security, technology

Top 5 Technologies Helping to Shape the Future of Mobile

MobilityCommunication and mobility has changed drastically in the last ten years. We no longer use the cell phone as a means to simply place a phone call but rather it has become our moving office. With access to email, calendar and time management, internet research, online entertainment, fitness and health management, connecting with friends, or ranting on Twitter, the mobile device has become an extension of ourselves. Ofcom research from 2017 supports that mobile has overtaken the desktop as the main way users across the globe are accessing the internet. This is an important note for technology teams that support mobile or are tasked with creating the next big mobile application. Let’s take a look at how today’s technologies are shaping tomorrow’s mobile use.

  1. Mobile Security Solutions

mobilesecurityPopularity for mobile or wireless security solutions will increase as the sheer number of targets are available for compromise. Although mobile malware is a rare concern these days, it won’t be long before we hear about more targeted mobile attacks.  The chance for brand damage through data leakage, Wi-Fi interference, out-of-date devices is a growing concern as more mobile and IoT devices connect to the corporate network. Think about it. If the biggest threat is the user itself, and with mobile devices superseding the desktop for internet access, the target for cybercriminal activity will shift. CSO online states, “Human attack surface to reach 6 billion people by 2022. As the world goes digital, humans have moved ahead of machines as the top target for cyber criminals. There were 3.8 billion internet users in 2017 (51 percent of the world’s population of 7 billion), up from 2 billion in 2015.” [Source]

The threat to our daily communication and data continues to evolve and mutate like a living organism trying to find its way in an unknown environment. More than ever, security is and should be top of mind for any technology professional.

  1. Application Development

There will also be an enterprise race for mobile applications that help transform our lives. As the tools to design and create mobile apps rapidly change, the more advanced, more complex apps introduce new technologies like virtual assistants or AI bots designed to provide the ultimate experience by exceeding customers’ expectations. This is another technology wave sweeping over us as mobile moves to deliver amazing, consistent experiences to consumers while building brand equity. Combine apps with new-age technology like AR or VR and the stickiness is boundless for businesses and possibilities for users, endless.

  1. Analytics

analyticsThey are always watching, but in a good way. Along with a sweet mobile app, understanding the consumer behavior behind the app is the key to being able to deliver a delightful experience. Analytics applied to applications can offer insight into market, behavioral, and operational knowledge which can lead to better business decisions for the products or services offered.

  • Market – How many users using the app? Where are they located?
  • Behavioral – How is my user interacting with my application? How can I help direct them?
  • Operational – How is the performance of the application?
  1. Wearables & IoT

We’ll start to see an increased use of wearables and IoT making its way into the workplace. “Gartner expects wearables to have a 24% compound annual growth rate (CAGR) in revenue through 2020, reaching a total market value of $62 billion.” [Top 10 Technologies That Are Defining the Future of Mobility, Gartner, July 2018]

Wearables

Wearables like smartwatches, head-mounted displays (HMDs), and smart clothing is offering up unique opportunities and functionality for hospitals, service management, warehouse logistics, and even enabling a service technician doing repairs in the field. To sweeten the pot, integrate wearables and IoT with mobile for many productive roles within the business. When you connect the ‘things’ through one cohesive platform, like mobile, you can begin to perform greater functions like mass configuration, management, and monitoring to deliver business-based benefits. Think about sensor data delivering an alert to a technicians’ mobile device because the data center’s climate control has reached its threshold. This also provides a less intrusive avenue for alerts and notifications of those wearables and IoT devices.

  1. AR & VR

More AR & VR programs will make their way into mobile applications. What does that mean exactly? Often confused with each other, augmented reality or AR refers to the digital content overlaid on the real world and virtual reality or VR is a simulated, digital environment that shuts out the real world. Both technologies build on immersing the user in either an augmented (real) or virtual (fake) world and can be implemented through a mobile application.

loreal_arA great example of an augmented reality (AR) app is what L’Oreal has done in the beauty and makeup marketplace. You can take a picture of yourself with their app and then augment your hairstyle or try different shades of makeup to ensure the ‘right’ look. This ultimately leads the user to that perfect shade of eye shadow, enhancing the customer experience and inferring brand imprinting. AR applications present real-world opportunities for businesses to interact with their customers in a new, transformative way while also establishing brand delight.

Virtual reality (VR) is also making its way into marketing and branding efforts. A good example of this happening is in the automotive industry where manufacturers create a virtual experience of what it’s like to drive their car in an effort to increase sales. The introduction of this new technology is literally driving new experiences which have significant impact on brand and consumer awareness. Widespread adoption of VR will be much slower than AR because of the hardware requirements. However, the market impact of these technologies will be plentiful in a few years. “By 2020, the economic impact of virtual and augmented reality is predicted to reach $29.5 billion.” [Source]

Most often the future of technology is predicated upon forecasts, new development, and exploration.  Technology will always move forward, and the future of mobile technology will continue to pioneer uncharted lands and unveil new ways in which we will work and live.

Advertisements
security, technology

Meltdown & Spectre: A New Dawn

Meltdown and Spectre dominate the security news and the more I delve into it, the greater the understanding of the depth and breadth this now means for the future landscape of device security.

meltdown-spectre-kernel-vulnerabilityTurns out the three variants of side-channel attacks, Meltdown and two different for Spectre, were discovered back in June of last year [2017] by researchers using speculative execution, which is where processors execute on code and then fetch and store the speculative results in cache. It’s a technique used to optimize and improve the performance of a device. What is important to note with Spectre is that it puts users at risk for information disclosure by exposing the weakness in the architecture of most processors in the market, and the breadth is vast: Intel, AMD, ARM, IBM (Power, Mainframe Z series) and Fujitsu/Oracle SPARC implementations across PCs, physical and virtual servers, smartphones, tablets, networking equipment and possibly IoT devices.

Currently there are no reported exploits in the wild.

Of the two, Meltdown is the easier one to mitigate with operating system updates. AMD processors are not affected by Meltdown. Please see below for Microsoft KBs related to Meltdown. Spectre is a bit more complex to resolve because it is a new class of attack. The two variants of Spectre both can potentially do harm like stealing logins and other user data residing on the affected device. Intel, ARM, and AMD processors are affected by Spectre. Recently, Microsoft released another emergency update to disable Intel’s microcode fix. This original update was meant to patch for variant 2 of Spectre. Unfortunately, that update had adverse effects as there were numerous reports of reboots and instability, so Microsoft issued an out of band update to disable.

Things are still evolving around Spectre and while operating system updates and browser updates are helping to patch for Spectre, it is being reported by some sources that a true fix may be an update to the hardware (processor) itself.

The following is a chart* to clarify each vulnerability:

Meltdown Spectre
Allows Kernel Read Yes No
Patched with KAISER/KPTI Yes No
Leaks User Memory Yes Yes
Executed Remotely Sometimes Definitely
Likely to Impact Kernel Integrity Browser Memory
Practical Attacks Against Intel Intel, AMD, ARM
*Chart is courtesy of SANS/Rendition Infosec. See full presentation here.

The following is list of Microsoft Windows KBs for Meltdown:

Operating system version Update KB Superseded Patch
Windows Server, version 1709 (Server Core Installation) 4056892 4054517
Windows Server 2016 4056890 4053579
Windows Server 2012 R2 4056898 N/A
Windows Server 2012 Not available N/A
Windows Server 2008 R2/Windows 7 SP1 4056897 4054518
Windows Server 2008 Not available N/A
Windows 10 for 32/x64-bit Systems 4056893 4053581
Windows 10 Version 1511 4056888 4053578
Windows 10 Version 1607 4056890 4053579
Windows 10 Version 1703 4056891 4053580
Windows 10 Version 1709 4056892 4054517

Microsoft has also recently released a cool new dashboard that uses analytics to help discover vulnerable devices and helps assess whether those devices are susceptible to Meltdown and Spectre. You can get that here.

It will be important over the next few weeks to stay on top of any breaking news around Meltdown and Spectre. Mitigation efforts should be underway in your IT organization to prevent a future zero-day attack.

 

technology

Time to Up Your Security Game

It’s time for business leaders to start rethinking their risk. In today’s ever changing technology landscape, the stakes of the game are becoming higher.  As technology evolves and businesses look to incorporate things like the cloud, IoT, and AI, the business will need to focus on items like:Security-Gruard-Vector

  • data privacy
  • security
  • vendor management
  • transparency of auditing
  • regulatory compliance
  • business continuity

Solutions are needed to transform businesses and help them manage risk and compliance efforts effectively and holistically across the entire organization.

Where and how do those business leaders begin to fill the gap? I believe the easiest place to start is by focusing on what’s most important first. What systems are critical to the business then work your way out towards the perimeter. Knowing the hierarchy of the business needs can aid in switching from reactive to proactive, which is where you want to be when it comes to risk management. Highlight and start monitoring user activity on all fronts. Ensure you have a clear understanding of your data and its importance to the organization as a whole. Who has access to that data? Can it be limited? It’s a starting point.

Often times security can get shuffled to the back burner by the IT staff as they tend to be inundated with other higher priority requests like user requests and new innovation. Spinning up a security team or a dedicated security pro within the IT department is starting to trend. This is a good answer for businesses out there struggling with a security talent gap.

Another great place for businesses to focus on the problem is with their staff. Develop security protocols and practices if none are in place. Manage business assets and personnel through awareness of those protocols and practices with training and educational tracks to help foster a culture of acceptance. Gamify the experience and level your staff up with some healthy competition.

Security will continue to be the hot topic in the years to come as we see the world of technology transform and the global cyberwar rage. Will your business rise to the occasion or be left vulnerable? The time to act is now.

marketing, technology

4 Pillars for Building a Remote Workforce

remote-workforcePopularity of working remote has increased since 2005. Per Global Workplace Analytics, the latest in telecommuting statistics state that: “Regular work-at-home, among the non-self-employed population, has grown by 115% since 2005, nearly 10x faster than the rest of the workforce.”

Not only is it a popular job perk but there are several benefits of a remote team. They are:

  • Garner the best talent, regardless of location.
  • Ability to provide clients with more comprehensive support coverage. [24/7/365]
  • Increased flexibility may offer a better quality of life for some, like:
    • Lessening a commute
    • Flexible schedule for working moms and dads
    • Ability to work outside of general working hours

The following are 4 pillars to building out a top-notch remote workforce.

1.The Right Talent. Finding and on-boarding talent can be a challenge for any business. Finding the right talent for a remote workplace can be even more difficult.  There are specific skills to look for in a candidate as well as effective steps to on-board your talent that can makes things easier. When hiring the right talent make sure you ask the right questions to get an understanding of  their past work experience. Questions like,

  • Have they worked in a remote job before?
  • Have they ever been in business for themselves before?
  • Have they made lateral moves within the same company?

Get face to face with an interview and look for other signs indicative of a quality remote workforce candidate. Are they OK with asking for help? You can tell if they probe with questions seeking clarity during the interview. Setting clear expectations of the job role right from the get go during the interview will help you both understand if the partnership will be symbiotic.

On-boarding your talent is also another integral step. In order to ensure success, provide training opportunities on software used, provide playbooks for internal processes, SOPs (standard operating procedures) that must be followed, and any SLAs (service level agreements) that must be met. It will be important for your remote newbie to also have someone they can shadow for a brief period of time to help them get acclimated. A mentor so to speak, someone who will be there to teach them the ropes and someone they can depend on to answer questions in the beginning.

2. Align Company Culture. Build a culture of leadership and empower your remote workers by providing autonomy instead of micromanagement and ensure the management team is ready to provide that autonomy. Nothing’s worse than being overly directed from someone who is many miles away or wasting time to answer their constant questions. Which leads me to the next part. Provide some fun! Setting up event functions like going to a movie, the bar, or perhaps something that promotes team building like an escape room, can help bring people together for fun and provide an opportunity to break away and bond.

If remote workers are too far away from each other then try inventive ways to bring them together like, setting up an Xbox for your ‘gamer workforce’. This way they can play and challenge each other while enjoying some fun during their lunch breaks or after hours.

Encourage conversation and create a way to say ‘Thank You’. Set up a virtual water cooler. This will help manage moral and build comradery. Use group chat tools like Slack, Yammer, etc. to establish a friendly, casual place to post updates about work, life, and of course, memes. Because we all know a high-quality meme can bring a smile that may turn a day around. For minimal effort, you can create a sense of connection that can also preserve motivation.

3. Foster Effective Communications. art-communicationCommunication is a major key to remote workforce success. Anyone who has ever experienced working remotely can attest to this statement. Ensure you have the proper channels in place to streamline information and open the door for transparency and communication amongst all your workforce. Incorporate daily communication through the use of internal chat tools, quick check-ins, and visibility into each other’s calendars.

Process and documentation are super important factors of effective communication for a remote workforce. You cannot be efficient without process. When processes are well documented, trained on, and transparent, the bottom line can mean the difference between a customer and a raving fan. Ensure your remote workforce has a clear understanding of business processes. Set clear expectations of service level agreements and transparency of metrics and KPIs gathered.

4. technologyInvest in Efficient Technology. No doubt today’s technology can empower your remote workforce. Procure simple to use tools to help manage service delivery, communications, and your resources. Added bonus if you can obtain a suite of business solutions from a single vendor. The convenience of working with few vendors can enable your remote team to level up.

At the end of the day focus on the basics to ensure you’re getting the right candidates through the door, align your company culture, encourage communication and award for it. All these pieces along with using the right tools can set your remote team up for success.

technology

Digital Security: 5 Ways To Protect Yourself

Security will be top of mind in 2017. I know it has been top of mind for me lately. The increase of my credit/check card being stolen has increased tenfold within the last two years. That’s just me too. I’m just one single person amongst billions of other persons on this planet, so you can imagine how others may feel on this subject. That is why securing data will be topics of conversation for many IT professionals this year and for the foreseeable future as we continue to see the rise of internet hacking and theft. End users and technology service providers alike will look to detection and response as forerunners to wage this new battle.  According to Gartner, worldwide spending on information security is expected to reach 90 billion in 2017 with a 7.6% uptick from 2016.

Why are we seeing this trend?

swiss-cheese-analogy-1In the last few years, with the advances of mobile technology and IoT, we are now accessing the internet through many unsecured means. Think of it as Swiss cheese and there is literally a Swiss cheese model describing security, learn more here. The WiFi network at the coffee shop, the device, the application on the device, we have made ourselves vulnerable by allowing the conveniences of our technology to create gaps in our cheese. If the technological means (WiFi, device & apps) are not properly stacked, the holes in our Swiss cheese become exposed.

What you can do to protect yourself:

  1. Stay up to date on your software updates, especially on your mobile devices. This includes the applications you use on those devices as well.
  2. DO NOT save or cache your passwords for major accounts you login and use to transmit payments. And do not link your credit/check cards to those accounts for easy access later.
  3. Change your passwords frequently. Every 90-180 days is reasonable without driving yourself crazy. Don’t use the same password for multiple accounts. Example: Your email and bank account should NOT have the same password.
  4. Run AV/Malware software on your devices to prevent and detect an unwanted intrusion.
  5. Pay attention to suspicious emails with attachments. Usually you can spot a malicious email by its use of poor grammar but then again, hackers are getting smarter about it. Stay alert and check the email from addresses and double-check URLs are actually going to the site domain you are receiving the email from.

securityUnfortunately, there are a number of ways your card information can be compromised outside of email and infected computers. Card scanners are another increasing threat. What makes this rising threat frustrating is that scanners are so easy to get and even easier to use. Don’t believe me? Watch this.

Security is a constant moving target and the best way to combat it is to never lose sight of it. Stay aware of new threats as technology changes, stay up to date on your devices and apps you use, and finally, stay alert to accounts you maintain an online presence with.

 

http://www.erinalbertson.com

marketing, technology

Defining the Customer Journey

Gartner predicts by 2018, those organizations that excel in personalization will outsell companies that don’t by 20%.

In today’s information age where the Internet rules, marketers are scrambling to keep up with ways consumers can now engage with a brand. Consumers are investigating new products online, they are reading reviews in real time and are actively engaging with the brand well before making the actual purchase. To a marketing professional, these are customer touch-points. Each point is simply a step along a path that a customer will make before the purchase of something, be it a product or service.

If the brand is notable and already established, brands like McDonalds, Best Buy, Microsoft, to name a few, then consumers already have preconceived notions of what the experience should be before making the purchase. Companies competing in today’s marketplace must acknowledge expectations and introduce delightful experiences into the buyer’s journey if they want to remain competitive.

buyerjourney

How do we start?

It starts with a persona. Understanding who your buyer is and then personifying them. Personas give the company a much richer picture of their customers so that they may be able to tailor a memorable and effective experience. Personas are usually derived from a combination of the following types of data:

  • Demographic – Defined by population based on geography, income, level of education and other attributes.
  • Psychographic – Focused on values, opinions, interests, aspirations, attitudes and lifestyles.
  • Ethnographic – Information gleaned from surveys and studies conducted by watching subjects in their daily routines and capturing what isn’t explicitly reported.
  • Transactional – Insight from a customer’s history with the brand, including first and third-party purchase histories and post-sale service records.
  • Behavioral – Captured data through engagement with websites, mobile devices and other media outlets.

Once you have your persona(s) defined, take the time to carefully identify all key business moments your persona must take when interacting with your brand. List each key moment including buying decisions and begin to prioritize them. Fully flesh out any opportunities that may not exist today but could be implemented to enhance the experience. Start to design your buyer experience by mapping each moment along a timeline.

It may be helpful at this stage to create stories. Stories help paint the picture of what the persona wants. Stories can be used to find missing business moments along the way. I find it’s always insightful to share your stories with someone outside of your circle as it offers up different perspectives and could encourage innovation in your process.

In the end, your customer journey will be defined by your personas (the profile of your customer), their stories (a picture of what the customer truly wants), and a map of business moments (points where your brand will delight).

Once your journey has been defined, evangelize it to the rest of the business. This offers the awareness and transparency of customer motives. This also is a vital step in the continued success of the customer journey. Success can be achieved short term but cannot be maintained unless the customer journey grows and evolves.

http://www.erinalbertson.com

marketing, technology

Your Brand; Your Identity – 10 Tips

Brand Business ConceptTop 10 tips on how to put yourself out there:

  1. Know your audience. Who do you want to reach? Who will listen? Envision your ideal audience for your message and put yourself into their shoes. What do they want to know?  You can tell them. It’s your destiny!
  2. Build a strategy. Nothing screams success like a well formulated game plan. Take some time to think through your strategy. Build up a project plan with detailed steps necessary to reach your goals.
  3. Construct a calendar of events. Define your content and lay it out on the calendar. Situating tasks for each day to deliver your message will be an important step to stay organized and on track.
  4. Speak authentically. Be yourself when conveying your message. No one likes someone who tries too hard. Keep it real and keep it simple. If using complex vocabulary is not normally your thing, then don’t start just because you may want to sound smarter. You’ll end up only pushing your audience away because your words won’t seem natural.
  5. Weave in the personal. Emotion is a powerful source of truth and can create instant connections with people. Use it to tell your personal story and capture the hearts of your audience.
  6. Focus. This can be tough. Your message must be clear and concise. There is only so much brain space and time you have before your reader loses interest.
  7. Use powerful headlines. You have only seven seconds to make a great impression when meeting someone. Headlines work the same way. They are the bits of information we use to judge whether we want to pursue something more. Get over the hump by using inviting, captivating headlines that draw the reader in.
  8. Make your content easy to read. Your reader should be able to glance through your material and understand the main points without having to do further research. Include bullet points, headings, numbered lists, etc. to achieve this.
  9. Include a call to action. Give your reader a purpose. What do you want them to do with the information you’ve put out there? Provide additional links  for further information or offer up images, a sign up form, etc. to provide your user with another opportunity to interact with your brand.
  10. Finally, go the extra mile. Be helpful. Start by answering any possible questions you think your audience may have. Discuss your products and/or services further or even offer a feedback loop so your audience can contact you for suggestions on improvement.

http://www.erinalbertson.com