email
Get the newsletter
Newsletter
search
Search blog
July 01, 2019 • read

Technology Tips: July 2019 Edition

Skyward IT Services
Network Infrastructure and Security Specialists

In this article
Share this story

Smart speaker privacy

You may have signed up for a small dose of surveillance when you set up your smart speaker, but that doesn’t mean you have to consent to sending your conversations to Google or Amazon. Here’s how to tighten privacy settings when it comes to your speaker recording your conversations to help refine speech recognition.

Google Home instructions

Amazon Alexa instructions

 

Security for high-tech collaboration

Do you have team members working remotely, accessing data on mobile devices, or otherwise sharing information outside your network? If so, this collaboration needs to be monitored for potential security loopholes.

Add a disclaimer, warning, or label when collaborators are outside the designated network. Only invite those who truly need to join via a video conferencing option. It’s hard to tell whose system could be infected with malware which can in turn access your team’s devices via networking connections, including file sharing during meetings.

Before any long-distance collaboration happens, tune up the network connection and ensure proper bandwidth is achieved. This not only enables your team to enjoy a smooth video conference, but also ensures security measures like malware scanners can work quickly against attacks.

 

Legally mandated action following data breach

In all 50 states, notifying users of a known data breach isn’t just good practice—it’s the law. Each state handles the topic a little differently, but most have incorporated some form of the following cybersecurity guidelines:
  • A deadline for notifying users of the breach
  • A deadline for notifying the state Attorney General of the breach (depending on how many users are notified)
  • Specific definitions of personal identifiable information (PII)
  • Requirements to offer credit monitoring in certain cases
  • Special requirements for different sectors (including finance and insurance)
  • Safe harbor laws protecting organizations from liability

It’s always a good idea to check into your state’s specific laws around cybersecurity, data privacy, and other attacks, including whether civil suits may be brought following a data breach.

 

Malware of the month: Social media malware

July’s malware of the month comes from our old pal, Facebook, but no social media site is immune from this malware strategy. 

This particular instance occurred in Libya and came in the form of news stories which appeared to originate from the commander of the Libyan National Army. The links claimed to be for documents showing proof of conspiracy against the country, but they turned out to actually just be malware. Users affected came from Libya, Canada, the United States, and more.

Social media users are particularly vulnerable since links seem trustworthy because a friend, family member, or page they follow is sharing it. However, these people could be sharing malware without even knowing it. Don’t assume a link is safe just because Facebook said it is—one alternative would be running a quick Google search on the topic instead of clicking from the original post. And with the population of users over 55 surging, it might also be a good idea to share this warning and strategy with parents and grandparents.


 


Thinking about edtech for your district?
We'd love to help. Visit skyward.com/get-started to learn more.

Share this story
About the author
Skyward IT Services
Network Infrastructure and Security Specialists


Read more from Skyward

Technology Tips: December 2020 Edition

Let's get cozy! This month's tips are all about using technology to achieve hygge: the Nordic-inspired lifestyle of simplicity throughout the winter months.

December 04, 2020 • Tips
Technology Tips: April 2023 Edition 🌎

This month is all about reducing, reusing, and recycling technology to save the earth and the budget!

April 01, 2023 • Tips
Qmlativ Spotlight: Medication Inventory

Welcome to an easy way to enter medication details, create administration schedules, and track inventory.

April 09, 2025 • Product Updates

This site uses cookies to improve your browsing experience and to help us understand how you use our site.
To learn more about how we use this data, click here. By continuing to use this site, you are consenting to our cookie policy.