Image for post
Image for post

It is the beginning of a normal day and people are walking through the front door of your facility. It could be a retail location, an office, or a manufacturing plant. People are coming and going like they always do.

If you have access readers implemented, many of the people are using their badges or fobs to authenticate themselves as they walk in through the front door, the side doors, or the loading dock.

Everything is normal except your security guard did not show up to work.

They might be sick or self-quarantining. …

Image for post
Image for post
Image by Mohamed Hassan from Pixabay

Asking “How did you hear about us” is not enough.

It is important for any business to know where customer or client leads are originating. You want to understand more about your customer’s demographics, and you want to determine where to spend your marketing dollars and efforts in the future.

To achieve an understanding of how a prospective customer chose your business after considering their options, companies will usually ask that ubiquitous question: “How did you hear about us?”

This question is all about the business’s return on investment.

Was it a referral? That is important to know if you want to thank an existing customer. Was it a magazine…

“The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards — and even then I have my doubts.” — Gene Spafford

If you’ve ever wondered “how much security is enough?” you are not alone.

More and more personal information security measures seem to be mandatory — passwords, anti-virus, one-time code generators, SMS message codes, home firewalls, security webcams, smart doorbells, anti-ransomware, disk encryption…

Why, with all of this technology, are we still not secure?

The reason is both simple and complex.

The simple answer…

You undoubtedly know what a Deepfake is, but you may not know what it’s called or what it truly means. You may not know that there are different types of technology that can create fake videos and voices.

We are all familiar with “photoshopped” images, and how rampant they have become. We are also acquainted with the video effects (VFX) and special effects that have been used in films for decades. But a new age of fabricated media is upon us thanks to “Deepfakes.”

Deepfake and Deep Video Portrait technology are two similar but different techniques used in Hollywood movies…

Image for post
Image for post

2019 will be the most security-conscious year yet, with the general public more concerned and enterprise spending on defense and research growing relentlessly. However, for innovative and emerging technologies, security will also present new challenges to organizations large and small. The status quo of speed and functionality being chosen over security to address competition is highly likely to continue, and boards and corporate leaders need to be continually convinced as to the importance of security as part of strategic business objectives.

What is becoming more of a challenge? What is alleviating some of the burden on enterprises? For those looking…

April Wright

April C. Wright is a hacker, author, teacher, speaker, and community leader based in Boston, MA —

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store