Showing items posted by Dr Monica Seeley - 353 found.

Books on the bedside table

Posted Tuesday November 4th, 2014, 11:30 pm by

A trip to the USA means some unusual books made their way onto the table last month.

The Map Thief by Michael Blanding.  An esteemed dealer who becomes an obsessive thief of rare maps.  A must for any map collector but also a good read for those who like intrigue.IMG_2255

The Guest Cat by Takashi Hiraide.  A delightful story set in Japan with a very good insight in to Japanese culture and life.

Loving Frank by Nancy Horan.  Frank Lloyd was an inspirational architect and very naughty.  Not a new book but new to us.

Zingerman’s Guide to Good Eating by Ari Weinzweig. Zingermans is an institution in Ann Arbor MI and this wonderful book is by one of its founders.

Adventures in Stationery: a journey through your pencil case by James Ward.  They say the history of stationery is the history of civilisation.  How true.  This book also gives a history of some of the key inventors in the world of stationery such as Mr Biro.

The Innovators: how a group of hackers, geniuses and geeks created a digital revolution by Walter Isaacson.  Any new book by Isaacson is a must read and this is no exception for those interested in the evolution of the information age.

What’s on your bedside table (conventional or as an e-book)?

Tags: , , , , , , , ,

Read this post... | Comment on this post

November Articles of Note

Posted Tuesday November 4th, 2014, 10:52 pm by

Here are the articles and blogs which caught our attention in October.

  1.  Debrett’s misguided use of Bcc etiquette with a reply from Dr Seeley on the correct time and place to use bcc rather than To and cc.
  2. Three approaches to reducing email overload – guest post by Michael Einstein on why changing organisational email culture is so crucial.Typewritter
  3. Defend yourself: the police can’t cope with cybercrime.  The police can no longer cope with the scale of on-line fraud.  The City of London’s chief Police Commissioner urges users to act more responsibly.
  4. Cybercrime battling a growth industry. Cybercrime is estimated to cost industry over $400bn. A review of sources and strategies to tackle cyber crime.
  5. New Ponemon report shows cyber crime on the rise. Cybercrime is estimated to be rising by 10% per year.
  6. That itch to check your inbox is only human.   Its the marshmallow syndrome all over again, or is it?
  7. How tech is changing the way we think and what we think about. An off the wall look into the future from Clive Thomson author of ‘Smarter Than you Think’.

What have we missed. What did you read which caught you eye?

Tags: , , , , , , , , ,

Read this post... | Comment on this post

Close the email backdoor to cyber crime

Posted Tuesday November 4th, 2014, 9:59 pm by

Who is the weakest link in the fight against cyber crime? It is us the user. Click here to listen to how we leak data ever day through careless use of email. Without thinking we have either opened or sent an email which opens the door to cyber crime be it hacking, stealing our identity (phishing) and giving away confidential data.

There are many ways we can manage our email behaviour to reduce the risk to ourselves and our organisation of a breach of confidentiality and improve email related security. Here are our top five tips.

Email cyber crime

Email cyber crime

  1. Be alert to unusual emails even from well know colleagues, eg – updates, especially for you, my CV, money for XYZ crisis. Sadly, emails scams often pick up on recent natural disasters such as the Ebola crisis.
  2. Make sure when you go to a website that it really is genuine, ie BBC.co.uk really is BBC.co.uk. Before clicking on the link, hover over it and check what the url is showing in the bottom left-hand corner of your browser. If it looks suspicious stop and access the website directly from the browser address bar.
  3. Use Bcc when sending an email to many people – it limits the risk of spammers getting a list of email addresses.
  4. Set strong passwords for your email and other accounts. Click here for tips.
  5. When setting up a new social media account, selectively add only those contacts that you really need. Don’t use the default option of uploading you entire address book.

Education is the key to reducing the risk of an email predicated cyber attack. For a free five minute review of your email security behaviour and how you can improve it either call Mesmo Consultancy on 01202 434340 or email us now to book an appointment.

Tags: , , , ,

Read this post... | Comment on this post

Password Management; which is more annoying spam or forgetting your password?

Posted Wednesday October 15th, 2014, 9:17 pm by

According to recent research from Centrify (providers of identity management services) forgetting your password is more annoying than spam email.

The cost of cyber crime has doubled in the past four years according to recent research from Ponemon.  Strong passwords is one way to prevent prying eyes but Cyber crimejust how easy is it to construct one?  Also is it good to keep changing your password?

Back in 2010 Microsoft found that changing security words often cost billions of pounds as people wasted time constructing and memorising them and then forgetting them and worse leaving them unsecured.

Centrify now estimate that poor password management costs around £130,500 per year for a business of about 500 users.  How they arrive at that figure is not clear.  What is clear is that we really are not good at the basics of identity management.  The top five mistakes being:

1. Always use the same password whenever possible.
2. Rotate through a variety of similar passwords.
3. Keep a written password in a master book of passwords.
4. Use personal information in a password.
5. Avoid using complicated symbols or combining upper and lower case.

Security management behaviour can easily be improved although it often takes a cyber attack (personal or corporate) as a wake up call.  User education is key to reducing cyber crime.  Here are our five top tips.

1.  Avoid the traps identified above.

2.  Second, use strong passwords which are really very easy to construct and remember. Take a phrase and then build a password from the first letter of each word and turn some into capitals and numerics, for example make your ‘i’ and ‘1’ and add a couple of symbols.

3.  For those with multiple accounts consider using some form of password management software such as LastPass or Keepass.

4.  Where you have a choice adopt devices which have more than just password protection for example finger and retina recognition.

5.  Be vigilant about those emails which grab your attention telling you your accounts has been hacked.  Delete them without even opening them as they are almost certainly from spammers attempting some form of identity theft.

Email is often the open backdoor for a cyber attack. For more about how we help our clients to reduce the risk of email cyber crime through email best practice contact us now.

Tags: , , , , , , , , ,

Read this post... | Comment on this post

The Three Approaches to reducing Email Overload – Guest post by Dr Michael Einstein

Posted Tuesday September 16th, 2014, 10:32 am by

EinsteinMike2-100x150

Dr Michael Einstein

Many, business people receive 100 (or more) messages a day and spend 2 to 3 hours a day on email related activities, consuming 20 to 30% of their business day. Not surprisingly, many complain of suffering from email overload

Email, with its myriad of features, functions, and capabilities, combined with its high volumes and constant interruptions, has become one of the most frequently used yet continually challenging business applications for today’s workers to navigate.

So, what is the solution to managing email overload issues?  My research has found that the key strategies to deal with email overload fall into three broad approaches: organizationaltechnical, and behavioral.

1) Organizational approaches

Organizational approaches to reducing email overload incorporate the use of acceptable use policies as a way to set organization-wide rules for the appropriate, and inappropriate, use of email. These approaches are also referred to as email etiquette or netiquette, and focus on teaching people to use email more appropriately.

These can be employed differently depending upon the organization, ranging from being enforced as formalized policies, communicated as strongly suggested guidelines, or expressed as cultural norms of expected behavior. They establish a common set of values, expectations, and behaviors around the use of email, and work at the macro level, reducing the email overload burden for everyone.

2) Technical approaches

Technical approaches to reducing email overload leverage specific features and functionality in the email system itself as ways to reduce email overload. This approach has traditionally been the primary focus area for most email training programs with the goal on improving an individual’s fluency in the email system and thereby allowing people to use email more efficiently.

Research has found that there is often little formalized training on the use of email, as most people are (incorrectly) presumed to already be email proficient. Even those who deem themselves email savvy are often only familiar with a small fraction of their email system’s features and capabilities. A technical approach can yield significant improvements in individual email skills, resulting in large reductions in email overload.

For Outlook users, click here to check how savvy you are with your email software.

3) Behavioral approaches

Behavioral approaches to reducing email overload focus on improving the knowledge, actions, and behavior of individuals. This approach incorporates the areas of media competencies and email processing (triage) techniques and focus on teaching people to use email more effectively.

Media competencies include topics such as when email is an appropriate (or inappropriate) form of communication, how to build high-quality email subject lines, and writing structured message bodies. email processing (triage) encompasses focuses on strategies on how to best scan, analyze, and organize your messages. Behavioral approaches, the way you interact with email, are critical to reducing email overload.
Research has found that you must focus on improving skills across all three of these areas (Organizational, Technical, and Behavioral) in order to make the greatest improvements in your email skills and the largest reduction in email overload.

About the Author

Dr. Michael Einstein is a full-time business technology professional for a large multi-national corporation.
His doctoral dissertation was on the intersection of email processing skills, email overload, and technology training. He is very active in email overload research. For more information see his recently launched website which contains a wealth of resources to help others learn to better manage their inboxes and reduce their information and email overload levels.

Tags: , , , ,

Read this post... | 2 comments