Tag: presentation

  • Management in an age of information abundance

    Management in an age of information abundance

    The Twentieth Century was defined by abundant and cheap energy while this century will be shaped by our access to massive amounts of data.

    How do managers deal with the information age along with the changes bought about by technologies like the Internet of Things, 3D printing, automation and social media?

    Management in the Data Age looks at some of the opportunities and risks that face those running businesses. It was originally prepared for a private corporate briefing in June 2015.

    Some further background reading on the topic include the following links.

     

    Similar posts:

    • No Related Posts
  • Security in the age of connected kettles

    Security in the age of connected kettles

    A few weeks back I gave a presentation to the Australian Seniors Computer Clubs Association as part of Staying Safe Online Week.

    The presentation, Security In The Age of Connected Kettles, looked at where we are today with online security and some of the challenges facing individuals, businesses and communities as threats become more pervasive with cloud computing, personal technology and the internet of things while the people creating these risks become more professional.

    Overall, it’s not a cheery scenario and I end with a call to action that we have to start insisting business, public sector and political leaders start taking online security seriously as a public safety issue.

    Over ten slides we covered where we are today in personal and small business online security and some of the challenges facing individuals as computing moves onto the cloud and smartphones.

    The ongoing online safety battle

    Online safety is evolving as we move from PCs to tablets and smartphones, today the risks are increasingly appearing on our mobile devices although the desktop computer and email scams remain the biggest risk.

    It’s increasingly about the money

    A change to the security landscape in recent times has been the rise of professional malware. While a decade ago most of the hacks and viruses we saw were the work of people demonstrating their skills or causing mischief, today there is big money in compromising computers and capturing data.

    The rise of ransomware

    One of the best examples of the professionalisation of the internet’s bad guy is the rise of ransomware.

    Ransomware locks your computer with a demand for payment to release your data; if you don’t pay you lose all your information.

    Many of the online threats though are far more subtle; the theft of data from Target, compromises of Sony’s customer databases and ongoing security breaches illustrate how the risks are far greater than just on our desktop.

    Smartphone lockups

    Ransomware has moved off personal computers onto smartphones with both Android and Apple systems being attacked.
    The ‘hacked by Oleg Pliss’ message is a good example of how Apple’s products are just as much at risk as other companies’ platforms.
    Also the ‘hacked by Oleg Pliss’ lockup shows how the security aspects of cloud computing services are going to become more important to the average person.

    Security basics

    The basic advice for the average user remains the same;

    • Strong passwords
    • Don’t use common passwords
    • Be careful what you click on or visit
    • Keep your systems up to date
    • Have good security software

    However times are changing and many security issues are out of the average person’s control.

    Lessons from Heartbleed

    The Heartbleed Open SSL bug illustrated the limits of individuals in protecting their information. As a bug in the secure socket layer software, the Heartbleed Bug could expose sensitive data on websites using the service.

    The disappointing thing with Heartbleed is that people following good security policies were vulnerable.

    Probably the biggest threat with Heartbleed however is the Internet of Things, where relatively simple devices – the connected kettle – could expose security credentials.

    The Target hack

    Another example of how security is beyond the control of the individual user is the Target hack. Hackers found their way into the US department store’s network though an airconditioning contractor. From there, they were able to steal millions of customer payment details.

    The Target hack is one of dozens of similar coporate security compromises and this will continue until security is taken seriously by company directors and regulators.

    A pocket sized security breach

    As the Oleg Pliss hack showed, smartphones are not immune to security breaches.

    With our phones gathering increasingly more data on our behaviour, protecting the data they gather is going to become one of the biggest challenges facing us.

    Rich data

    Smartphones are not just gathering location data, as technologies like iBeacons roll out more information is being gathered from more sources.

    When we go shopping, attend a football game or visit the doctor these technologies are collecting information on our personal habits and behaviour.

    Not a generational issue

    One of the myths around security and privacy is that concerns revolve around the generations.

    The idea that only older people care about privacy or that younger folk understand technology is a myth.

    Unfortunately however our political and business leaders come from a segment of society that doesn’t care about or understand the technology or issues.

    If meaningful change is to be made in securing our information, then we’re going to have to demand our business and political leaders take these issues seriously.

    Similar posts:

    • No Related Posts
  • Cloud computing and Small Business September Digital Day

    Cloud computing and Small Business September Digital Day

    As part of the NSW state government’s Small Business September Digital Day for Startups and Growth Businesses, we’ll be looking at exactly what cloud computing is and how it can help businesses.

    Some of the services we discuss in the presentation are listed in the Netsmart’s web post on the 5 essential cloud computing tools for business. Although there’s many more we’ll mention that can help organisations of all sizes.

    Given the time constraints and the event’s focus is on the specific social media and cloud computing tools available to small business, much of the background information to the Online Tools to Turbocharge Your Business session is available in the previous series of posts about cloud computing previously done for the 2011 City of Sydney Let’s Talk Business series.

    Detailed information from that presentation can be found on the following pages;

    The networked business Part 1: What is cloud computing?
    The networked business Part 2: The benefits of cloud computing

    The networked business Part 3: Managing risk in the cloud

    The networked business Part 4: The business case for cloud computing

    All of the tools discussed in the Small Business September presentations are available in our ebook, Online Business Essentials which is available for all subscribers to our newsletter.

    If you’d like to see the presentations themselves, both The Networked Business and Online Tools to Turbocharge your Business are available through the Slideshare service.

    Seats are still available for both of the Digital Day presentations at the Telstra Experience Centre, Level 4, 300 George Street, Sydney. The Start Up session begins at 8.00am and the presentations for growth businesses begins at 1.00pm.

    Come along if you’d like to learn how social media and cloud computing can help your business improve productivity while building an online brand.

    Similar posts:

  • The Networked Business

    The Networked Business

    The first of the City Of Sydney’s Let’s Talk Business workshops looked at how business can use cloud computing services to help improve the marketing, operations and profitability.

    My presentation, Business In The Cloud covered the definition of cloud computing, the benefits for business, the risks and the case for getting on the cloud.

    The text of the presentation, shown here has been broken into four segments each addressing the individual points.

    What is the cloud?

    The opening section looked at what cloud computing is, the underlying definitions and how it works. We discussed how the underlying concepts of cloud computing are nothing new and how the concepts of shared resources across a reliable and robust network are part of the very reason for the Internet itself.

    The benefits of cloud computing

    Having defined cloud computing we look at the benefits of these services, focusing on the flexibility online software delivers and how businesses can use these tools to quickly seize opportunities in our fast changing society.

    Risky business

    Every new technology has its risks and cloud computing is no different. In our third presentation we look at some of the online traps and how to manage them.

    The business case for cloud computing

    Concluding the presentation is a summary of the business case, balancing the benefits and the risks and concluding with how businesses might use cloud services.

    Further information

    Illustrating how businesses can use online tools, we have a list of some of popular business cloud services that can help your organisation use the web to be more flexible and innovative.

    The presentation was part of the Let’s Talk Business series of workshops run by the City of Sydney and held at the Customs House. There’s three more events in the 2011 series covering the new consumer, mobile internet and business leadership.

    If you’ve been along to the Lets Talk Business events, or have some ideas on how business can use cloud services, we’d love to hear your comments.

    Similar posts:

    • No Related Posts