https://blog.freelancersunion.org/content/images/2020/07/FU_Blog_Boundaries_Index.png
When the number of remote workers increased a few months ago, cybercriminals started rubbing their hands in glee. Businesses quickly transitioned to home working arrangements with little or no notice, which left them vulnerable to cyber attacks. With 4.7 million employees (3.4% of the workforce) in the U.S working from home at least half the week, it's time to consider how you can mitigate the risk of a cybersecurity attack. Remote workers require a reliable, secure connection to allow internet browsing and access to business information. But home connections generally don’t have the same level of protection that offices do, so the risk of cyber attack increases. There are approximately 2,244 cyber attacks every day, with 43% of those data breaches involving small businesses. Cybercriminals are not just happy with stealing your information; they often destroy data, change programs, and use servers to transmit spam, or malicious code. This makes securing your data even more critical. By putting the following security features in place, you will reduce the chance of being attacked and losing your information. Create unique passphrasesThe days of using a simple password are gone. Strong passphrases should be your first line of defense. Avoid using passwords that have a personal meaning, as it takes hackers no time at all to crack them. The FBI recommends passphrases, as they take longer to crack. Passphrases are made up of three or four words and contain between 14 and 64 characters. Use a mixture of lowercase letters, numbers, and special characters to reduce your risk of a security breach. You should also choose a passphrase that is meaningful to you, so it is easy to remember. Once you've decided on a strong passphrase, don't overuse it. If a cyber attacker manages to guess it, they'll have access to all accounts with that passphrase. To keep track of all your passphrases, consider using a password manager. They generate complex passwords, making them increasingly difficult for cybercriminals to crack. You type a single password into the password manager and are given access to all of your online access points, with the username and password readily available for each. Use multi-factor authenticationOne of the most effective ways to prevent criminals from gaining access to your devices is implementing multi-factor authentication. Multi-factor authentication makes it significantly more difficult to gain unauthorized access to your computers and applications. Criminals are likely to steal one type of access code, but stealing two or three different types of access codes would be extremely difficult. Multi-factor authentication includes at least two of the following methods of proving a user's identity: ● A personal identification number (PIN), a password, or an answer to a secret question. ● A smartcard, certificate, or a security key. ● The user's fingerprint or retina scan In most online settings, multi-factor authentication comprises a passphrase and then sending a PIN to the mobile phone number you provided at setup. Update your software and operating systemsHow often do you click on the “update later” button when your computer advises you to update your device or computer? Then, a few days later, you realize you still haven't updated. Every time you delay updating your software and operating systems, you put your information at risk. Operating system updates often fix security issues and include new features that protect your device. Updates will add new features and remove old ones, which are essential in the fight against cybercriminals. Use a virtual private networkVirtual private network (VPN) services give you private internet access and ensure your connection is encrypted. VPNs create a connection between your local network and a server located in a different location. The VPN makes it seem like you are in a different place, which provides you with online freedom and allows private information to remain inaccessible to hackers. This information can include: ● Browsing history ● IP address and location ● Identity data like your social security number or banking information When considering which VPN company to use, ensure the company is well-known and trusted, and that it doesn't keep an activity log. Top VPN providers include Norton Secure VPN and NordVPN. Limit public Wi-Fi useEvery time you use an unsecured Wi-Fi connection, you allow criminals to access all the information stored on your computer. You've decided to stop by the local cafe for lunch; you log in to their Wi-Fi to check your emails and unwittingly open yourself up to a security breach. If hackers are in the vicinity, they can position themselves between you and the cafe's network, gaining access without your knowledge. Secure your devicesIf you are at home, this shouldn't be a problem, but if you work in a shared workspace, never leave your computer unlocked or your device unattended. Consider who has access to your devices. If you have kids at home, don't let them access your work profile. Provide them with a unique login and passphrase to avoid them unintentionally sharing or deleting your information. Avoid using portable storage devicesWe've all done it. You store an essential piece of work on a portable storage device, such as a USB or external drive, only to misplace it later. Where possible, avoid storage devices, if you have to use one, ensure it is encrypted and protected with passphrases. Use spyware protection softwareSpyware protection software is essential to protect your computer and keep your data safe and secure. You may unintentionally open an email containing a virus that could steal your login information, activate your camera, and track where you have been online. Antivirus software such as Malwarebytes or Avast Free protects you from this. Back up your workCriminal hackers are determined, so you may follow all the steps and still get hacked. If you back up your data daily, you'll be in a much better position after an attack. Backup software allows you to back up your files in real time. You can also create multiple versions of the data you want to store. It's no good putting off data security until tomorrow. The number of cyberattacks is increasing every day, and the impact a breach could have on your business or work could be detrimental. via Freelancers Union Blog https://blog.freelancersunion.org/2020/07/30/how-to-protect-yourself-from-cyber-attacks/
0 Comments
https://blog.freelancersunion.org/content/images/2020/07/FU_Blog_TransitionKeepIncome_Index.png
On Monday, after weeks of delay, the Senate released its next proposed stimulus package: The Health, Economic Assistance, Liability Protection, and Schools (HEALS) Act. The $1 trillion package is the Senate’s response to the House’s proposed HEROES Act, which passed in mid-May. After a week of Senate infighting after their return from vacation, this proposed bill landed not with a bang but a whimper. House leaders have already stated it won’t pass, and many Senate members aren’t happy with it, either. Here’s what it does — and doesn’t do — for freelancers. What it doesUnemployment:
Small business assistance:
Additional aid:
Where it fails
Nobody expects this bill to be the one that ultimately becomes the next relief package — we’re at least a week of negotiations away from any agreements being reached. The silver lining of this torturous waiting game is that it means there’s still time for you to tell your representatives what YOU need a relief bill to do. Especially because so many freelance creatives will be unable to return to work until live venues are able to open, either late this year or early next year, by best guesses, it’s critical that PUA provides a livable income for freelancers and traditional workers for the foreseeable future. We’ve teamed up with a coalition of entertainment industry groups to continue pushing politicians on this front, but we need all our members to get involved, too. Use our script to get in touch with your Senator and Congressperson and let them know why real, robust PUA benefits are non-negotiable. Share your story, especially if you are in a creative industry that is still shuttered, and force them to see the reality of the situation for millions of workers. via Freelancers Union Blog https://blog.freelancersunion.org/2020/07/29/senate-heals-act-breakdown-for-freelancers/
https://tonygentilcore.com/wp-content/uploads/2020/07/Sabotage-1024x683.jpg
Today’s guest post comes courtesy of TG.com regular, Justin Kompf.
In any case, it’s important to understand that when this happens it’s (rarely) because they’re judging you or attempting to make you feel bad on purpose. It’s often a result of other, internal factors on their end. Great post from Justin today. Also, I defy anyone to read the word “sabotage” and NOT immediately have the Beastie Boys’ song of the same title reverberate in their head.
The Law of Self SabotageIn 1686 Sir Isaac Newton introduced his three laws of motion in “Principia Mathematica Philosophiae Naturalis.” His third law states that for every action in nature there is an equal and opposite reaction. Centuries later, and much less importantly, I was interviewed in a podcast and was asked what to do when attempts to be healthy are sabotaged (i.e. met with cruel remarks) by significant others. Why, when we try to be healthy do other folks try to stop us? I’m of the mind that their behaviors are often not malicious. Your desire to change and your behaviors cause an emotional reaction. Behaviors are just behaviors, reactions and the extent to which someone reacts to your behaviors is a reflection of what that means to them within the context of everything else that is happening in their lives. Let’s say your partner gets upset with you for something you did. Maybe you put your dishes in the sink and not the dishwasher. Their reaction should be a 1 out of 10 but instead it’s a 5 out of 10. Note From TG: In the case of my household it would be a sleep on the couch out of 10. Something else caused the elevated reaction. Perhaps it was the fact that they have asked you to not do this. Maybe they have had a really tough day at work or a fight with a family member. Either way, something else caused the elevated reaction. So, if you eat a salad and that makes your partner upset, this is because something else is happening on their side of the equation. Here is my law of social sabotage: A behavior + it’s meaning to the other person = reaction.If for whatever reason I keyed someone’s car right in front of them, they should flip out. They should be pissed! They should have an elevated reaction. Maybe they will yell at me. Maybe they will call the cops or punch me in the face. Their reaction will be based on what it means to them in the context of my bad behavior. Exercising should mean nothing to someone else. It is a completely neutral behavior. If someone makes snide remarks about you exercising it is because it makes them feel a certain way. Maybe it makes them feel insecure that they are not exercising. What to do? Be crystal clear in your conversation with that person. Tell them how their behaviors have an influence on you. Tell them why doing this is important to you and that you would like their support. Tell them that their reactions to you trying to improve yourself hurt. Importantly, tell them that you would like to listen and hear why they are doing what they are doing. Then actually do what you said you would do, listen! Again, it is not your behavior that is the problem if you’re trying to be healthy, it’s how your behavior is making someone else feel. Want to learn more about how to deal with things that can drain your motivation? Want to learn more about ways to harness motivation? This was an excerpt from Justin’s motivation eBook which you can download HERE. About the AuthorJustin Kompf is doctoral student studying exercise and health sciences. He is a personal trainer in Boston at CLIENTEL3. You can follow Justin here and here. (He’s obsessed with his girlfriend’s dog). Did what you just read make your day? Ruin it? Either way, you should share it with your friends and/or comment below.via Blog – Tony Gentilcore http://tonygentilcore.com/2020/07/the-law-of-social-sabotage-understanding-the-reactions-of-people-that-try-to-hold-us-back-from-being-healthy/
https://tonygentilcore.com/wp-content/uploads/2020/07/Glutes-1024x683.jpg
Hey there. It’s been a minute. In fact, I think this is the longest I’ve gone without writing anything – like, complete radio silence – in the history of this blog. I don’t know…I just haven’t been inspired to write much of late. And while part of me feels a sense of regret that I’ve left my audience hanging the past several weeks, the other part of me falls under the umbrella of “better to not write anything at all than write crap.” So, to that end, what follows hopefully isn’t crap…;o) Exercises You Should Be Doing: Chaos BridgeFor those keeping up with my life, a little over two months ago I ruptured my Achilles tendon. I wish I could sit here and say I did it while doing something cool like split jerking 440 lbs, deadlifting a Mack Truck, or fighting a pack of ninjas. Alas, I did it while performing a very vanilla, hum-drum drill. A jump-back start. Essentially this:
The only difference between what’s shown above and what I did was that 1) I injured my right side, not left and 2) the woman in the video made it waaaaaay further than I did. When I injured mine I fell straight to the floor once my foot made contact with the floor. In any case, since the injury I’ve been trying to set an example and prove to people that you CAN train around pretty much any injury. To me “rest” is rarely going to be the long-term answer. Sure, you need to rest, not be a jerk, and allow ample time post-surgery to heal and recover. However, the idea that COMPLETE rest is the answer to expediting the healing process and using that as the foundation of rehab is a bit off-kilter if you ask me. To that end, I wrote THIS blog post a few weeks ago highlighting the concept behind the “Trainable Menu,” or the idea that it behooves most people to focus on what they CAN do rather than what they can’t. Moreover, I started the hashtag #findyourtrainablemenu on Instagram which I’ve been using to showcase some of my thoughts and ways I’ve been ensuring a training effect working through a significant injury. As it happens, today’s Exercise You Should Be Doing champions this mindset. But it’s also an exercise that I’d advocate everybody perform, injured or not. Chaos BridgeWho Did I Steal It From?: Strength & Conditioning coach, personal trainer, and quite literally someone with a MUCH keener eye than myself when it comes to assessing movement, Katie St. Clair. What Does It Do?: To steal a train of thought from Katie herself:
Implementing the band forces the body to stabilize itself. Too, and maybe more to the point for my audience: this drill hammers the glutes and hamstrings and anterior core without necessarily placing an inordinate amount of load on the spine. Believe me: It’s harder than it looks. Key Coaching Cues: You’ll want to start with thicker band than you think. From there the idea is to press down into the band with one leg while you pull the opposite leg/knee towards your chest (using the bench as a counterbalance). As you press down into the band try to emphasize feeling your glute contract (the hamstring will take care of itself). Likewise, pull, HARD, toward your chest. Say hello to your abdominals…;o) Give this one a try and let me know what you think. And follow Katie…she puts up amazing content. Did what you just read make your day? Ruin it? Either way, you should share it with your friends and/or comment below.via Blog – Tony Gentilcore http://tonygentilcore.com/2020/07/exercises-you-should-be-doing-chaos-bridge/
https://lh3.googleusercontent.com/2cKQ-PCFA0F9KJOV6YVeTvJyXvky9gvce-U4265N5Wk6GV17gv1B6YlNiXcHpN71BDMbPj1aYo1vci3ubKlYNsG1QXch1Aw7-Era4gYlVjtGG166VbKj6YDE6fcN_W2VW_NVaJ47
What comes to mind first: the last article you read or the most recent video you watched? It’s probably the latter. That’s the power of visuals — they capture the audience’s attention, create lasting impressions, and have greater recall power. As a freelancer looking to attract clients, you have to create the right kind of content to engage with your target audience and improve brand visibility. While you might rely on text-heavy marketing materials, it’s not enough. People gravitate toward visuals, making it important to use visual storytelling in your marketing strategy in order to stand out and get noticed. Let’s take a look at some visual content marketing tactics to attract freelance clients and grow your business. Establish a strong visual brandWhether it’s Coca-Cola’s red-and-white logo or the golden yellow arches that are synonymous with McDonald’s, every leading brand is characterized by a strong visual identity. That’s what makes them memorable. The same applies to your freelance business. It’s important to define a strong visual brand identity that sets you apart from your competition and reflects your personality. The four key elements of a visual identity are: Establishing a strong visual brand starts with knowing your business’ purpose and what it stands for and gaining an understanding of your target clients. The idea is to create a cohesive identity that’s relevant to your niche and resonates with your target clients. It’s a good idea to document your visual identity and create brand guidelines to be able to offer a unified experience across all marketing channels and touchpoints. Freelance UX/UI designer Patrick David’s website design establishes a strong visual identity — you’ll notice the color scheme and typography appear consistent across the website.
|
AuthorI have 5+ years experience working as a medical transcriptionist. When I am not working, I enjoy sports like playing basketball or judo. I love making friends and connections. Archives
April 2023
Categories |