercrime, E-Commerce, Email Security, Health, Privacy

Pete Recommends – Weekly highlights on cyber security issues February 2, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Lawmakers warn of ‘deepfake’ videos ahead of 2020 election; Cyberattacks in Medicine: Is Radiology the Weakest Link?; Vint Cerf sees a big danger from the internet of things; and Facebook’s ‘Friendly Fraud Scandal’: What Parents Need to Know.

Subjects: Congress, Courts & Technology, Cybercrime, Cybersecurity, Email Security, Legal Research, Legislative, Privacy, Social Media

LinkedIn 2019 Talent Trends: Soft Skills, Transparency and Trust

Global Industry Analyst Josh Bersin addresses critical employee workplace analysis validating people skills as highly rated employer HR and talent requirements. In professions for whom continuous delivery of outstanding customer services using collaborative and dynamic team efforts is the norm, Bersin’s data driven analysis is a benchmark to expand upon organizational mission, vision and values.

Subjects: AI, Communication Skills, KM, Leadership, Management

Pete Recommends – Weekly highlights on cyber security issues January 26 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: News outle’s email security gap; On Facebook and Twitter your privacy is at risk — even if you don’t have an account; The Smart TV Crapware Era Has Already Begun; and Mastercard Makes It Easier to Quit Free Trials.

Subjects: Cybersecurity, Email Security, Financial System, Privacy, Social Media

10 x 10: 100 Insightful KM Resources

KM expert Stan Garfield shares ten categories of KM resources, each with ten links to useful sources of knowledge about the field. The ten resources in each category are recommended starting points for those who want to learn more about KM. Each category heading is linked to a more extensive list for greater exploration.

Subjects: KM

Tax Fraud By The Numbers: The Trump Timeline

Former CPA, writer and teacher Ken Boyd provides readers with an explanation of tax fraud that is clearly presented, instructive and relevant to the ongoing Mueller investigation. Boyd uses the extensive New York Times investigative report of November 2018 that documented a history of tax fraud allegedly committed by Donald Trump, his father and siblings, as the foundation for his lesson on various types of tax fraud. The allegations documented by the Times are under review by the New York State Department of Taxation and Finance.

Subjects: Business Research, Legal Research, Legal Research Training, Public Records, Securities Law, Tax

Deep Web Research and Discovery Resources 2019

How big is the Deep Web? It is estimated to comprise 7,500 terabytes – although an exact size is not known, and the figures vary widely on this question. The magnitude, complexity and siloed nature of the Deep Web is a challenge for researchers. You cannot turn to one specific guide or one search engine to effectively access the vast range of information, data, files and communications that comprise it. The ubiquitous search engines index, manage and deliver results from the Surface web. These search results include links, data, information, reports, news, subject matter content and a large volume of advertising that is optimized to increase traffic to specific sites and support marketing and revenue focused objectives. On the other hand, the Deep Web – which is often misconstrued as a repository of dark and disreputable information [Note – it is not the Dark Web], has grown tremendously beyond that characterization to include significant content on a wide range of subject matters covering a broad swath of files and formats, databases, pay-walled content as well as communications and web traffic that is not otherwise accessible through the surface Web. This comprehensive multifaceted guide by Marcus Zillman providers you with an abundance of resources to learn about, search, apply appropriate privacy protections, and maximize your time and efforts to conduct effective and actionable research within the Deep Web.

Subjects: Big Data, Business Research, Competitive Intelligence, Discovery, Encryption, Privacy, Search Engines, Search Strategies