Generally speaking, we can say tech companies go to great lengths to never have to admit when they’ve made mistakes. Such is the case lately with the 2 most popular cloud-based email providers, Google’s Gmail/GSuite and Microsoft’s Office 365. They’re not being transparent about their latest foible, specifically that their latest “improvements” in artificial intelligence…
Privacy and Security Matter for Reasons You Haven’t Thought of. Yet.
The biggest reasons to be concerned aren’t what you think.
Please allow us to introduce ourselves.
WIMZKL (pronounced “whimsical”) is an Agile Knowledge Consultancy that quickly solves complex system challenges for your organization.
Here’s an idea: Security-harden your existing network using what you already have.
Don’t spend any money on cybersecurity until you read this.
DMARC: Everything you need to know in one post.
DMARC dramatically minimizes the amount of phishing emails that get through to our inboxes.
Agile + Design Thinking @ IIT’s IDx
Thoughts on contributing to a graduate course on Agile in Design Thinking cultures.
♪♫♬ It’s Beginning to Look A Lot Like Riskmas ♪♫♬
Here’s a friendly list of DO’s and DON’Ts to help protect you and yours this holiday season. Please – check it twice!
WTF Do You Need a VPN?
Don’t buy a VPN until you read this.
Next Up: MacTech
MacTech is a unique conference held in Los Angeles each November, designed for a niche community of world-class professionals working with Apple technology across contexts, disciplines, and cultures.
Why the GDPR is a Good Idea After All
It’s easy to forget the Internet was built to share information across a global network, not keep it private. Sharing has become an essential part of life and that’s not going to change any time soon. Whenever we have something to share, in any format, there are a multitude of ways, tools, and modes to do that. Even stuff there was no intention of ever sharing somehow ends up out there. So, there’s pros and cons to all of this sharing.
Facebook Hack: Steps to Move Forward
Most people have no idea whether they have or haven’t used their Facebook account to log into other sites and services across the Web. Here’s some practical steps to find out and mitigate the risks.
Eliminate preventable risks to protect your business from loss.
Cyber Resilience Strategy is not a nice-to-have. The illusion of Cyber Security is gone. Cyber Security incidents will disrupt and compromise your productivity, reputation, and bottom line. They will incur massive losses. As a business leader, when unplanned events (like cyber attacks) disrupt your business, your employees, partners, and clients count on you to know…
Are Security and Privacy the Same Thing?
Resilience Strategy asks important questions like: “Are privacy and security the same thing?”
California’s New Privacy Rules
Resilience is about protecting our interests, like privacy, and being prepared to act when unplanned events compromises them. California is leading the way in the US where protecting our privacy is concerned. What states will follow?
PANEL: Social Engineering
I recently had the honor and pleasure of sitting on a panel beside some of the most expert talent in the industry to discuss another polarizing topic: Social Engineering.
The Underrated Power
of Lists.
In meetings, I doodle + draw. It helps me listen + remember things, connect pictures to notions, memories to actions. It helps me quickly process things that are said into actionable tactics + strategies. These often turn into lists. As I get older, I do this more and more, which means I’m starting to get…
Keep this brochure!
No one likes to think about crisis preparedness. That’s why so many people are not prepared when a crisis occurs. Nudging people to be prepared is no small feat. It requires equal parts emotional consideration, comprehensive intention + just enough assertive urgency in order to be successful. It’s a rare thing when it’s even a…
Farmers Fight for Our Right to Hack
It’s fair to say that many of us, especially in the States, don’t know or much care about where our food comes from. That’s unfortunate enough but what even less people may be aware of is how cool farming cultures are. Farmers survive by quickly learning how to do many things when they need to…
10/65 Film Festival
WIMZKL is a proud sponsor of this year’s 10 Second Film Festival on behalf of Evanston’s District 65 Green Teams supporting sustainability awareness + education in our schools + community to help foster the next generation of environmental stewards. Watch some of this year’s favorite entries.
Use DNAT rules to prevent DNS hijacking.
Here’s a great addition to your defense-in-depth strategy.
Case Study – Resilience in Chicago
The Resilience Diagnostic defines, prioritizes, and quickly identifies practical, concrete steps to eliminate preventable risks across your organization. We require 40-60 hours to achieve this, depending on the complexity of your operation.
Prepare to Meet Fraud
What you may not understand about Cyber Insurance, even if you already have some, can cost you more than risking not having any at all. There is a shift underway that impacts business + reputation when cyber incidents take place, beyond even GDPR. Please make time to read this.