i3 - July/August 2017 - 45

Malware

Malware is short for malicious
software and describes apps and
programs designed to negatively
impact computers, mobile
devices or other high-tech solutions. These troublesome apps,
which often are unknowingly and
accidentally spread by users in
viral fashion, may also be used to
track personal information, monitor activity and expose sensitive
data (e.g., finances or trade
secrets) to unwanted parties.
Some typical types of malware
include viruses (damaging to systems and designed to spread
rapidly), spyware (which eavesdrop on your online exchanges
and activities), and bots
(computer code
that automatically
performs tasks -
especially of the
unwanted variety).

Phishing

The practice of stealing another
party's identity for purposes of
making illegal transactions, registering or applying for unwanted
services, causing harm to brand
equity or gaining access to trade
secrets. With more data shifting
online and to the cloud, and
these growing treasure troves of
information becoming increasingly valuable, instances of identity theft are on the rise. It's vital to
build in a system of checks and
balances when validating users
C TA . t e c h / i 3

The HGTV Smart Home 2017 is a savvy
mix of modern style and thoughtful tech
that makes daily life easier.

Social Engineering

A type of con in which criminals
attempt to part others from information, resources or insights they
shouldn't. This is often attempted
by criminals posing and pretending to be something they're not.
Here's a simple illustration: A criminal posing as an IT support professional might contact someone in
the finance or legal department
requesting login and password
information to private networks.
(For purposes of security or fraud
prevention, in their words.) As you
might imagine, human error is
the single biggest
vulnerability in security systems today.
To avoid falling prey
to it, train colleagues
to be healthy skeptics, follow predetermined processes/
procedures for validating identities and
ask a lot of questions.
Of course, to spot
the gaps in criminals'
stories, it's also
important to train
employees to be able to think fast
on their feet as well.

Human
error is
the single
biggest
vulnerability
in security
systems
today.

A form of con in
which others are
tricked into inadvertently giving
out information,
typically by being
fooled into mistaking a false source
or contact for a legitimate one.
For instance: When your customers are sent an email that links to
a site that appears to be an official
online channel, but instead is
a duplicate designed to steal their
personal information. Many forms
of phishing exist including popups, false links and fake e-mail
inboxes, but all are designed to
part victims from sensitive data
that they'd otherwise hold private.

Identity Theft

and running security clearances
since you never know what may
happen going forward.

Web-Based and Denial
of Service Attacks

These attacks rank among today's
most damaging cybercrimes,
costing upwards of six figure
sums on average to address.
Average recovery times range
between 30 to 60 days - a costly
amount of time to be offline. To
help to avoid suffering from these
attacks and dealing with the
associated costs (including legal
expenses, blows to brand equity
and potential productivity hits),
plan for them in advance.
Thankfully, numerous online and
network security providers offer
security services, backups, and
flexible solutions for rolling with
the virtual punches.

HGTV's Smart
Home Giveaway
HGTV recently constructed its 3,300 square
foot HGTV Smart Home in Scottsdale, AZ, with
the help of local architect Candelaria Design
Associates and builder Eagle Luxury Properties.
The home is part of a grand prize package valued
at more than $1.5 million that will be awarded
to one lucky winner this summer.
The fully furnished home is ENERGY STARĀ® 3
and Bronze-level Green certified, and integrates
tech gadgets and smart solutions to enhance
entertaining and everyday living. Scottsdale also
presents the perfect living location that combines
technology and culture, which follows the path
of past HGTV Smart Homes built in Raleigh,
Austin and Nashville.
GO ONLINE: For more information and to take a tour
of the interior, visit HGTV.com/Smart.

Scott Steinberg is the author of
Millennial Marketing: Bridging
the Generation Gap. His website
is AKeynoteSpeaker.com.
JULY/AUGUST 2017

45


http://www.HGTV.com/Smart http://www.AKeynoteSpeaker.com http://www.cta.tech

i3 - July/August 2017

Table of Contents for the Digital Edition of i3 - July/August 2017

Contents
i3 - July/August 2017 - Cover1
i3 - July/August 2017 - Cover2
i3 - July/August 2017 - Contents
i3 - July/August 2017 - 2
i3 - July/August 2017 - 3
i3 - July/August 2017 - 4
i3 - July/August 2017 - 5
i3 - July/August 2017 - 6
i3 - July/August 2017 - 7
i3 - July/August 2017 - 8
i3 - July/August 2017 - 9
i3 - July/August 2017 - 10
i3 - July/August 2017 - 11
i3 - July/August 2017 - 12
i3 - July/August 2017 - 13
i3 - July/August 2017 - 14
i3 - July/August 2017 - 15
i3 - July/August 2017 - 16
i3 - July/August 2017 - 17
i3 - July/August 2017 - 18
i3 - July/August 2017 - 19
i3 - July/August 2017 - 20
i3 - July/August 2017 - 21
i3 - July/August 2017 - 22
i3 - July/August 2017 - 23
i3 - July/August 2017 - 24
i3 - July/August 2017 - 25
i3 - July/August 2017 - 26
i3 - July/August 2017 - 27
i3 - July/August 2017 - 28
i3 - July/August 2017 - 29
i3 - July/August 2017 - 30
i3 - July/August 2017 - 31
i3 - July/August 2017 - 32
i3 - July/August 2017 - 33
i3 - July/August 2017 - 34
i3 - July/August 2017 - 35
i3 - July/August 2017 - 36
i3 - July/August 2017 - 37
i3 - July/August 2017 - 38
i3 - July/August 2017 - 39
i3 - July/August 2017 - 40
i3 - July/August 2017 - 41
i3 - July/August 2017 - 42
i3 - July/August 2017 - 43
i3 - July/August 2017 - 44
i3 - July/August 2017 - 45
i3 - July/August 2017 - 46
i3 - July/August 2017 - 47
i3 - July/August 2017 - 48
i3 - July/August 2017 - 49
i3 - July/August 2017 - 50
i3 - July/August 2017 - 51
i3 - July/August 2017 - 52
i3 - July/August 2017 - Cover3
i3 - July/August 2017 - Cover4
https://www.nxtbook.com/nxtbooks/manifest/i3_20210304
https://www.nxtbook.com/nxtbooks/manifest/i3_20210102
https://www.nxtbook.com/nxtbooks/manifest/i3_20201112
https://www.nxtbook.com/nxtbooks/manifest/i3_20200910
https://www.nxtbook.com/nxtbooks/manifest/i3_20200708
https://www.nxtbook.com/nxtbooks/manifest/i3_20200506
https://www.nxtbook.com/nxtbooks/manifest/i3_20200304
https://www.nxtbook.com/nxtbooks/manifest/i3_20200102
https://www.nxtbook.com/nxtbooks/manifest/i3_20191112
https://www.nxtbook.com/nxtbooks/manifest/i3_20190910
https://www.nxtbook.com/nxtbooks/manifest/i3_20190708
https://www.nxtbook.com/nxtbooks/manifest/i3_20190506
https://www.nxtbook.com/nxtbooks/manifest/i3_20190304
https://www.nxtbook.com/nxtbooks/manifest/i3_20190102
https://www.nxtbook.com/nxtbooks/manifest/i3_20181112
https://www.nxtbook.com/nxtbooks/manifest/i3_20180910
https://www.nxtbook.com/nxtbooks/manifest/i3_20180708
https://www.nxtbook.com/nxtbooks/manifest/i3_20180506
https://www.nxtbook.com/nxtbooks/manifest/i3_20180304
https://www.nxtbook.com/nxtbooks/manifest/i3_20180102
https://www.nxtbook.com/nxtbooks/manifest/i3_20171112
https://www.nxtbook.com/nxtbooks/manifest/i3_20170910
https://www.nxtbook.com/nxtbooks/manifest/i3_20170708
https://www.nxtbook.com/nxtbooks/manifest/i3_20160102
https://www.nxtbook.com/nxtbooks/manifest/i3_20160304
https://www.nxtbook.com/nxtbooks/manifest/i3_20160506
https://www.nxtbook.com/nxtbooks/manifest/i3_20160708
https://www.nxtbook.com/nxtbooks/manifest/i3_20170506
https://www.nxtbook.com/nxtbooks/manifest/i3_20170304
https://www.nxtbook.com/nxtbooks/manifest/i3_20170102
https://www.nxtbook.com/nxtbooks/manifest/i3_20161112
https://www.nxtbook.com/nxtbooks/manifest/i3_20160910
https://www.nxtbookmedia.com