Month: January 2018

Tips & Tricks: Amazon Underground

If you’re a big fan of apps, then you’re going to love this.

Amazon Underground allows you to use apps that you would normally have to pay for, completely free of charge. Just sign up and you’ll get access to a whole load of paid-for apps completely free. Many of the apps also have in app content already there and paid for, too!


Tech Terms: Network Security

Network security is a specialized field in computer networking that involves securing a computer network infrastructure. Network security is typically handled by a network administrator or system administrator who implements the security policy, network software and hardware needed to protect a network and the resources accessed through the network from unauthorized access and also ensure that employees have adequate access to the network and resources to work.

A network security system typically relies on layers of protection and consists of multiple components including networking monitoring and security software in addition to hardware and appliances. All components work together to increase the overall security of the computer network.


Tips & Tricks: OK Google

You know the future has arrived when you can ask your phone questions, and it will find the answers for you.

Android phones are right at home with Google, and the “OK Google” functionality is very useful. You can even set it up to function from any screen. Move into your settings, and go into voice > OK Google. It will ask you to repeat the phrase a few times to recognise your voice, and you can then set when the command will be active. You can make it active on all screens, and ask Google anything you like, at any time.

Tech Terms: TCS

Theoretical computer science (TCS) is a subset of computer science that focuses on the mathematical topics as they relate to practical and modern day computing. A widely accepted view of TCS is the study of algorithms and protocols in modern computing. Many theoretical computer courses aim to provide students with a better understanding of fundamental computational techniques.

General Topics of Study
Studies touch on both theory and algorithms and protocols. Typical TCS courses taught at universities may include some or all of the following topics:

  • algorithm design
  • big data
  • coding theory
  • algorithmic game theory
  • analytics algorithms
  • quantum computing
  • cryptography
  • computational biology
  • randomness in computation
  • machine learning

Theoretical computer science may also be called computer science theory.


Tips & Tricks: Android Data Control

To make sure you don’t get a giant data bill thrown at you at the end of the month, you can now see how much data you’ve been using.

Go into Settings, and then into Data Usage. You’ll have a graph of what you’ve used so far this month, and will even be able to set your own limits. Take control of your data, and (hopefully) never get hit with an increased charge again.

Tech Terms: EMM

Enterprise Mobility Management (EMM) takes a comprehensive approach to securing and managing the use of smartphones, tablets and other mobile devices in enterprise environments.
Companies are faced with a wide variety of security and productivity concerns that stem from the increasing number of mobile devices brought into the workplace environment by employees for use and connectivity on corporate networks (also known as “Bring Your Own Device,” or BYOD), and enterprise mobility management is one holistic strategy for managing these concerns.

A Bevy of Mobile Device Security Acronyms: EMM, MDM, MAM, MIM and MSM
Often deployed in conjunction with mobile device management (MDM), which primarily involves protecting companies against unauthorized access to mobile devices, enterprise mobility management is designed to protect users’ data as well as provide users with tools for working more efficiently and productively while ensuring the security of their devices and the data contained on them.

The Holistic Approach
Enterprise mobility management’s holistic approach to securing and protecting the use of mobile devices may also involve mobile application management (MAM), mobile information management (MIM), mobile content management (MCM) and mobile security management (MSM). To this end, enterprise mobile management may include a combination of security and productivity solutions and services to create a comprehensive mobile device and security management strategy.


Tips & Tricks: Android Power Saving Mode

We’ve all been there. That train has been cancelled, and you’re desperately trying to search for another way to get home while your phone ticks down it’s last few percent.

The Android power saving modes are here to help. If you know it’s going to be a long day, but you need your phone on, you have a selection of modes to help your phone make it all the way through. The most efficient being the option that essentially turns your phone back into a Nokia 3310. It will ring, and receive texts – but that’s about it. Perfect for those unexpectedly lengthy trips home.

Tech Terms: Data Breach

A data breach, also called a security breach, is the phrase used to describe a security issue where the intentional or unintentional release of information takes place. Usually the information is private, confidential or personal information that was given in trust to the organization.

Why Data Breaches Happen
A data breach may occur for a number of reasons. For example, a data breach could be the result of unauthorized acquisition of personal information through employee negligence (i.e., photocopying) to computer hard drives not properly disposed of, to hackers gaining access to data through an exploit or other malicious attack.

Data Breach Notification Laws
Many countries or individual states/provinces have enacted some type of security and data breach notification law. These laws require government agencies and other organizations that collect personal information (including a name combined with SSN, drivers license or ID, account numbers, etc.,) to notify individuals of security breaches.

The exact requirement for notification laws change between places as well as the legal definition of what constitutes a breach, requirements and timing for notice and exemptions. In general if there is a perceived risk as a result of a data breach, the affected individuals and regulating government bodies should be notified.
Data Breach Security Checklist

While there are no specific set of rules to follow, most organizations will create a checklist to ensure a swift response to manage and mitigate a breach.

Webopedia Study Guide SectionThe first step is to create a policy that defines the organization’s definition of a breach, and identify what constitutes a breach, making sure it complies with any legal definitions set forth in your geographical location.
Webopedia Study Guide SectionNext, a plan will identify staff responsibilities and outline how to properly keep records of breach reporting and tracking. The plan should identify management support and approval processes and outline employees responsibilities to standardize behavior.
Webopedia Study Guide SectionLastly, organizations will need to have a breach procedure in place, derived from the plan and policy. This standardizes the responsibilities and actions that are part of the response effort and should identify senior management responsible for enacting the procedures.

The data breach procedure is typically reviewed, tested and enacted as part of an organization’s overall business continuity and disaster recovery procedure. The related links section below offers additional resources to help businesses create checklists and data breach policies.


Tips & Tricks: Android Device Manager

Losing your phone is a part of life. Sometimes it’s just until you’ve dug around in your duvet after you’ve fallen asleep, and others it’s because you’ve left it on the train (guilty).

The Android Device Manager allows you to track your phone from your PC, even letting you ring it if it’s currently in silent mode, so you can find it in your house quickly. If the worst happens, you can also erase your data remotely to protect yourself.

Tech Terms: Dedicated Server

A dedicated server is a single computer in a network reserved for serving the needs of the network. For example, some networks require that one computer be set aside to manage communications between all the other computers. A dedicated server could also be a computer that manages printer resources. Note, however, that not all servers are dedicated. In some networks, it is possible for a computer to act as a server and perform other functions as well.
In the Web hosting business, a dedicated server is typically a rented service. The user rents the server, software and an Internet connection from the Web host.