Skip to main content

Featured Question

Google s Pixel Tablet may have appeared at FCC

A new Google device surfaced at the FCC today that could well be the upcoming Pixel Tablet. At the FCC, the tablet appeared under Google's ID as A4RGTU8P. However, A4RGTU8P is not the model number of the upcoming Google Pixel tablet. This device is listed as "Wireless Device", which is a fairly generic description. Nowhere in these documents is it referred to as a tablet. The device supports Bluetooth LE, WiFi 6 and UWB. While that's not the most concrete proof that this is actually the Pixel Tablet, what else could it be? Sources): FCC The post Google's Pixel Tablet may have appeared at FCC appeared first on xiaomist's blog .

How to ensure IT security in times of permanent remote work?

Remote work during a pandemic is a huge challenge from a security perspective. Each of us should protect sensitive data, video conferencing and files shared with other users. Responsibility also lies with the company's network administrators, who should not only use the latest technologies, but also educate users.

IT permeates virtually every element of our lives today. Now even more than before. Therefore, we can see the need to train digital competences and pay more attention to online security.

What will happen if we order thousands of unskilled people to use teleconferencing software? We did this simulation at the beginning of the quarantine period, when teachers were to teach remotely. In some cases it did not end well. The lack of securing meetings meant that unauthorized persons could enter them. Ba, even exchanges with links to unsecured meetings were created, where online trolls were organized. Even the CCC conference was a victim. The presentation of the board of the Polish company unexpectedly proceeded on a public channel. Of course, without the knowledge of those involved, which could cause image losses.

That is why it is crucial to know the safeguards we can use in teleconferences so as not to fall prey to the so-called boombingu.

Let's look at the security of the Webex Meetings application.

I have looked at the possibilities of the Cisco ecosystem before, now it's time to look at security.

Meetings at Webex can be based on rooms created for specific meetings or the so-called each user's private rooms, which can be started at any time. You can customize their name, link and PIN. The latter seems crucial, because even if the attacker gets to know our link, he will probably not be able to guess the password, if we take appropriate precautions.

You can also automatically close the meeting 5, 10 or 15 minutes after it starts. Then we will be sure that inappropriate people will not interrupt our conversation. Guests can be verified in the lobby and only allowed invited people.

We can also set up a notification in case we forget we have an appointment. We will then receive an email that someone is waiting for us. If it is an appointment, the application running in the background will display a notification of an upcoming conversation.

Finally, we can also choose the hosts of our room during our absence. In a business environment, these may be our colleagues who will take over command in case of our connectivity problems, and in the case of teaching, e.g. a class host who will take care of order when the teacher will have to leave the desk for a while.

In addition, we can also connect Webex with Google or Microsoft accounts, thanks to which we will be able to directly integrate the invitation, e.g. with our Outlook. Then the invitation will be in the footer of the email. By default it will also contain a password, but we can turn it off in the settings and then send the password by another e-mail or text message.

Controlling the list of participants during a meeting

Appropriate management of participants during the meeting is very important. First of all, we can mute participants or even beg in an extreme situation. In a typical office meeting everyone has the opportunity to present, but in school situations, for example, the teacher may want to have sole control over the presented material and block the ability to share the screen. Much more moderation tools. It is the meeting host who decides what permissions to give meeting participants.

It's good to share only the right screen elements. To do this, it's better to choose to share a single application instead of the entire screen. We can easily imagine a situation in which we accidentally minimize the browser window or presentation and inadvertently share the view of our mailbox. Everyone would rather avoid it.

A good label also includes the use of the Focus Assist function built into Windows. It allows you to turn off all notifications that appear on the screen, so that no one will see new messages in messengers or incoming emails.

How to take care of security in the company without losing flexibility?

Challenges will accumulate if we move the question about security to the level of the entire company working remotely. In the office, companies carefully protect their internal networks, devices and resources. Tele-work introduces another level of complexity.

So what can a company do to make sure its employees are protected? The first element is encryption. If we used the unencrypted video-conferencing service, then our conversation would be susceptible to man in the middle attack , i.e. eavesdropping on our communication. With end-to-end encryption, this is not possible. A similar care should also be given to stored files or recordings, which in the case of Webex happens automatically.

Secondly, you need to properly implement DNS protection. In short, it is one of the cornerstones of today's internet that translates browsers to the names of domain addresses into the IP addresses of destination servers. That is why it is often a vector of hacker attacks - in as many as 9 out of 10 cases. Meanwhile, properly configured protection will filter all unsafe queries to and from the network, ensuring security to end users.

Firewalls and tunnels

Filtering internet traffic is another foundation of protection. Such a firewall would only pass secure queries and stop others, so that computers and the data on them would not be vulnerable to attack. A firewall can come in two variants: hardware or virtualized, when it can be installed on a server with specific hardware parameters.

Another type of security is to create a virtual private network, i.e. simply a VPN. The intra-company infrastructure can be configured in such a way that employees must first connect to it from the home network in order to be able to use shared files in the next step.

Take care of verification.

Finally, two absolutely basic elements: two-factor authentication (2FA) and password protection. Both allow us to avoid hacking your account. In the case of 2FA, we must always confirm our identity using an additional tool, e.g. phone applications or tokens. If they don't fall from the hands of burglars, we can sleep peacefully.

If we are with the slogans, then ... people are usually weak in this matter. We provide easy to predict and uncomplicated passwords, so it is much better to use a program that will not only generate but also store all necessary passwords. Then it will be much more difficult to crack, and in addition we will be sure that each website uses its own original and complicated password. We must remember one password - the program itself.

Start with education

Regardless of the security measures used, the first step in companies should be education, because it is people who are the weakest link in any IT system. Machines are predictable when it comes to making mistakes - people are not. That is why social engineering attacks are so popular, e.g. when an attacker tries to impersonate our colleague and asks for sensitive information to be sent. The message can get into the corporate e-mail - and that the amount of digital communication increases rapidly with telecommuting - our attention can be greatly distracted. In such a situation, it is easy to downplay the threat. Let's not be afraid to call the other party for clarification. Let's be especially suspicious of e-mails with links. If the link to the alleged document does not point to a corporate resource, it is better to ignore it. Developing the right culture for reporting scams is an important challenge for coronavirus.

All of the above hardware and software protections are included in Cisco's offer. The fact that they come from one producer additionally supports their cohesion and better interaction within a single ecosystem. Such an ecosystem is worth adding support from the Warsaw company Atende, which deals with Webex on a daily basis and helps to increase user security.

* The entry partners are Atende and Cisco.



How to ensure IT security in times of permanent remote work?

Comments

  1. Thank you so much for this best knowledge. I really like your work and research about theft protection software . You give us best knowledge by your blog and I agree with your point of view, keep it up.

    ReplyDelete
  2. Hey guys! I know that sometime we all need some help with essya adn homewok! So dont be shy and check this capstone help and be the best! So dont be shy adn just do it! Enjoy my friend and be happy! Love it!

    ReplyDelete

Post a Comment

Popular Questions This Week

What is VoLTE and how can you activate it on your Xiaomi

In recent years, phone calls have evolved to achieve great sound quality. So much so that today we can find technologies such as VoLTE allowing us to make voice calls in high definition on our Xiaomi. Beyond the classic GSM networks, movistar, vodafone and other operators have integrated this technology, which in turn derives from the advantages of Internet access. Thanks to 4G or LTE networks, VoLTE allows us to make not only high-definition calls, but also to improve consumption and add other services . What is VoLTE and what are its advantages after activating it on a Xiaomi In detail, VoLTE is a technology capable of transmitting voice communications over the Internet . For this, whether we have a Redmi Note 8 Pro, a Xiaomi Mi A2 or any other smartphone from the firm, our voice will be encoded from analog to digital allowing its transmission in the form of packets through the network. With this, as we have already said, after activating VoLTE we will achieve higher sou

So you can check the battery status of your Xiaomi smartphone and how many cycles you have performed

Today, our smartphone has become one of the most important tools in our day to day. That is why the duration of its battery and the state of it is very important if we want to be able to use it with total peace of mind and in a continuous way. In view of this, MIUI includes a secret menu that allows us to verify the state or health of the battery of our Xiaomi smartphone and also check the cycles that we have performed . Let's not forget that each cycle represents a full battery charge from 0% to 100% Since lithium batteries degrade with the passage of time , use and recharges that we have made, knowing these two data will give us a vision of the general state of your state and with it knowing if it has worsened considerably with the passage of weather. How to check the battery status and cycles performed on our Xiaomi smartphone To access this hidden menu in MIUI and check the battery status of our Xiaomi smartphone we will only have to perform the following steps:

How to exit the FASTBOOT mode of your Xiaomi if you have entered accidentally

Although, the fastboot mode of Xiaomi phones with MIUI allows us to solve bugs or change ROMs, it is also common to enter without wanting to. If this has been your case, you most likely want to get out of Xiaomi's fastboot without spoiling anything. In general, leaving this mode that includes all Xiaomi, Redmi and POCO with MIUI is extremely simple. Even so, on certain occasions, exiting fastboot mode is more complex , either because Recovery starts or because our smartphone does not work correctly. In view of this, below we are going to explain how to exit the fastbook mode of your Xiaomi if you have entered without wanting to . In addition, if the conventional mode does not work, we will also give you other tips to exit this mode without causing any damage at the software level. How to exit Xiaomi fastboot If we have accidentally entered the Xiaomi fastboot , to exit this way we will only have to perform the following steps: Press and hold the power button for about 10

How to activate the second space if your Xiaomi does not have this option

MIUI's Second Space functionality allows us to have two smartphones in one. A way to divide our Xiaomi into two different accounts , either for personal and work use, to perform tests or simply, to prevent our son or little brother from accessing our applications and documents. Unfortunately, terminals like the Redmi Note 10 lack this functionality . The same happens with other terminals of Xiaomi, Redmi and POCO of mid-range and entry. If we access the Settings, this functionality is not found among the various MIUI options . Even so, there is a little trick that allows us to access the Second Space functionality even if your Xiaomi does not have it . In this way we can create a second space without any type of restriction and in any Xiaomi, Redmi or POCO. Activate the second space on your Xiaomi If your Xiaomi, Redmi or POCO does not have the Second space functionality when accessing Settings> Special functions , do not worry, below we will explain how to use it with

What is the Safe Mode of your Xiaomi, what is it for and how can you activate it

In addition to the typical options that we find in the MIUI settings, Xiaomi also adds a mode called " Safe Mode " or " Safe Mode " to its smartphones. We will talk about this below, explaining its usefulness and how to activate or deactivate it on your Xiaomi, Redmi or POCO. Safe Mode allows us to start a special boot, loading only the system itself and the applications that were installed on our Xiaomi when we bought it. That is, starting the Safe Mode or Safe Mode our smartphone will start loading only the essential applications . This mode is a temporary state of our smartphone and does not make any important modification on the device. In itself, Safe Mode does not delete our data , it just starts our Xiaomi, loading the basics and essentials for its operation. Safe Mode only starts essential MIUI applications. Thanks to this, the Safe Mode will help us to rule out failures in our Xiaomi derived from the installation of an application or the modific

If your Xiaomi disconnects only from the WiFi it may be because of that MIUI setting

One of the most common problems in Xiaomi smartphones is usually related to the WiFi connection and its automatic disconnection . A quite annoying problem, which in most cases is usually caused by a bad MIUI configuration . If you have a Xiaomi, Redmi or POCO and you notice that sometimes your smartphone disconnects only from the WiFi without having taken any action, do not miss this article where we tell you how to solve it in most cases. Disconnection of WiFi on your Xiaomi, how to solve it Although it is true that the problem may be caused by some other failure, in most cases the spontaneous disconnection of the WiFi connection is caused by a bad MIUI configuration, specifically, its automatic connection to the networks with better signal . By having this option activated on our smartphone, if the WiFi signal drops at any time, it will automatically disconnect to use the data connection . To deactivate it enough to do the following steps: Go to Settings> WiFi> Wi-Fi

Does your Xiaomi charge slowly or intermittently? So you can fix it

Does your Xiaomi charge very slowly or intermittently? This error is usually very common when our cable is in poor condition, we use a low-quality charger or even when the USB or USB Type-C port of your Xiaomi is dirty or obstructed. With a view to this, below we will explain the main steps or solutions to take if your Xiaomi charges slowly , if the charge is intermittent or if in the worst case, your mobile does not detect the USB that is connected to the socket electric. 1. Clean the USB port Although it may sound simple, in most cases slow charging problems are usually caused by a piece of paper or a speck of dust that obstructs the pins of the USB port . Taking into account the nature of this connector, it is normal that after repeated use dirt accumulates inside. A dirty USB C port is usually the main cause of slow or intermittent charging. To solve this charging problem and clean the USB C port of your Xiaomi, it is recommended to blow lightly inside the port itself.

So you can activate the double tap on MIUI to wake up or turn on the screen of your Xiaomi

Among all the functionalities that we can find in MIUI, today we want to talk about the double tap on the screen . This functionality allows us after activation to wake up the screen of our Xiaomi with a double click on it. This will avoid having to press the power button or having to position our finger on the fingerprint recognition area. An extremely useful utility, which can also be used in case the power button stops working. In this way, the functionality " Double tap on the screen to wake up " will allow us to turn on or off the screen of our mobile in a quick and simple way by just doing a double tap on your XIaomi.i How to activate the double tap to wake up the screen of a Xiaomi mobile To activate the double tap functionality on the screen of your Xiaomi we only have to make the following settings: Go to Settings> Lock screen Activate Double tap on screen to wake up After its activation we will only have to double-click on the off screen of our X

How to hide the content of notifications on the lock screen of your Xiaomi

Receiving a notification on our Xiaomi and viewing it without further ado from the lock screen is very comfortable. Still, prying eyes could read this information , details that in many cases we would not like to know and that put our privacy at risk . In addition, if we forget our smartphones or it is stolen, anyone could have access to the information contained in new messages . Let's not forget that many services make use of SMS to send the access code, not to say that the same happens with some online payment methods. That is why hiding the messages of the notifications on the lock screen of our Xiaomi becomes one of the most important recommendations in order to protect our private information and thus improve our own privacy. How to hide notifications from the lock screen of a Xiaomi If we want to continue receiving notifications but their information is hidden from the lock screen, MIUI has the setting we are looking for. For this, we will only have to carry out th

Problems with Android Auto and your Xiaomi? So you can fix it

Unfortunately Android Auto continues to present certain problems on some Xiaomi . Errors such as error 16 that prevent our smartphone from correctly linking to this Google vehicle system. Still, these bugs are largely solvable. And it is that, in most cases the impossibility of using Android Auto through our Xiaomi is given by the dual applications themselves. In view of this and taking as a source this interesting article from Mi Community , below we will explain how to solve two of the most common errors that we usually find when linking or connecting our Xiaomi to a car with Android Auto. Fix Android Auto error on Xiaomi devices One of the main errors of the type « An error has occurred » that we usually find when connecting Android Auto to our Xiaomi is related to Google Play Services . In itself, this error shows the message « It seems that Google Play Services does not work at the moment «, making it impossible to connect Android Auto to our Xiaomi. To solve it we j