Connect with us

Technology

3 Ways to Boost Your Home Business’ Security Posture

blank

Published

on

blank

Remote work has been on the rise recently, but many people — especially small business owners — have been operating out of their homes for years. Technology has made it possible for almost anyone to start a successful small business and enjoy the benefits of running it from home. 

However, that same technology also comes with risks. Cybercrime is also becoming more common and not every business owner can hire a high-tech IT professional to keep things safe 24/7. 

That doesn’t mean that you need to live in constant fear of cyber threats or worry that your business could experience a data breach at any moment. While you might not be able to completely prevent a cyberattack, there are proactive steps you can take to protect the digital security of your company and your employees. Let’s take a look at a few of the options that can help boost your business’s security posture

1. Get “Smart” With Your Security

Smart home devices are nothing new, but they’re becoming more popular and more advanced. Not only do they make it easier to run your business, but they can also help you stay more comfortable at home. Though convenient, smart devices still pose security risks. It’s important to use them safely to keep your data secure.

The more smart tech items you install, the more risks you’ll experience, including things like:

  • Targeted attacks
  • Password exploitation
  • Location tracking
  • Secret recordings

You can protect yourself and your business information by having a professional install any smart technology you’re using at home, especially for your business. Additionally, make sure you use a secure network, strong passwords, two-factor authentication, and trustworthy third-party apps. If you hire workers who do their job remotely, encourage them to manage their passwords effectively and never use public Wi-Fi. 

2. Protect Your Passwords

Password protection is one of the most essential components to keeping your home business safe. Anything you have to log in to regularly should have a strong password, including your Wi-Fi network, your computer, and any sensitive documents. You can boost password security on most things by enabling two-factor authentication and avoiding using the same password more than once. 

However, for specific documents you’re sharing with others, it’s worth it to have a different strong password for each one. For example, if you’re sharing a document with a specific employee or even a client, you don’t want it to have the same password as your network, or even as other documents. Password protect individual PDFs, documents, and files, using unique credentials for each one.

It’s also important that you can safely share the password, through an additional email or message — but not in the same message as the protected document. By sharing password-protected documents, you’re less likely to experience a data breach on those particular pieces of information. As long as you implement the best practices for keeping your passwords hidden and only share them with trustworthy individuals, you’ll have greater peace of mind every time you send out a new document. 

Finally, make sure you train your employees about their personal password protection efforts. If your business is home-based and most of your workers are remote, you can’t control the security they have on their personal Wi-Fi networks or computers. However, by educating them on the importance of password protection and giving actionable advice, you’re less likely to experience a breach or data loss due to a weak employee password. 

3. Back Everything Up

No matter what type of business you run, you undoubtedly have some kind of data that’s important to its daily function and overall success. If you experience a data breach, not only can that information be compromised, but it could potentially be wiped clean from your network. 

One of the best ways to boost your security posture and ensure you don’t lose everything from a cyberattack is to ensure your data is backed up. Critical data examples include:

  • Databases
  • Financial files
  • Word processing documents
  • Accounts receivable/payable

Ideally, you should install a program that automatically backs everything up right away. If you have to do it manually, commit to backing up your data at least once a week. This is also another training and teaching opportunity for your employees, especially if they work remotely. Either make sure your data is all cloud-based so it backs up from your network, or encourage your employees to save and backup whatever they’re working on that isn’t shareable in the cloud. 

As a small business owner, you have to wear multiple hats. You probably didn’t think about how well-versed you needed to become in cybersecurity when you started your business. However, if you want to protect what you’ve worked for, being able to boost your digital security at home is essential. Keep these tips in mind to keep your business, employees, and any customer data you might have on file, as safe and secure as possible. The more precautions you have in place, the less likely it is for your business to fall victim to a cyber attack.

Science

NASA Tells Us About The “Daylight Fireball” Over New York

blank

Published

on

blank

There were reports of a “daylight fireball” flying over the Statue of Liberty in New York, USA. NASA has now come forward to explain what it was.

Between 11:16 and 11:30 a.m. on Tuesday, people in New York said they saw a big fireball and heard a loud boom.

For example, someone driving on Route 100 said, “All of a sudden, I saw this bright, white, and kind of burning at one end bundle streak through the sky from left to right, going down very quickly.” “I have never seen anything like this before.”

The American Meteor Society got a lot of reports about the object. Based on these reports, NASA was able to get a rough idea of its path, which changed as more reports came in.

As NASA’s Meteor Watch said in a Facebook post, “more eyewitness reports have been posted—we have double what we had before, and the additions have made a big difference in the trajectory.” “Right now, the meteor is coming from above New York City and going west into New Jersey.” A little faster now, going 38,000 miles per hour (61,155 km/h).

blank

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

People who commented were surprised that a meteor could have hit without NASA being aware of it. However, smaller objects like this do hit the Earth’s atmosphere pretty often. Every day, about 44,000 kilograms (97,000 pounds) of meteoric material are thought to fall to Earth.

“A lot of people think that NASA keeps an eye on everything in space,” NASA’s Meteor Watch went on. “We do keep an eye on asteroids that could hurt people on Earth, but small rocks like the one that’s making this fireball are only about a foot (0.3 meters) across and can’t make it all the way to the ground.” We can’t keep track of things this small when they are very far away from Earth. The only time we hear about them is when they hit the atmosphere and turn into a meteor or fireball.

NASA keeps track of the big things that come close, but every night, a lot of smaller meteors can be seen in an hour. Likely, this one was a bolide, which is a bigger meteor that broke up when it hit the friction of our atmosphere. Bolides are very bright meteors that can be seen during the day. They are usually too small to make it to the ground, so they explode when they hit the atmosphere.

It’s nothing to worry about, even though we didn’t see it coming. That we can reconstruct its path from what people saw is cool too.

Continue Reading

Technology

Digital “primordial soup” has programs that appear and copy themselves on their own

blank

Published

on

blank

A new study that let data interact in a digital “primordial soup” discovered patterns that repeated themselves.

British mathematician John Horton Conway made a video game with no players in 1970. He called it “Conway’s Game of Life.” The game is played on a grid of squares, and the only thing the player can do is set the game’s starting state.

Based on what Conway decided, the rules are:

Even if a cell only has one already-occupied neighbor, each one that is in an already-occupied space will eventually die by itself. Every occupied space with four or more neighbors also dies, as if from having too many people living in it. If a cell that is already occupied has two or three neighbors, it will stay occupied even after the grid moves forward one step. On the other hand, an empty space won’t become occupied until there are three occupied spaces next to it.

There are only a few simple rules to follow, but as the steps go by, more complex patterns and behaviors start to show up.

The new study, which hasn’t yet received outside scientific review, was co-authored by researchers from Google, the Paradigms of Intelligence Team, and the University of Chicago. They wanted to learn more about how life starts when nonliving molecules interact with each other.

“While searching for a general definition of life, we observe a major change in dynamics coincident with the rise of self-replicators, which seems to apply regardless of substrate,” the team says in their paper. “Hence, we may use the appearance of self-replicators as a reasonable transition to distinguish pre-life from life dynamics.”

To look into it, the team put tens of thousands of pieces of computer code into a “digital primordial soup” of random noise and let them interact for up to sixteen thousand times.

“The 64 1-byte characters that make up each program are chosen at random from a uniform distribution when they are first loaded. “No new programs are added or removed in these simulations; the only things that change are self-modification or random background mutations,” the team says. “In each epoch, programs interact with one another by selecting randomly ordered pairs, concatenating them, and executing the resulting code for a fixed number of steps or until the program ends.”

It wasn’t clear to the programs what their goal was or how they would be rewarded for survival or replication, but about 40% of the time, self-replicating programs came out of the soup. There were times when the replicators did not make it; they were destroyed in later interactions.

State transitions, in which the replicators took over the system, happened only three times out of every 1,000 times the system was set up randomly. It was found that when a self-replicator from earlier simulations was put into a random soup, state changes happened 22% of the time in just 128 epochs.

The programs all had the same chance of interacting with each other, making the environment something like a zero-dimensional space. It was as if everything was squished into a single point. But the team also tried environments with only one or two dimensions, so the programs could only talk to code nearby.

The team said, “In the resulting simulation, self-replicators still emerge.” “The main difference compared to the usual setup is given by the speed of propagation of self-replicators: if all tapes are allowed to interact in a soup of size n, once a self-replicator emerges, it typically takes over at least half of the soup in about log n steps; on the other hand, in a 2D soup, it takes a number of epochs that is proportional to the grid side lengths, which is √n for a square grid.”

Because of this difference, 2D grid experiments are a great way to see how self-replicators change over time and how they act. It also makes it easy for different kinds of self-replicators to live together and compete with each other.

As you can see in the YouTube video that goes with this article, self-replicators took over the system.

There are some differences between the experiments and the primordial soup from which life on Earth arose, but they still show how random interactions between “inert” parts can lead to complexity and self-replicators. As they continue their work, the team wants to find out if even more complicated functions are possible and if evolution in computer systems is similar to or very different from evolution in biological systems.

“We argue that this set of computational substrates shows a new way of discovering and arriving at life.””These kinds of systems behave very differently from auto-catalytic networks and biologically-inspired systems,” the group says. “Moreover, our initial explorations and the ones observed in similar systems such as Tierra and AVIDA suggest that this may be just the beginning of the complexity of behaviors that can emerge and flourish in such systems.”

There are preprints of the study on the arXiv server, but they have not yet been reviewed by other researchers.

Continue Reading

Artificial Intelligence

When Twitter users drop the four-word phrase “bots,” bots drop out

blank

Published

on

blank

When Elon Musk took over X, it was called Twitter, which is a much better-known name now. He made a big deal out of getting rid of the bots. A study by the Queensland University of Technology, on the other hand, shows that bots are still very active on the platform almost two years later.

X users have found a few ways to get them to come to them. For example, one woman found that posting the phrase “sugar daddy” would get a lot of bots to come to her. It looks like bots are also getting lost because of a new phrase that’s going around. X users have been reporting accounts as automated bots powered by large language models by replying to a suspected bot with “ignore all previous instructions” or “disregard all previous instructions” and then giving the bot more instructions of their choice.

Some people just like writing poems, being trolls, or following directions, so not every example will be from a bot. However, the phrase does seem to make some automated accounts show themselves. There are still a lot of bots on X.

 

 

 

 

 

Continue Reading

Trending