Generally speaking, we can say tech companies go to great lengths to never have to admit when they’ve made mistakes. Such is the case lately with the 2 most popular cloud-based email providers, Google’s Gmail/GSuite and Microsoft’s Office 365. They’re not being transparent about their latest foible, specifically that their latest “improvements” in artificial intelligence…
The biggest reasons to be concerned aren’t what you think.
WIMZKL (pronounced “whimsical”) is an Agile Knowledge Consultancy that quickly solves complex system challenges for your organization.
Don’t spend any money on cybersecurity until you read this.
DMARC dramatically minimizes the amount of phishing emails that get through to our inboxes.
Thoughts on contributing to a graduate course on Agile in Design Thinking cultures.
Here’s a friendly list of DO’s and DON’Ts to help protect you and yours this holiday season. Please – check it twice!
Don’t buy a VPN until you read this.
MacTech is a unique conference held in Los Angeles each November, designed for a niche community of world-class professionals working with Apple technology across contexts, disciplines, and cultures.
It’s easy to forget the Internet was built to share information across a global network, not keep it private. Sharing has become an essential part of life and that’s not going to change any time soon. Whenever we have something to share, in any format, there are a multitude of ways, tools, and modes to do that. Even stuff there was no intention of ever sharing somehow ends up out there. So, there’s pros and cons to all of this sharing.
Most people have no idea whether they have or haven’t used their Facebook account to log into other sites and services across the Web. Here’s some practical steps to find out and mitigate the risks.
Cyber Resilience Strategy is not a nice-to-have. The illusion of Cyber Security is gone. Cyber Security incidents will disrupt and compromise your productivity, reputation, and bottom line. They will incur massive losses. As a business leader, when unplanned events (like cyber attacks) disrupt your business, your employees, partners, and clients count on you to know…
Resilience Strategy asks important questions like: “Are privacy and security the same thing?”
Resilience is about protecting our interests, like privacy, and being prepared to act when unplanned events compromises them. California is leading the way in the US where protecting our privacy is concerned. What states will follow?
I recently had the honor and pleasure of sitting on a panel beside some of the most expert talent in the industry to discuss another polarizing topic: Social Engineering.
In meetings, I doodle + draw. It helps me listen + remember things, connect pictures to notions, memories to actions. It helps me quickly process things that are said into actionable tactics + strategies. These often turn into lists. As I get older, I do this more and more, which means I’m starting to get…
No one likes to think about crisis preparedness. That’s why so many people are not prepared when a crisis occurs. Nudging people to be prepared is no small feat. It requires equal parts emotional consideration, comprehensive intention + just enough assertive urgency in order to be successful. It’s a rare thing when it’s even a…
It’s fair to say that many of us, especially in the States, don’t know or much care about where our food comes from. That’s unfortunate enough but what even less people may be aware of is how cool farming cultures are. Farmers survive by quickly learning how to do many things when they need to…
WIMZKL is a proud sponsor of this year’s 10 Second Film Festival on behalf of Evanston’s District 65 Green Teams supporting sustainability awareness + education in our schools + community to help foster the next generation of environmental stewards. Watch some of this year’s favorite entries.
Here’s a great addition to your defense-in-depth strategy.
The Resilience Diagnostic defines, prioritizes, and quickly identifies practical, concrete steps to eliminate preventable risks across your organization. We require 40-60 hours to achieve this, depending on the complexity of your operation.
What you may not understand about Cyber Insurance, even if you already have some, can cost you more than risking not having any at all. There is a shift underway that impacts business + reputation when cyber incidents take place, beyond even GDPR. Please make time to read this.