AXEL Network Products:

AXEL GO - share and store files securely.

LetMeSee - photo sharing app.

  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

AXEL.org

  • Network
  • Technology
  • Applications
  • Blog
  • About
    • Team
    • Press
    • Careers
    • Patents
  • Contact Us
  • Login
    • AXEL Go
    • AXEL Cloud

cybersecurity

February 25, 2022

Small Business Tech Trends of 2022

When you think of small businesses, you may think of classic mom-and-pop, Main Street stores with just a few employees, and even fewer expenditures. Even TV and movies love to paint small businesses as old-fashioned shops with carefree owners who spend their time lounging and chatting up regulars. While this rosy picture may be accurate for a few small business owners, for the vast majority, this couldn’t be further from the truth.

Small businesses and their owners face unique, difficult challenges that have no clear solution. This was especially clear when the COVID-19 pandemic began to rage in early 2020. While big businesses had the technological infrastructure to weather the storm, many small businesses simply couldn’t survive, through no fault of their own. For the businesses whose doors didn’t shutter in the early months of the pandemic, they soon found that innovation was the only way they could survive. From Zoom meetings to online ordering, COVID-19 forced small businesses to evolve. And even as the pandemic reaches its two-year anniversary, these involuntary changes aren’t leaving any time soon. As the country (and the world) continue to live with the pandemic, more small businesses are beginning to utilize these new technology trends to survive in this new normal.

Automation and Artificial Intelligence

When it comes to saving time, there is no better tool for small businesses than automation. Automation can complete many of the small, minute tasks that add up. Things like welcome emails, communications with leads, and inventory management can all be automized, allowing more time for business owners to focus on profit-driven tasks. Best of all, there are useful automation software for nearly every facet of business. Spending a lot of time setting up meetings? Try out Calendly, a useful tool that minimizes the time-consuming back-and-forth of arranging appointments. Want to set your social media posts weeks in advance? Try Hootsuite or Sprout, two programs that can post to your company’s social pages automatically. More and more small businesses are utilizing tools like these to cut down time spent on tasks that don’t affect the bottom line.

This increased adoption of tech shouldn’t come as a surprise. After all, small businesses that extensively utilize digital tools earn twice as much revenue per employee than businesses that don’t[1]. It’s simple: When businesses let technology handle small, everyday tasks, they become more successful. However, this doesn’t mean that once a business automizes some things, it’ll magically increase profits. Small businesses have to constantly be on the lookout for programs that give them an advantage over their big-business competitors. One of these programs is quickly growing in popularity, and could even be considered an evolution of automation: Artificial Intelligence (AI).

One of the most popular AI programs for small businesses is chatbots. With these bots, businesses can communicate with web visitors and determine if they need help automatically. More uses include creating marketing content and streamlining inventory management[2]. Although similar to automation, AI goes one step further: It can analyze data and make logical decisions for your specific situation. From resume scanners to employee schedulers, Artificial Intelligence is becoming more useful (and more affordable) for small businesses that seek to prioritize their efficiency.

Digital Advertising is Changing

For the past decade, there has been a single, dominant platform in the social media advertising business: Facebook. It has long been known that advertisements are the lifeblood of the world’s most popular social media site. In fact, Facebook makes a whopping 98% of its revenue from ads[3]. Because of its unending data collection, Facebook can target ads at the micro-level, allowing them to charge advertisers even more. However, extensive data collection and ad-supported social media aren’t exclusive to Facebook anymore. While the company is still making a gaudy amount of money from ads, cracks are beginning to show.

One thing is certain: Facebook is getting older. Now, if your business’s target demographic is 45+, you won’t have much of a problem. But if your business is targeting the coveted 18 to 34 demographic, you may need a more complex marketing strategy. That’s because young people simply don’t use Facebook as much as they used to. In 2016, 60% of teens used Facebook at least once a month. In 2021, that number dropped to 27%[4]. Apps like Snapchat, Instagram, especially TikTok are simply more popular with young people, creating the need for multi-front digital marketing strategies.

Software Integration

The great thing about tech is that there are a virtually infinite number of programs that can help increase efficiency and revenue at small businesses. The bad thing is that, sometimes, too many programs can cause diminishing returns. After all, if you’re uploading data to a dozen different software programs every day, are you really saving time? Additionally, if you’re uploading the same data, over and over again, there’s a higher likelihood of data errors as well. That’s why small business owners have begun to embrace software integration. With integration, not only does software help you complete tasks, but it also communicates with your other software programs. Uploading information from a new lead? With software integration, you can simply add the information once, and it’ll be available on all your integrated programs. Employees need to communicate in order to get work done efficiently. Why can’t software do it too?

While the dream of completely seamless integrated software isn’t quite here yet, there are a number of programs tailored for small businesses that are incredibly convenient. Software like Quickbooks and Xero integrate accounting, expenses, and even employee scheduling. With these tools, small business owners are realizing just how much time, money, and effort they can save by utilizing software integration. 

Cybersecurity Risks

By now, you’ve almost certainly heard the risks of having poor cybersecurity infrastructure. Without protection, small businesses put themselves, their data, and their customers at risk every day. Thankfully, more and more small businesses have realized this risk, and have taken steps to minimize their chances of a catastrophic data breach. In fact, over half of small and medium-sized businesses now have a cybersecurity plan in place[5]. And as cybersecurity programs continue to become more available and affordable, this number is certain to rise in the coming years. While cybersecurity risks are, of course, ever-present, the rising popularity of cybersecurity solutions among small businesses is incredibly promising. Cybercrime risks are unlikely to completely disappear any time soon, but if more and more businesses begin to prioritize cybersecurity, nefarious cybercriminals will have to work harder to wreak their havoc.

Unfortunately, reality isn’t that rosy, at least not yet. While some small businesses have finally taken action to protect their cybersecurity, for many businesses, there’s still work to do. Only 9% of small businesses have cyber liability insurance. Therefore, it’s no surprise that 83% of small and medium-sized businesses are not prepared for the financial consequences of a cyberattack[5]. Ultimately, many small businesses have not reached true cybersecurity protection. While it’s great to see more small businesses finally begin to take cybercrime seriously, there’s still a long way to go. And while companies that have invested in cybersecurity can do business with peace of mind, those that haven’t will be at risk every single day.

About AXEL

No matter what industry your business is in, cybercrime poses a very real threat. At AXEL, we want to help you keep yourself (and your customers) safe from the threats of ransomware and data breaches. That’s why we created AXEL Go. AXEL Go uses military-grade encryption, blockchain technology, and decentralized servers to ensure it’s the most secure file transfer software on the market. Whether you need to transfer large files or send files online, AXEL Go is the best cloud storage solution. If you’re ready to try the most secure file-sharing app for PC and mobile devices, download AXEL Go for free here.

[1] “Small Business Technology Trends: Deloitte Us.” Deloitte United States, May 20, 2020. https://www2.deloitte.com/us/en/pages/technology-media-and-telecommunications/articles/connected-small-businesses.html

[2] Rist, Oliver. “Small Businesses Are Using AI-Sometimes.” PCMAG. PCMag, December 7, 2021. https://www.pcmag.com/news/small-businesses-are-using-ai-sometimes

[3] “Facebook Ad Revenue 2009-2020.” Statista, February 18, 2022. https://www.statista.com/statistics/271258/facebooks-advertising-revenue-worldwide/

[4] Leonhardt, Megan. “Teens Have Been Losing Interest in Facebook for Years.” Fortune. Fortune, October 26, 2021. https://fortune.com/2021/10/25/facebook-teens-usage-harm-studies/

[5] “10 Small Business Cyber Security Statistics That You Should Know – and How to Improve Them.” Cybersecurity Magazine, May 20, 2021. https://cybersecurity-magazine.com/10-small-business-cyber-security-statistics-that-you-should-know-and-how-to-improve-them/

Filed Under: Business, Tech, Trends Tagged With: cybercrime, cybersecurity, data privacy, data protection, marketing, Privacy, Security, Social Media, technology

February 18, 2022

After the Cyberattack: What Happens to your Data Following a Breach?

In 2022, cybercrime seems like everyday news. And in a way, it literally is. Simply search “data breach,” and you’ll find a wealth of businesses across the country dealing with the fallout of cybercrime. Businesses large and small fall victim to these attacks every day, putting more and more people’s personal information in jeopardy. And for consumers, your information leaking isn’t something you have to worry about for a few weeks, then move on. Because of the unique way personal data is stolen and sold, victims of data breaches have to keep an eye on their social media and bank accounts for years. 

On the business side, you’ve likely heard the horror stories of businesses losing millions of Social Security Numbers, or even having confidential documents leaked. From retail stores like Target to digital forums like Facebook, businesses from every industry have fallen victim to cybercrime. Unfortunately, this digital devilry has only become more prevalent. 2021 was the worst year on record for businesses and consumers, with nearly 6 billion accounts breached by cybercriminals[1]. There’s a decent chance even some of your personal information has been leaked without your knowledge. But if nearly 6 billion accounts across the Internet have been compromised, well, where is that information?

Where Does Your Personal Data Go?

When a data breach is reported, the most reported statistic is the number of accounts affected. Data breaches can have anywhere from a few victims, all the way up to 3 billion. When news of a breach breaks, reporters like saying that consumer data has been “leaked” or “published.” However, a more accurate term to describe a breach is that consumer data has been “auctioned off.” This is because the perpetrators of cyberattacks rarely use the data that they just stole. Rather, they simply sell your information to a multitude of low-level digital scammers, who try to make their money through simple phishing scams and the like, rather than complex cyberattacks.

Of course, stolen data can’t be sold on traditional commerce websites. And any public website that tried to sell the data would be taken down quickly for distributing a stolen good. After all, you can’t really Google “stolen data near me” and find what cybercriminals looking for. So, once all that data is stolen, where does it go on sale? On a section of the Internet few know about, and even fewer have visited: the Dark Web. 

The Dark Web is a “layer” of the Internet that can only be accessed through special software. Estimated to be almost 500 times larger than the standard web, the Dark Web is a hub for cybercriminals and their illegal activities[2]. After a data breach, the hackers will typically post about their haul on a Dark Web forum and offer the data to other users for a specific price. Depending on the price and quality of the stolen data, there could be anywhere from a few to hundreds of buyers. Even just hours after a data breach, your personal information could be in the hands of dozens of scammers all across the globe.

How Valuable is My Personal Data?

Not all data breaches are created equal, and not all information is equal either. Think about it: If you were a cybercriminal, would you want three million Twitter usernames and passwords, or one million credit card numbers? Considering Twitter logins are worth just USD $35, and credit card numbers are worth up to $240, most would choose the credit card numbers[3]. Some pieces of information are simply more valuable than others, and cybercriminals know this. That’s why, when a data breach occurs, measuring the impact solely on the number of affected accounts is inaccurate. A leaked Facebook password could cause headaches, but besides a few spam posts, it probably won’t affect your life too much. A leaked passport number, however, could lead to something as serious as identity theft.

This showcases how stolen data itself isn’t particularly valuable, and is only valuable if you know what to do with it. After all, if you hand a random passerby your Social Security Number, it’s unlikely they’ll know how to steal your identity. Unfortunately, these Dark Web cybercriminals have all the knowledge they need to cause chaos in victims’ lives. Even information as simple as phone numbers and corresponding names can be a cash cow for scammers. The disparity in value between pieces of information highlights just how wide-ranging the damage from a data breach can be. So next time there’s a major data breach in the news, don’t just look at the number of accounts affected to judge the severity. Look at what was stolen to truly determine how damaging a cyberattack is.

What About Stolen Documents?

Of course, personal information isn’t the only data that is put at risk during a cyberattack. If cybercriminals target a business, law firm, or government agency, confidential documents could be leaked as well, especially in ransomware attacks. The problem, however, is that this confidential information simply isn’t valuable to cybercriminals. Therefore, when these documents are stolen, cybercriminals often demand a ransom and threaten to publish the confidential information unless it’s paid. For businesses that suffer this type of attack, they typically only have two choices: Pay the ransom, or face a public relations (or even legal) nightmare. 

However, not all cyberattacks are typical. Some cybercriminals couldn’t care less about the money, and only seek to embarrass specific businesses. In one case, a Swiss hacker published confidential data from dozens of companies and government agencies as a protest against mass surveillance[4]. For these companies and agencies, once the hacker gets the data, it’s gone, regardless of the ability to pay a ransom. This highlights how no two cyberattacks are exactly the same. Although most hackers are in it for the money, some simply seek to make a statement, regardless of the financial consequences. That’s why, when it comes to cybersecurity, it’s important to be prepared for anything and everything.

Protect Yourself from Cybercrime

Ultimately, the best way to protect yourself from cybercrime is to prepare. Thankfully, there are simple, inexpensive ways to greatly minimize the risk of a cyberattack on you or your employer. First, encryption is everything when it comes to cybersecurity. Encryption is like splitting your files into thousands of different puzzle pieces, so even if hackers got into your network, your documents are completely illegible to the attackers. Next, updating your security software is the easiest way to mitigate risk. Cybercriminals are always on the lookout for security holes, and those holes are much more prevalent in older versions of software. Keeping your software up-to-date could be the difference between safety, and one of the worst cyberattacks in history. Just ask Equifax.

Finally, one of the best ways to consistently prevent cyberattacks is to encourage a culture of security. This means educating all employees on the risks of cybercrime and how to minimize those risks. From teaching employees how to spot phishing emails to creating an incident response plan, simply prioritizing cybersecurity before a breach is one of the best ways to prevent cybercrime. Prioritizing cybersecurity doesn’t have to be expensive or time-consuming, but it’s the key to protecting your most valuable documents and data.

About AXEL

If you and your business are ready to prioritize cybersecurity, AXEL Go is the solution for you. AXEL Go uses military-grade encryption, blockchain technology, and decentralized servers to ensure it’s the most secure file transfer software on the market. Whether you need to transfer large files or send files online, AXEL Go is the best cloud storage solution. At AXEL, we believe that privacy is a human right and that your information deserves the best protection. To try the most secure file-sharing app for PC and mobile devices, get two free weeks of AXEL Go here.

[1] Mello, John P. “Data Breaches Affected Nearly 6 Billion Accounts in 2021.” TechNewsWorld, January 18, 2022. https://www.technewsworld.com/story/data-breaches-affected-nearly-6-billion-accounts-in-2021-87392.html

[2] “After the Data Breach – What Happens to Your Data?” BlackFog, May 6, 2021. https://www.blackfog.com/after-the-data-breach-what-happens-to-your-data/

[3] Sen, Ravi. “Here’s How Much Your Personal Information Is Worth to Cybercriminals – and What They Do with It.” PBS. Public Broadcasting Service, May 14, 2021. https://www.pbs.org/newshour/science/heres-how-much-your-personal-information-is-worth-to-cybercriminals-and-what-they-do-with-it

[4] “U.S. Charges Swiss ‘Hacktivist’ for Data Theft and Leaks.” NBCNews.com. NBCUniversal News Group, March 19, 2021. https://www.nbcnews.com/tech/security/us-charges-swiss-hacktivist-data-theft-leaks-rcna448

Filed Under: Business, Cybersecurity, Privacy Tagged With: cybercrime, cybersecurity, dark web, data privacy, data protection, Privacy, Security

February 11, 2022

Has School Surveillance Gone Too Far?

When it comes to education, pen and paper simply aren’t enough these days. Even just twenty years ago, the most technology students would see in a classroom was the occasional TV cart for educational films. However, in today’s schools, classroom technology is far more than the occasional classroom movie. These days, it’s a necessity. 

Even before the COVID-19 pandemic forced classes online, education technology was revolutionizing the way students learn. From software programs like Schoology to the prevalence of SMART Boards, education technology is used in a variety of ways with one overarching goal: To help students learn and retain information better. To help achieve this goal, many schools have begun to distribute laptops and tablets to students. After all, many projects must be completed and turned in online, and issuing school laptops can ensure all students have equal access to their assignments. While this free distribution of education technology is a noble act, particularly for students who can’t afford premium technology on their own, the technology comes with a massive caveat.

In nearly all cases, school-issued technology is installed with monitoring software. While monitoring software is necessary in some capacities, like ensuring students aren’t playing games on their laptops during class, many software programs are concerningly complex. As education becomes more and more digitized, it’s fair to ask: How much should schools know about their students?

The State of Surveillance

Monitoring students during school isn’t anything new. After all, schools act as students’ guardians during the school day, so it makes sense to observe, monitor, and occasionally report students for illicit or unsafe activities. However, with the rise of technology in schools, students began to spend much of their time online. Naturally, a school’s desire to observe, monitor, and report extends to the digital world as well. Today, a wealth of software programs including Bark, Gnosis IQ, Gaggle, and Lightspeed are installed on student devices to monitor their online interactions[1]. 

And this monitoring isn’t limited to school either. Even outside of the classroom, these software programs utilize artificial intelligence and human moderators to monitor students’ private chats, documents, and emails[1]. If a student searches for something related to, say, self-harm, the software can send an alert to the school district, allowing teachers to message students within minutes. While this strategy can help prevent self-harm, family abuse, and other dangerous situations, it’s clear that student privacy is sacrificed in exchange for this goal.

With the sheer amount of surveillance that students face, few would argue that student privacy isn’t violated. The question, however, is if this sacrifice of privacy is worth it. Proponents of school surveillance argue that it helps schools keep tabs on students, so if a particular child is in danger, the school can take action. In fact, one of Gaggle’s main selling points is its claim that the software saves hundreds of lives per year[2]. While this statement may be exaggerated, the software certainly helps identify students in need quickly.

On the other hand, those against tracking argue that surveillance invades privacy and deters free speech. After all, if you know a live human is watching every email or message you send, you may be more careful about what you type. Ultimately, this tracking software expands the classroom walls to home life, making children feel like they’re being watched all day, every day. Although school surveillance works in some cases, it also has several unintended consequences.

The Harms of School Monitoring

First, the psychological harm to students from endless surveillance can not be understated. In fact, a study found that 53% of students don’t share their true thoughts online because of surveillance, and 77% say they’re more careful about what they search online[3]. After all, students aren’t dumb; they know when they’re being tracked, and would rather censor their own behaviors than potentially deal with their messages or searches being flagged. The study states:

Systematic monitoring of online activity can reveal sensitive information about students’ personal lives, such as their sexual orientation, or cause a chilling effect on their free expression, political organizing, or discussion of sensitive issues such as mental health[3].

Because of the surveillance, students are scared to have conversations about tough topics. This causes students to avoid talking about them at all to avoid potential punishment from schools.

In addition to the psychological effects, surveillance software disproportionately harms minority students as well. Artificial intelligence programs are more likely to flag language spoken by Black students[4]. This is because of the lack of minority voices during the training of the AI, and the lack of diversity in the AI field in general[5]. This issue is exasperated by the fact that Black and Hispanic students use school devices at a higher rate than white students. Additionally, surveillance AI targets LGBTQ students as well, by flagging innocent words like “gay” and “lesbian[5].” Ultimately, it’s clear that student monitoring software does not judge every student equally.

Finally, vulnerabilities found in these software programs increase the risk of data breaches and other privacy incidents. In 2020, ProctorU, a software that monitors students during tests, was breached by cybercriminals, resulting in the leak of over 440,000 students’ emails, passwords, addresses, and phone numbers[6]. More concerningly, in 2021, researchers found vulnerabilities in Netop, another student monitoring software. In this case, they found a bug that could allow hackers to install malware, or even gain access to students’ webcams[7]. At the end of the day, software like this is just another way for cybercriminals to make a quick buck while wreaking digital havoc.

Can Safety and Privacy Coexist?

Here’s the thing: Keeping tabs on students isn’t a bad thing. In fact, that’s practically the entire purpose of a school. But as education becomes more digitized, there ought to be a balance between keeping students safe and respecting their privacy. Of course, some tracking is reasonable. Kids shouldn’t be playing games during instruction, and tracking software allows schools to see who isn’t paying attention. But monitoring students at home? At that point, students feel watched all day, thus less likely to type their true feelings. And making students feel like they have to constantly hide their true beliefs and feelings isn’t a recipe for success. Safety and privacy can coexist, but right now, there are too many severe consequences associated with student monitoring software to make the sacrifice of privacy worth it.

About AXEL

No matter if you work in education, law, or business, cybercrime poses a threat to your industry. Thankfully, AXEL makes it easy to protect yourself from the threat of ransomware and data breaches. At AXEL, we believe that privacy is a human right and that your information deserves the best protection. That’s why we created AXEL Go. AXEL Go uses military-grade encryption, blockchain technology, and decentralized servers to ensure it’s the most secure file transfer software on the market. Whether you need to transfer large files or send files online, AXEL Go is the best cloud storage solution. If you’re ready to try the most secure file-sharing app for PC and mobile devices, get two free weeks of AXEL Go here.

[1] Crispin, Jessa. “American Schools Gave Kids Laptops during the Pandemic. Then They Spied on Them | Jessa Crispin.” The Guardian. Guardian News and Media, October 11, 2021. https://www.theguardian.com/commentisfree/2021/oct/11/us-students-digital-surveillance-schools

[2] Haskins, Caroline. “Revealed: How One Company Surveils Everything Kids Do and Say in School.” BuzzFeed News. BuzzFeed News, November 3, 2019. https://www.buzzfeednews.com/article/carolinehaskins1/gaggle-school-surveillance-technology-education

[3] Hankerson, DeVan, Cody Venzke, Elizabeth Laird, Hugh Grant-Chapman, and Dhanaraj Thakur. “Online and Observed.” CDT.org. Center for Democracy and Technology, September 2021. https://cdt.org/wp-content/uploads/2021/09/Online-and-Observed-Student-Privacy-Implications-of-School-Issued-Devices-and-Student-Activity-Monitoring-Software.pdf

[4] Chung, Anna. “How Automated Tools Discriminate against Black Language.” MIT Center for Civic Media, January 24, 2019. https://civic.mit.edu/2019/01/24/how-automated-tools-discriminate-against-black-language/

[5] Kshetri, Nir. “School Surveillance of Students via Laptops May Do More Harm than Good.” The 74 Million, January 19, 2022. https://www.the74million.org/article/school-surveillance-of-students-via-laptops-may-do-more-harm-than-good/

[6] Abrams, Lawrence. “ProctorU Confirms Data Breach after Database Leaked Online.” BleepingComputer. BleepingComputer, August 9, 2020. https://www.bleepingcomputer.com/news/security/proctoru-confirms-data-breach-after-database-leaked-online/

[7] McCracken, Harry. “Popular Student Monitoring Software Could Have Exposed Thousands to Hacks.” Fast Company. Fast Company, October 15, 2021. https://www.fastcompany.com/90686770/netop-student-monitoring-software-hack

Filed Under: Culture, Cybersecurity Tagged With: cybercrime, cybersecurity, data privacy, education, Privacy, schools, Security, surveillance

February 4, 2022

What Does Cyberwarfare Look Like? Just Ask Ukraine.

Since March of last year, Russia has been deploying troops close to the Russia-Ukraine border [1]. While troop movement within a nation is typically normal, Russia’s relationship with Ukraine is anything but. Since 2014, Russia has aggressively shown its desire to annex Ukrainian territory, starting with its occupation of Crimea, a territory that was formerly part of Ukraine, but mostly comprised of people of Russian ethnicity. However, it soon became clear that Crimea was just the beginning for Moscow’s leaders. Following Russia’s occupation of Crimea in 2014, the country began to use unique, digital strategies to destabilize Ukraine.

Beginning in 2015, Russia has engaged in flagrant cyberwarfare with Ukraine. And these attacks weren’t just data breaches and ransomware attacks; they’ve affected nearly every resident of Ukraine. Ultimately, the Russia-Ukraine conflict could be a sneak peek of how war is waged in the future.

Hackers Target Ukraine

Following Russia’s annexation of Crimea, Ukraine saw relative calm for almost two years. However, in December 2015, Russia launched an effective, atypical attack. On December 23, a Russian cyber-military unit, “Sandworm,” attacked Ukraine’s power grid, and knocked out electricity to over 200,000 Ukrainians.[2] Thankfully, power was restored to most places within six hours. Although a few hours without electricity isn’t exactly a devastating attack, it was undoubtedly worrying. After all, this was the first-ever confirmed hack that took down a power grid.[2] Additionally, power grid control centers were still not fully operational over two months after the attack, highlighting the sheer strength and organization of the attack.

Unfortunately, this was not the only cyberattack that Russia has executed on Ukrainians. One year later, in December 2016, Russia again attacked Ukraine’s power grid.[3] They quickly followed up by targeting Ukrainian banks and state-owned industries in June 2017.[4] Following this major attack, Russia seemed to calm down, and tensions actually diffused for a few years. However, this changed in early 2022. As Russia began to mobilize its troops toward the Ukraine border, Moscow launched another cyberattack. This time, Russians were able to take down over 70 Ukrainian government websites, along with a message that warned Ukrainians to “Prepare for the worst.”[5]

Although Russia launched multiple effective cyberattacks, many cybersecurity experts believe Russian President Vladimir Putin could have ordered the attacks to be so much worse. After all, Ukraine’s 2016 power grid outage only lasted for about an hour. This made some believe that Russia was using Ukraine as a “testbed” for refining cyberattacks that could be used globally[3]. No matter Russia’s ultimate purpose, these cyberattacks show a glimpse of Russia’s unique military strategy.

Disinformation Campaigns

In addition to cyberattacks, Russia has also used the Internet to sew instability within Ukraine as well. When Russia invaded Crimea in 2014, the country used state media and social media to sway ethnic Russians in Ukraine to support the annexation.[6] These accounts falsely alleged that Western forces manipulated Ukrainian protests, and also fabricated stories of Ukrainian soldier misconduct. Using this disinformation, Russia was able to gain enough support to annex Crimea with (relatively) little pushback.

If these disinformation efforts sound familiar, well, they are. Russia used similar techniques to meddle in the United States’ 2016 presidential election.[6] It’s a sinister, yet successful strategy for promoting Russian interests. With the emergence of the Internet and the popularity of social media, information warfare is relatively simple. Being able to kindle instability from thousands of miles away is a new, anxiety-inducing strategy that is being utilized in Ukraine, the United States, and other nations. Although it may not lead to traditional warfare casualties, Russia’s cyberwarfare actions have been extremely successful in promoting Putin’s interests.

What Would a Cyberwar Look Like?

When people think of cyberattacks, most think of data breaches and ransomware attacks. Damaging, yes, but they typically don’t harm anyone outside of the affected business and its customers. Cyberwarfare is very different. While Russia’s power grid attacks on Ukraine were effective, they were not nearly as devastating as they could have been. If Russia chooses to execute full-strength cyberattacks, the consequences could be deadly. In this scenario, Russia could shut off most of the country’s electricity, disable heat in the middle of winter, and shut down Ukraine’s military communications.[7] A cyberattack like this could make it astonishingly easy for Russia to successfully invade Ukraine. While an attack of this magnitude has not been undertaken by Russia or any other nation, the possibility of one is undoubtedly concerning. Full-fledged cyberwarfare is something the world has never seen, but the possibility of it increases every day.

Of course, it’s naive to assume that Russia is the only country preparing for cyberwarfare. The United States certainly has the capability to defend itself against cyberwarfare, and the ability to execute offensive cyberattacks. In fact, the United States was one of the first nations to engage in an act of cyberwarfare. In 2010, the U.S. and Israel jointly infected Iran’s nuclear infrastructure with the Stuxnet computer worm.[8] This attack crippled Iran’s nuclear program, highlighting just how successful cyberattacks can be.

When it comes to cyberwarfare, we really don’t know what the rules are yet. If Russia attacks another nation’s electricity or heat, indirectly leading to civilian deaths, is that a war crime? Or is remotely targeting infrastructure fair game? There are dozens of questions that haven’t been answered. Unfortunately, we may learn these answers during a future cyberwar. Whether this new kind of war is waged between Russia and Ukraine, the U.S. and China, or some other combination of unfriendly nations, we know the consequences of cyberwarfare will be severe.

About AXEL

Cybercrime is an ever-present threat. Thankfully, AXEL makes it easy to protect yourself from ransomware and data breaches. At AXEL, we believe that privacy is a human right, and that your information deserves the best protection. That’s why we created AXEL Go. AXEL Go uses 256-bit encryption, blockchain technology and decentralized servers to ensure it’s the most secure file transfer software on the market. Whether you need to transfer large files or send files online, AXEL Go is the best cloud storage solution. If you’re ready to try the most secure file-sharing app for PC and mobile devices, get two free weeks of AXEL Go here.

[1] Roth, Andrew. “EU and UK Pledge Backing to Ukraine after Russian Military Buildup.” The Guardian. Guardian News and Media, April 6, 2021. https://www.theguardian.com/world/2021/apr/05/eu-sounds-alarm-at-russian-troops-ukraine-border-moves

[2] Zetter, Kim. “Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid.” Wired. Conde Nast, March 3, 2016. https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/

[3] Zetter, Kim. “The Ukrainian Power Grid Was Hacked Again.” VICE, January 10, 2017. https://www.vice.com/en/article/bmvkn4/ukrainian-power-station-hacking-december-2016-report

[4] Polityuk, Pavel, and Alessandra Prentice. “Ukrainian Banks, Electricity Firm Hit by Fresh Cyber Attack.” Reuters. Thomson Reuters, June 27, 2017. https://www.reuters.com/article/us-ukraine-cyber-attacks-idUSKBN19I1IJ

[5] “Ukraine Cyber-Attack: Russia to Blame for Hack, Says Kyiv.” BBC News. BBC, January 14, 2022. https://www.bbc.com/news/world-europe-59992531

[6] Merchant, Nomaan. “US Tries to Name and Shame Russian Disinformation on Ukraine.” ABC News. ABC News Network, January 28, 2022. https://abcnews.go.com/Politics/wireStory/us-shame-russian-disinformation-ukraine-82526617

[7] Miller, Maggie. “Russian Invasion of Ukraine Could Redefine Cyber Warfare.” POLITICO, January 28, 2022. https://www.politico.com/news/2022/01/28/russia-cyber-army-ukraine-00003051

[8] Melman, Yossi. “’Computer Virus in Iran Actually Targeted Larger Nuclear Facility’.” Haaretz.com. Haaretz, September 28, 2010. https://www.haaretz.com/1.5118389.

Filed Under: Culture, Cybersecurity Tagged With: communication, cyber terrorism, cybercrime, cybersecurity, international, russian hackers, world news

January 28, 2022

National Data Privacy Day: The Internet isn’t Anonymous Anymore

In the late 1990s, when the Internet truly hit the mainstream, people were often struck with a mixture of wonder and fear when they sat down at their computer desk. Back then, the Internet offered limitless information and global communication instantly, two things simply unheard of just a decade prior. When users browsed the Internet, it felt like an adventure, with websites acting as friendly navigators. Although the early Internet certainly had its problems, it didn’t feel like a business tool or high-tech gizmo. It felt like a toy for grown-ups.

As the Internet matured, this wonder eventually turned to familiarity. Gone were the days of simple AOL chat rooms and catching up on news. Businesses started to harness the Internet’s power, and the mystery of the Internet began to fade. The Internet wasn’t a toy anymore; it was a necessary tool that we had to use if we wanted to keep up with work, friends, and the world in general. And with the Internet becoming more ingrained in everyday lives, the anonymity of online spaces disappeared as well.

January 28th is National Data Privacy Day, and AXEL is celebrating by highlighting the importance of digital privacy and why stronger privacy protections are required for a safe, secure Internet.

Digital Privacy in the Early Internet

In the early days of the Internet, websites were radically different than they are today. In the late 1990s, nearly every site was built only using HTML and images, with no tracking capabilities. Because of how simple these websites were, few sites offered personal accounts, so users simply weren’t motivated to give information up. Simply put, users knew little about websites, and websites knew little about their users.

The Internet remained this way for a few years, offering simple services in exchange for a hefty fee. For example, AOL charged users over USD $20 per month to use its Internet software.[1] In the late 1990s and early 2000s, the Internet was widespread, but there was still a significant barrier to entry. However, the invention of a delicious digital tool would soon change the business model of Internet-based companies: Cookies.

Cookies are small text files that are sent from website servers to a user’s computer, allowing a server to identify and remember a specific user.[2] While this sounds simple, Cookies spearheaded a massive change to website design and user accessibility. From remembering website preferences to revolutionizing online shopping, cookies offered a multitude of benefits to users. While cookies undoubtedly offered intuitive features for early Internet users, they also were a turning point in the prioritization of online privacy. After the widespread adoption of cookies, the Internet ceased being anonymous.

In addition to cookies, the rise of social media in the early 2000s radically changed how users approached the Internet. In the late 1990s, Internet users were typically wary of revealing personal information online, and for good reason. However, the rise of early social media sites like Friendster, MySpace, and Facebook changed the way users approached the Internet. No longer were people confined to anonymous AOL usernames; users could simply search their friends’ names in order to communicate with them online. While this was certainly an exciting feature in the early 2000s, it led to the normalization of digital footprints.

Online Privacy Today

Today, nearly everyone in the world has a digital footprint. Try it! Search your name and see what comes up. Websites and images from years ago regularly appear, even from posts and webpages that have been deleted. Worst of all, even if you delete all of your online accounts, those images are likely to stay there forever. While this de-anonymization does have benefits, say, looking people up for job interviews or first dates, it also represents a complete dissolution of online privacy.

While these digital footprints can be unnerving for some, they ultimately don’t have a massive effect on overall online privacy. After all, a few posts and images are nothing for Big Tech. What Big Tech can use, however, is data. And the vast majority of that data comes from cookies. Unfortunately, today’s cookies don’t just auto-fill URLs or remember your shopping cart. Modern cookies are built to track and analyze every single click we make. Using these cookies, Big Tech companies like Google, Amazon, and Facebook are able to collect massive amounts of information on us. For example, Google likely knows if you have a medical problem, your current address, and what political party you support.[2] All of this information is then used for one purpose: Delivering hyper-targeted digital ads.

These pesky advertisements are the lifeblood of Internet-based companies. Think about it: Many of the web’s most used applications are completely free. Useful sites like Gmail, Facebook, and Twitter are completely free for all users, yet these companies are worth billions. This is Big Tech’s dirty little secret: They’re not selling their products and services to you. They’re selling you and your data to advertisers.[3] And the more data they have on you, the more they can charge advertisers. This is why companies like Amazon and Google typically sell many of their products at a loss. For example, when Amazon prices an Echo Dot at USD $20 during the holidays, Amazon isn’t making a profit off the sale of the hardware; it’s making a profit from all the new, personal data that users give to the device. Ultimately, Big Tech is financially motivated to collect more and more personal data, putting everyone’s digital privacy to the side.

What Should Be Done?

First, increased regulation of hyper-targeted advertisements would be a massive victory for digital privacy. The amount of data that Big Tech companies have on us is staggering, and they’re encouraged to collect as much as possible to sell to advertisers. Selling data about extremely sensitive subjects like medical history ought to be banned. After all, advertisers shouldn’t have access to people’s sensitive health information. Additionally, allowing users to opt-out of tracking would be another win for privacy advocates. Cookies do offer legitimate features for users, so most would still accept tracking. However, simply offering a choice to opt-out would be incredible progress for digital privacy in the 2020s.

Big Tech corporations make billions by trivializing our digital privacy and prioritizing advertisers over people. Unfortunately, these companies are financially motivated to collect as much data as possible, so without regulation, this trivialization of privacy is likely to continue. Fortunately, there is hope: The European Union has a law that allows users to opt-out of tracking cookies,[4] and similar legislation is possible in the United States. Although Big Tech would certainly fight back with shady tactics, an opt-out law would be the biggest victory for privacy of the 21st century.

About AXEL

Time and time again, Big Tech has prioritized its profits over privacy, putting their users at risk. At AXEL, we’ll never sell your data to third-party advertisers because we believe that your private information should stay private. That’s why we created AXEL Go. AXEL Go uses military-grade encryption, blockchain technology and decentralized servers to ensure it’s the best file transfer software on the market. Whether you need cloud video storage or cloud file management, AXEL Go is the secure file hosting solution. If you’re ready to try the best file sharing app for PC and mobile devices, try two free weeks of AXEL Go here.

[1] “AOL Hikes Price to US$21.95.” Wired. Conde Nast, February 9, 1998. https://www.wired.com/1998/02/aol-hikes-price-to-us21-95/

[2] Hill, Simon. “The History of Cookies and Their Effect on Privacy.” Digital Trends. Digital Trends, March 29, 2015. https://www.digitaltrends.com/computing/history-of-cookies-and-effect-on-privacy/

[3] King, Bertel. “Why Targeted Ads Are a Serious Threat to Your Privacy.” MUO, April 1, 2019. https://www.makeuseof.com/tag/targeted-ads-threat-privacy/

[4] Lomas, Natasha. “Europe’s Cookie Consent Reckoning Is Coming.” TechCrunch. TechCrunch, May 31, 2021. https://techcrunch.com/2021/05/30/europes-cookie-consent-reckoning-is-coming/

Filed Under: Cybersecurity, Privacy Tagged With: communication, cybersecurity, digital privacy, Internet, law firm, online safety, Privacy

January 21, 2022

AXEL’s Guide to Remote Work

In March 2020, nearly every office worker was filled with anxiety about the prospect of remote work. With no warning and little preparation, a significant portion of the world’s workforce was forced to do their jobs from home, many with no experience of at-home work whatsoever. It was a stressful and unique time, learning new skills and software from home, all while the looming threat of COVID-19 was ever-present in peoples’ lives. This radical, immediate shift to at-home work was unlike anything workers had ever faced before.

But then something funny happened: We got used to it. Not only did employees begin to tolerate remote work, but they enjoyed it more than traditional work at the office. In fact, nearly 50% of workers stated that they’d take a pay cut to continue working remotely [1]. 25% stated that they would quit their jobs if they couldn’t work remotely anymore, and 70% say they find virtual meetings less stressful than in-person meetings.

Now, with remote work popularized and here to stay, here are some ways to maximize your efficiency, create a healthy work-life balance, and overcome some of the unique challenges of at-home work.

Maintain a Healthy Work-Life Balance

Although remote work offers incredible flexibility for employees, that flexibility comes with a price. 45% of remote workers say they work longer hours than they did before, and the picture is even bleaker for younger workers [2]. With the rise of remote work, employees are working longer hours and more weekends, putting a healthy work-life balance at risk. With bedrooms becoming the new office, it can be concerningly easy for worklife and homelife to blur. Thankfully, there are a few strategies that can help workers separate their job and their home life.

First, one of the most useful strategies to utilize is scheduling. Most employees have a specific time to clock in and clock out. Even when you’re working from home, sticking to those specific times helps separate work and home. Additionally, it’s helpful to schedule breaks in advance as well, to provide structure to the workday. Creating a schedule and sticking to it is one of the best ways to prioritize a healthy work-life balance. 

Additionally, it’s helpful to create specific places for work as well. Set aside a desk, office, or even just a chair for work, and only use it during work hours. This way, your home can be split into two, with distinct workspaces and homespaces. This way, once you’re at your work desk, you’ll be able to focus solely on work, rather than allowing your work life and home life to intersect. Although these strategies sound simple, they help workers separate their work and personal lives immensely. Just following these two strategies can help maintain (or even increase) worker efficiency, while also promoting healthy distinctions between work and home.

Embrace Change

When workers were sent home in March 2020, they were forced to learn new programs on the fly. From Zoom meetings to Slack channels, workers involuntarily embraced modern workplace technology. Many workers had never even participated in a Zoom meeting before the pandemic, but now they’re practically the norm. Additionally, programs like Slack, Skype, and Microsoft Teams surged in popularity, even among offices that were previously low-tech. Ultimately, although the pandemic forced employers and workers to try new programs, it allowed nearly every workplace to embrace modern workplace technology. Now, nearly every worker is technologically savvy enough to get work done from home. The rapid modernization of many offices was certainly one of the hidden blessings of the pandemic.

In addition to embracing new software and programs, remote work has allowed employees to embrace new places as well. On the more common side, many workers enjoy leaving their homes for part of the workday. After all, some people may work best next to the office-like bustle of a coffee shop, or the eerie silence of a local library. Remote work allows workers to try out different working environments to determine which location works best for them. Additionally, some workers have even become “digital nomads,” employees who travel often, but are still full-time remote workers. Because remote work allows unprecedented flexibility in where work gets done, it’s no wonder why many employees prefer working out of the office.

Utilize New Tech

Even before the pandemic hit, new workplace collaboration software made our jobs so much easier. Now, dozens of useful programs are readily available to businesses, making the transition to remote work even more simple. Useful programs include: 

  • Slack, a business communication software that features chat rooms organized by department, team chats, and direct messaging.
  • Todoist, a workplace organizing software that schedules and shares tasks, meetings, and projects.
  • GitHub, a hosting service for software development that allows users to comment and collaborate on each other’s coding projects.
  • Clio, a practice management software for law firms that collects and finalizes documents remotely.

Don’t be afraid to try out new technology! There are dozens of useful programs available, no matter what industry you work in. Whether it be work automation or business communication, workplace software is a wonderful tool that can help your business. Embracing new technology can be scary, but the benefits certainly outweigh the stress. After all, we were all anxious about Zoom meetings in 2020, but now, they’re second-nature, and help us get work done effectively. The best workers and businesses are unafraid of trying out new technology, so keep an eye out for new programs that can help you get work done more efficiently.

Communication is Key

During in-office work, it’s easy to stay in the loop. With remote work, staying informed and updated on your team’s latest projects can be a bit trickier. That’s why it’s extremely important to communicate often with coworkers and managers alike. Make group chats with your team, so no one is left behind, and follow up often to ensure everyone is on the same page. Without in-person meetings, everyone has to know their responsibilities. Embracing consistent, clear communication helps ensure that tasks don’t slip through the cracks.

Additionally, communication doesn’t only have to be about work. One of the biggest drawbacks of remote work is the loss of office camaraderie. This loss is particularly felt by young employees, many of whom are starting their career without ever meeting their coworkers in real life [3]. One way to mitigate this effect is to encourage casual conversation among employees. Whether it be as simple as a “water cooler” Slack channel or occasional Zoom hangouts with coworkers, fostering connections between employees not only helps workers avoid burnout, but also helps cultivate a distinct company culture.

Overcome Challenges Together

One of the most difficult aspects of remote work is time management, particularly when your coworkers are in different time zones. Unplanned meetings are often too difficult to pull off successfully in a remote work environment. That’s why it’s extremely important to plan projects, tasks, and meetings well in advance, so every employee knows what’s coming up, and when to be available. Of course, sometimes things come up and require immediate action, but giving your best effort to plan in advance not only helps you stay organized; it helps your entire office stay coordinated and running smoothly.

Finally, one of the biggest challenges with remote work is technology. With no on-site IT department, workers are often on their own when they encounter a tech problem. That’s why businesses ought to have clear guidelines regarding technology. Some helpful tech tips include:

  • Only using secure Wi-Fi networks.
  • Immediately downloading software updates.
  • Using a secure file-sharing service (like AXEL Go!)
  • Creating an incident response plan in the event of a data breach.

Tech problems will always be present, whether you’re working at the office or at home. That’s why offices need to communicate with employees regarding technology and cybersecurity. Creating and enforcing technology guidelines can help both employees and the business stay safe from cyberthreats.

About AXEL

As remote work becomes the norm, cybersecurity ought to be a priority for all businesses. At AXEL we believe that your information deserves the best protection. That’s why we created AXEL Go. AXEL Go uses military-grade encryption, blockchain technology and decentralized servers to ensure it’s the best file transfer software on the market. Whether you need cloud video storage or cloud file management, AXEL Go is the secure file hosting solution. If you’re ready to try the best file sharing app for PC and mobile devices, try two free weeks of AXEL Go here.

[1] Collins, Terry. “Work Remote after COVID? Nearly 50% of US Workers Would Take a Pay Cut for It, Survey Says.” USA Today. Gannett Satellite Information Network, November 11, 2021. https://www.usatoday.com/story/money/2021/11/11/workplace-survey-remote-pay-cut-covid/6367601001/

[2] Maurer, Roy. “Remote Employees Are Working Longer than Before.” SHRM. SHRM, July 6, 2021. https://www.shrm.org/hr-today/news/hr-news/pages/remote-employees-are-working-longer-than-before.aspx

[3] Petersen, Anne Helen, and Charlie Warzel. “Remote Work Is Failing Young Employees.” The New York Times. The New York Times, November 22, 2021. https://www.nytimes.com/2021/11/22/opinion/remote-work-gen-z.html

Filed Under: Business, Lifestyle, Professional Tagged With: business tips, communication, cybersecurity, law firm, Privacy, remote lawyer, remote work, small business

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Interim pages omitted …
  • Go to page 10
  • Go to Next Page »

Primary Sidebar

Recent Posts

  • AXEL News Update
  • AXEL Events
  • Biggest Hacks of 2022 (Part 2)
  • Biggest Hacks of 2022 (Part 1)
  • The State of Government Cybersecurity 2022

Recent Comments

  • Anonymous on Five Simple Security Tricks

Footer

Sitemap
© Copyright 2023 Axel ®. All Rights Reserved.
Terms & Policies
  • Telegram
  • Facebook
  • Twitter
  • YouTube
  • Reddit
  • LinkedIn
  • Instagram
  • Discord
  • GitHub