Here is a copy of my contribution to a colleague’s new eBook recently released. You can obtain a free copy of Bob Hooey’s “Pivot to Present” eBook with many other idea-rich strategies to deliver your virtual message with impact. —- 2020 has been an interesting year, so far. Many feel there was a big reset …
One of the biggest inconveniences that COVID-19 has caused for businesses is the many meetings and in-person events that were planned. As a result, companies are forced to adapt and move entirely online or cancel events.
Not only that, but we’re not sure how long these sort of conditions are going to last. While Canada itself has passed the peak of cases, there are other countries that are still struggling. Overall, it looks like workshops and online meetings are going to be more common for all of us.
This pandemic has caused many businesses to make changes to how they conduct business. Out of the many changes that businesses have had to do, one such shift is the use of conference calls. Even before all of this occurred, video conferences were quite popular with 80% of executives saying these conferences are replacing audio conferences as the go-to method for internal communications.
For any IT department, mobile apps can be a total nightmare. There are millions out there and more are being made every day. Unfortunately many of the apps never were developed with security in mind.
While your IT department may not be working in this area, many IT organizations have tried to counter potential threats from mobile apps through various techniques over the years. Each one has had their own rate of success, but through their efforts, we’ve learned some methods to help with mitigating risks.
There have been countless breaches that have occurred over the years. Some of them have been after government bodies, but in most cases, hackers have been looking to gather data on folks like me and you.
While the use of that information gathered can vary widely, stollen information from places like banks or credit bureau agencies leave hackers more room to commit identity theft. What’s worse is in those instances those hackers can continue to exploit that information and leverage it indefinitely.