POPULARITY
Categories
Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and even a memo from JPMorgan Chase's CISO. We will discuss where Marshall feels like we should be pushing harder, where we've made some progress, and what to do about incentives. How do you convince a software supplier or service provider to prioritize security over features? This segment is sponsored by Fastly. Visit https://securityweekly.com/fastly to learn more about them! Segment 2: Weekly Enterprise News In this week's enterprise security news, Agents replacing analysis is highly misunderstood only one funding round Orca acquires Opus to automate remediation OneDrive is updating to make BYOD worse? Companies are starting to regret replacing workers with AI Is venture capital hanging on by a thread (made of AI)? Potential disruption in the traditional vuln mgmt space! MCP is already looking like a dumpster fire from a security perspective malicious NPM packages and, IS ALCHEMY REAL? Segment 3: RSAC Conference 2025 Interviews Interview 1: Pluralsight Emerging technologies like AI and deepfakes have significantly complicated the threat landscape of today. As AI becomes more integrated into our lives, everyone - not just cybersecurity professionals - needs to develop security literacy skills to keep themselves, their organizations, and their loved ones safe. Luckily, there are countermeasures to spot and identify AI and deepfake-related threats in the wild. In this segment, Pluralsight's Director of Security and IT Ops Curriculum, Bri Frost, discusses how AI has changed the cybersecurity industry, how to spot AI and deepfakes in the wild, and the skills you should know to defend against these emerging threats. Pluralsight's AI Skills Report This segment is sponsored by Pluralsight. Visit https://securityweekly.com/pluralsightrsac to learn the skills you need to defend against the latest cyber threats! Interview 2: Radware Adversaries are rewriting the cybersecurity rules. Shifts in the threat landscape are being fueled by attackers with political and ideological agendas, more sophisticated attack tools, new coalitions of hacktivists, and the democratization of AI. Radware CTO David Aviv will discuss how companies must adapt their cyber defenses and lead in an evolving era of asymmetric warfare and AI-driven attacks. This segment is sponsored by Radware. Visit https://securityweekly.com/radwarersac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-407
Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and even a memo from JPMorgan Chase's CISO. We will discuss where Marshall feels like we should be pushing harder, where we've made some progress, and what to do about incentives. How do you convince a software supplier or service provider to prioritize security over features? This segment is sponsored by Fastly. Visit https://securityweekly.com/fastly to learn more about them! Segment 2: Weekly Enterprise News In this week's enterprise security news, Agents replacing analysis is highly misunderstood only one funding round Orca acquires Opus to automate remediation OneDrive is updating to make BYOD worse? Companies are starting to regret replacing workers with AI Is venture capital hanging on by a thread (made of AI)? Potential disruption in the traditional vuln mgmt space! MCP is already looking like a dumpster fire from a security perspective malicious NPM packages and, IS ALCHEMY REAL? Segment 3: RSAC Conference 2025 Interviews Interview 1: Pluralsight Emerging technologies like AI and deepfakes have significantly complicated the threat landscape of today. As AI becomes more integrated into our lives, everyone - not just cybersecurity professionals - needs to develop security literacy skills to keep themselves, their organizations, and their loved ones safe. Luckily, there are countermeasures to spot and identify AI and deepfake-related threats in the wild. In this segment, Pluralsight's Director of Security and IT Ops Curriculum, Bri Frost, discusses how AI has changed the cybersecurity industry, how to spot AI and deepfakes in the wild, and the skills you should know to defend against these emerging threats. Pluralsight's AI Skills Report This segment is sponsored by Pluralsight. Visit https://securityweekly.com/pluralsightrsac to learn the skills you need to defend against the latest cyber threats! Interview 2: Radware Adversaries are rewriting the cybersecurity rules. Shifts in the threat landscape are being fueled by attackers with political and ideological agendas, more sophisticated attack tools, new coalitions of hacktivists, and the democratization of AI. Radware CTO David Aviv will discuss how companies must adapt their cyber defenses and lead in an evolving era of asymmetric warfare and AI-driven attacks. This segment is sponsored by Radware. Visit https://securityweekly.com/radwarersac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-407
Welcome to Episode 401 of the Microsoft Cloud IT Pro Podcast. In this episode, Ben Stegink and Scott Hoag dive into the intricacies of implementing Zero Trust principles within Microsoft 365 environments. They explore the foundational aspects of Zero Trust, starting with identity management and the importance of Entra ID. They also cover: Identity Management: The critical role of identity in Zero Trust, including MFA, password policies, and least privilege access. Endpoint Security: Strategies for verifying and managing devices, including compliance checks and the balance between corporate and BYOD devices. Networking: The complexities of securing network traffic in a SaaS environment, including conditional access policies and the emerging Global Secure Access feature. Application Management: The role of Defender for Cloud in monitoring shadow IT and ensuring data security across various applications. Data Protection: Techniques for safeguarding sensitive information, including DLP policies and the upcoming network-level DLP capabilities. Join us as we unpack these topics and provide practical insights for enhancing your organization's security posture with Zero Trust. Your support makes this show possible! Please consider becoming a premium member for access to live shows and more. Check out our membership options. Show Notes Zero Trust deployment for technology pillars Securing identity with Zero Trust Secure endpoints with Zero Trust Secure endpoints with Zero Trust Secure applications with Zero Trust Secure data with Zero Trust Microsoft Zero Trust Assessment About the sponsors Would you like to become the irreplaceable Microsoft 365 resource for your organization? Let us know!
Recorded April 11, 2025 In this episode, the crew welcomes special guest Joe Cornwall as they discuss the surprising anniversary of a beloved connector, the introduction of the new GPMI standard, and the impact of USB Type-C on modern AV setups. With plenty of tangents and technical insights, this episode is a wild ride through the current state of AV technology and its future. Don't forget to share the podcast with your colleagues, and if you enjoy what you hear, consider supporting the AV SuperFriends! News articles discussed: https://www.tomshardware.com/tech-industry/china-launches-hdmi-and-displayport-alternative-gpmi-boasts-up-to-192-gbps-bandwidth-480w-power-delivery https://www.linkedin.com/pulse/audio-quality-its-impact-perception-message-messenger-jay-paul-cts-za0bf/ https://www.npr.org/2025/03/24/nx-s1-5334468/speaking-into-a-microphone-your-audio-quality-can-impact-the-way-people-view-you https://www.pnas.org/doi/abs/10.1073/pnas.2415254122 AI-suggested alternate show titles: Off the Rails: The AV Chronicles The Connector Conundrum USB Type-C: The Game Changer Audio Quality Matters! Navigating the AV Landscape The Future of AV Technology The Chaos of AV Learning from Mistakes The AV Connection Tech Talk Gone Wild AV Shenanigans What Could Go Wrong? Far superior human-created show titles: A friggin' house of cards IBM Laptop Don't come to our campus What size of UHaul was it? I was doing webinars! I worked without power for six days That's enough to get your sh*t going USB-C matrix switching If I was to dive off that really tall diving board BYOD spigot USB-C is just the holding pattern I'm OK if you say I'm crazy This has been adequate It drives me absolutely bonkers I have the worst camera on the planet …and looking good We stream live every Friday at about 300p Eastern/1200p Pacific and you can listen to everything we record over at AVSuperFriends.com ▀▄▀▄▀ CONTACT LINKS ▀▄▀▄▀ ► Website: https://www.avsuperfriends.com ► Twitter: https://twitter.com/avsuperfriends ► LinkedIn: https://www.linkedin.com/company/avsuperfriends ► YouTube: https://www.youtube.com/@avsuperfriends ► Bluesky: https://bsky.app/profile/avsuperfriends.bsky.social ► Email: mailbag@avsuperfriends.com ► RSS: https://avsuperfriends.libsyn.com/rss Donate to AVSF: https://www.avsuperfriends.com/support
Send us a textEmpowering Veterans Through Technology and Career TransitionIn this episode of 'The Wireless Way,' host Chris Whitaker interviews Jared Shephard, CEO of Hypori and founder of Warrior Ethos. Shephard discusses Hypori's innovative secure virtual mobility solutions tailored for both BYOD and enterprise environments, emphasizing security and privacy without the pitfalls of traditional mobile device management. Beyond tech, Shephard dives into his personal journey from a high school dropout and Army infantryman to a successful CEO, underlining the importance of career transitions for military veterans. He elaborates on how Warrior Ethos assists veterans in navigating life post-service, providing career development and mentorship. A variety of topics are covered, including leadership, the significance of cybersecurity, and the role of veterans in the civilian workforce.00:00 Introduction and Host's Background00:51 Guest Introduction: Jared Shephard02:21 Jared's Journey and Military Experience05:26 Hypori: Revolutionizing Mobile Security09:58 Technical Insights and Use Cases16:12 Challenges and Limitations of Hypori17:30 Warrior's Ethos and Personal Reflections19:50 The Ultimate Sacrifice Redefined21:05 Starting a Company and Giving Back21:38 Meeting a Wounded Soldier22:41 Recruiting Wounded Soldiers23:49 The Birth of Warrior's Ethos24:20 Transitioning from Military to Civilian Life25:32 The Importance of Financial Literacy30:00 Sales Skills in the Military and Civilian World33:15 Final Thoughts and Advice for VeteransSupport the showCheck out my website https://thewirelessway.net/ use the contact button to send request and feedback.
Forecast: Patchy with a 32% backlog surge, CVE squalls causing auth bypass showers, and Lazarus fronts looming—keep your threat umbrellas handy!"
Les risques en utilisant vos propres matériels et logiciels en entreprise. Le bring you own device ou BYOD est une pratique répandue The post Les risques en utilisant vos propres matériels et logiciels first appeared on XY Magazine.
Megérkezett a Google Gemini 2.5 Pro, a "gondolkodó" modell ITBusiness 2025-03-27 04:35:38 Infotech Mesterséges intelligencia Google A Google újabb jelentős lépést tett a mesterséges intelligencia fejlődésében: ma bejelentette a Gemini 2.5 Pro (kísérleti) verzióját, amely elsősorban az előfizetők és fejlesztők számára érhető el. Az új modell egy évközi frissítésként érkezik, amely tovább növeli a rendszer teljesítményét és pontosságát. Tudjuk, hogy káros, mégis alig törődünk az óriás akkumulátorgyárak éjszakai fényözönével Helló Sajtó! 2025-03-27 09:35:00 Tudomány A fényszennyezés egyaránt káros hatással van az emberi szervezetre és az élővilágra, mégis úgy fest, kevés figyelem jut rá az új gigaberuházások kivitelezésénél. Éltető Andrea, a HUN-REN KRTK Világgazdasági Intézet kutatójának elemzéséből kiderül, hogyan lesznek világosabbak az éjszakáink, ahogy Magyarország akkunagyhatalommá válik. Megduplázódott a HR technológiák iránti kereslet mmonline.hu 2025-03-27 09:39:53 Mobiltech Egy év alatt megduplázódott a HR technológiák iránti kereslet nemcsak Magyarországon, hanem európai viszonylatban is. A jelenség ellentmondásosnak látszik, és könnyű mögé egyfajta elszemélytelenedést vizionálni, de a valóságban a megoldások éppen, hogy támogatják az egyenlő érdekérvényesítést és a jogokat, ráadásul segítségükkel lényegesen több fig Néhány kémcső helyettesítheti majd a szerverfarmokat? Mínuszos 2025-03-27 13:33:34 Tudomány Oktatás egyetem Izrael DNS Izraeli kutatók DNAformer néven új módszert fejlesztettek ki a DNS-en tárolt információk leolvasására, s ezzel jelentősen elősegíthetik az adattárolás új technológiájának fejlődését — jelentette a Technion haifai műszaki egyetem. A modern társadalmakban a digitális adattárolás egyszerre jelentősebb gazdasági és környezeti gondot jelent, amely a mes A Spiegel játszi könnyedséggel megtalálta a neten Trump nemzetbiztonsági tisztviselőinek személyes adatait Telex 2025-03-27 07:16:01 Tudomány USA Közigazgatás Nemzetbiztonság E-mail Az újságírók mobilszámokat, emailcímeket és még néhány jelszót is találtak, olyan adatokat, amelyek a legmagasabb rangú amerikai tisztviselőkhöz tartoznak. Elkészült az önmagát hűtő sörösdoboz First Class 2025-03-27 09:39:30 Infotech Az ilyen dobozban tárolt italt nem kell hűtőbe tenni, elég megnyomni rajta egy gombot és rövid időn belül jelentősen csökken az ital hőmérséklete. Malware-szűrőkre utazik a Medusa ICT Global 2025-03-27 06:03:50 Infotech Kiberbiztonság Kibertámadás FBI A napokban már az FBI is figyelmeztetést adott ki a Medusa zsarolóvírus miatt, amelynek üzemeltetői régimódi BYOD-támadásokat hajtanak végre. Megkerülik a végponti védelmet, az észlelését és reagálását biztosító EDR-eszközöket, miközben telepítik a titkosítót. Egy meggondolatlan koppintás, és lenullázhatják bankszámláját Index 2025-03-27 06:14:00 Mobiltech Hacker Legitim szolgáltatásoknak álcázva csalnak ki banki és személyes adatokat hekkerek. Mutatjuk, mire figyeljen. Ár-érték bajnokot avatott a Poco? Mobilarena 2025-03-27 12:00:00 Mobiltech Snapdragon 8 Gen 3, AMOLED kijelző, 6000 mAh-s akkumulátor a Poco F7 Pro repertoárjában most még 499 euróért. Levette a gázról a lábát a Microsoft az adatközpontokban HWSW 2025-03-27 09:12:31 Infotech Microsoft A cég az elmúlt fél évben jelentős adatközpont-kapacitást mondott vissza az AI megoldások kereslet-előrejelzése alapján. Óra a Holdra – Unimatic x Massena LAB U1-SPG “NASA Artemis” Limited Edition Kronometer 2025-03-27 04:05:00 Mobiltech Világűr NASA Elérhető árú űrhajós óra kerámia bevonatos tokkal. Ez már a sokadik Massena LAB kollaboráció, amin megakadt a szemünk. Ahogy a kronometer.hu másik nagy kedvence senconde/seconde, úgy a Massena LAB stúdió… 55 ezer személyes adat, magyar diákok, tanárok és az Oktatási Hivatal dolgozóinak információi szivároghattak ki 444.hu 2025-03-27 12:43:34 Karrier Oktatás Hacker Oktatási Hivatal Az iskolai kompetenciamérést is lebonyolító Tehetségkapu nevű rendszerhez fértek hozzá a hackerek és nyilvánosságra hozták, amit elloptak. A magyar, aki a Porschéról csinált bravúros reklámot – stáb, kamerák és színészek nélkül Forbes 2025-03-27 05:57:01 Cégvilág Mesterséges intelligencia Reklám Kamera Porsche Amikor Gaál László eldöntötte, hogy Ázsiában próbál szerencsét a térség fejlődő filmipara miatt, még nem sejtette, hogy nagy dobását nem a klasszikus film, hanem egy mesterséges intelligenciával készített Porsche-reklám hozza meg neki. A további adásainkat keresd a podcast.hirstart.hu oldalunkon.
Megérkezett a Google Gemini 2.5 Pro, a "gondolkodó" modell ITBusiness 2025-03-27 04:35:38 Infotech Mesterséges intelligencia Google A Google újabb jelentős lépést tett a mesterséges intelligencia fejlődésében: ma bejelentette a Gemini 2.5 Pro (kísérleti) verzióját, amely elsősorban az előfizetők és fejlesztők számára érhető el. Az új modell egy évközi frissítésként érkezik, amely tovább növeli a rendszer teljesítményét és pontosságát. Tudjuk, hogy káros, mégis alig törődünk az óriás akkumulátorgyárak éjszakai fényözönével Helló Sajtó! 2025-03-27 09:35:00 Tudomány A fényszennyezés egyaránt káros hatással van az emberi szervezetre és az élővilágra, mégis úgy fest, kevés figyelem jut rá az új gigaberuházások kivitelezésénél. Éltető Andrea, a HUN-REN KRTK Világgazdasági Intézet kutatójának elemzéséből kiderül, hogyan lesznek világosabbak az éjszakáink, ahogy Magyarország akkunagyhatalommá válik. Megduplázódott a HR technológiák iránti kereslet mmonline.hu 2025-03-27 09:39:53 Mobiltech Egy év alatt megduplázódott a HR technológiák iránti kereslet nemcsak Magyarországon, hanem európai viszonylatban is. A jelenség ellentmondásosnak látszik, és könnyű mögé egyfajta elszemélytelenedést vizionálni, de a valóságban a megoldások éppen, hogy támogatják az egyenlő érdekérvényesítést és a jogokat, ráadásul segítségükkel lényegesen több fig Néhány kémcső helyettesítheti majd a szerverfarmokat? Mínuszos 2025-03-27 13:33:34 Tudomány Oktatás egyetem Izrael DNS Izraeli kutatók DNAformer néven új módszert fejlesztettek ki a DNS-en tárolt információk leolvasására, s ezzel jelentősen elősegíthetik az adattárolás új technológiájának fejlődését — jelentette a Technion haifai műszaki egyetem. A modern társadalmakban a digitális adattárolás egyszerre jelentősebb gazdasági és környezeti gondot jelent, amely a mes A Spiegel játszi könnyedséggel megtalálta a neten Trump nemzetbiztonsági tisztviselőinek személyes adatait Telex 2025-03-27 07:16:01 Tudomány USA Közigazgatás Nemzetbiztonság E-mail Az újságírók mobilszámokat, emailcímeket és még néhány jelszót is találtak, olyan adatokat, amelyek a legmagasabb rangú amerikai tisztviselőkhöz tartoznak. Elkészült az önmagát hűtő sörösdoboz First Class 2025-03-27 09:39:30 Infotech Az ilyen dobozban tárolt italt nem kell hűtőbe tenni, elég megnyomni rajta egy gombot és rövid időn belül jelentősen csökken az ital hőmérséklete. Malware-szűrőkre utazik a Medusa ICT Global 2025-03-27 06:03:50 Infotech Kiberbiztonság Kibertámadás FBI A napokban már az FBI is figyelmeztetést adott ki a Medusa zsarolóvírus miatt, amelynek üzemeltetői régimódi BYOD-támadásokat hajtanak végre. Megkerülik a végponti védelmet, az észlelését és reagálását biztosító EDR-eszközöket, miközben telepítik a titkosítót. Egy meggondolatlan koppintás, és lenullázhatják bankszámláját Index 2025-03-27 06:14:00 Mobiltech Hacker Legitim szolgáltatásoknak álcázva csalnak ki banki és személyes adatokat hekkerek. Mutatjuk, mire figyeljen. Ár-érték bajnokot avatott a Poco? Mobilarena 2025-03-27 12:00:00 Mobiltech Snapdragon 8 Gen 3, AMOLED kijelző, 6000 mAh-s akkumulátor a Poco F7 Pro repertoárjában most még 499 euróért. Levette a gázról a lábát a Microsoft az adatközpontokban HWSW 2025-03-27 09:12:31 Infotech Microsoft A cég az elmúlt fél évben jelentős adatközpont-kapacitást mondott vissza az AI megoldások kereslet-előrejelzése alapján. Óra a Holdra – Unimatic x Massena LAB U1-SPG “NASA Artemis” Limited Edition Kronometer 2025-03-27 04:05:00 Mobiltech Világűr NASA Elérhető árú űrhajós óra kerámia bevonatos tokkal. Ez már a sokadik Massena LAB kollaboráció, amin megakadt a szemünk. Ahogy a kronometer.hu másik nagy kedvence senconde/seconde, úgy a Massena LAB stúdió… 55 ezer személyes adat, magyar diákok, tanárok és az Oktatási Hivatal dolgozóinak információi szivároghattak ki 444.hu 2025-03-27 12:43:34 Karrier Oktatás Hacker Oktatási Hivatal Az iskolai kompetenciamérést is lebonyolító Tehetségkapu nevű rendszerhez fértek hozzá a hackerek és nyilvánosságra hozták, amit elloptak. A magyar, aki a Porschéról csinált bravúros reklámot – stáb, kamerák és színészek nélkül Forbes 2025-03-27 05:57:01 Cégvilág Mesterséges intelligencia Reklám Kamera Porsche Amikor Gaál László eldöntötte, hogy Ázsiában próbál szerencsét a térség fejlődő filmipara miatt, még nem sejtette, hogy nagy dobását nem a klasszikus film, hanem egy mesterséges intelligenciával készített Porsche-reklám hozza meg neki. A további adásainkat keresd a podcast.hirstart.hu oldalunkon.
What if the next major leap in cybersecurity isn't a new tool but a smarter way to think about the edge? In this special episode recorded live at IGEL Now & Next 2025 in Miami, I sit down with John Walsh, Field CTO for Critical Sectors at IGEL, to unpack the changing face of endpoint security, the rise of zero trust, and the role of AI in shaping both threats and defenses. John brings a career's worth of insight across aerospace, defense, and high-assurance systems to a conversation that covers the shifting threat landscape and how IGEL's preventative security model is helping organizations reduce complexity while strengthening security. He explores the vulnerabilities introduced by hybrid work, BYOD environments, and the increasing reliance on AI models that interact with an enterprise's most sensitive data. We dive into how zero trust is evolving from a marketing buzzword into a practical framework built on collaboration, unified management, and strong policy enforcement at the endpoint. John breaks down why zero trust isn't a single product or checklist but an ecosystem of technologies and partnerships that need to operate together—securely and seamlessly. He also explains why endpoint security still matters, how most attacks still originate at the edge, and why IGEL's immutable operating system is designed to shut down threats before they even begin. As AI-powered attacks accelerate, John also discusses the importance of reducing noise for incident response teams and the potential for AI to eventually move from defense to pre-emptive strike. If you're leading cybersecurity in government, finance, manufacturing, or any sector with critical infrastructure, this conversation will give you a clearer view of where endpoint protection fits into a secure, cloud-connected, AI-augmented world. What are you doing today to make sure your organization's edge is ready for tomorrow?
At Enterprise Connect 2025, Michelle Ritz of Jabra joined Doug Green, publisher of Technology Reseller News, to discuss the company's latest innovations, including the new PanaCast 40 VBS and continuous improvements across Jabra's product line. Expanding Video Solutions for Small Meeting Spaces Fresh off its ISE 2025 debut, Jabra introduced the PanaCast 40 VBS, the only Android-powered video bar for small rooms with a 180-degree field of view. Available mid-2025, this solution ensures all participants are visible, addressing the growing demand for small-room video solutions. “Small meeting rooms are the fastest-growing segment in office spaces, yet they remain underserved when it comes to video,” said Ritz. “The PanaCast 40 VBS ensures that every participant is captured clearly.” Continuous Innovation in Video and Audio Jabra also announced enhancements to its PanaCast 50 lineup, including BYOD mode and intelligent meeting space capabilities. These improvements reinforce Jabra's commitment to future-proofing its products, ensuring customers receive long-term value. As part of Jabra's approach to enhancing existing devices, the Jabra Speak 275 speakerphone received a firmware update. This new capability allows users to pair two Speak 275 units together, expanding coverage for medium-sized meeting rooms. The Future of AV in Hybrid Workspaces Jabra recognizes that hybrid work models demand seamless audio and video experiences. AV solutions must be user-friendly, integrate across platforms, and eliminate distractions, such as unwanted background movement in glass-walled conference rooms. Features like intelligent meeting space help teams stay focused by ensuring only in-room participants appear on camera. What's Next for Jabra? With continuous software and hardware innovations, Jabra remains committed to expanding its video, headset, and collaboration solutions. Attendees at Enterprise Connect can visit Jabra at Booth #1227 for hands-on demos. For those unable to attend, visit Jabra's website for more details, product updates, and upcoming releases.
What happens when you meet a cybersecurity founder over dinner and 12 hours later, they're on your podcast? You get one of the most brutally honest conversations about mobile security. In this episode, Rocky Cole, co-founder of iVerify, lays out why mobile security is dangerously behind—and why businesses are in denial about the scale of the threat. We dive into: The biggest myth in mobile security—why MDM (Mobile Device Management) is not a security tool and never was. Why enterprise security leaders are still ignoring mobile security (even when businesses are now prime targets). How attackers have outpaced traditional mobile security measures—and what needs to change. The operational bottlenecks holding CISOs back from fixing the problem—and how to work around them. Rocky shares raw insights from the frontlines of mobile security, including how his team uncovered new Pegasus infections, why BYOD security is broken, and what companies should be doing NOW. If you're still treating mobile devices differently than desktops, this episode will change your perspective—fast.
Watch on YouTube.In this packed episode of UC Today, David Dungay is joined by a powerhouse panel of Microsoft Teams experts:Tom ArbuthnotAmanda SternerSatish UpadhyayaKevin KeelerRyan HerbstJosh BlaylockFresh from ISE 2024, the team dives into the latest Microsoft Teams innovations, including new hardware, Express Install setups, MultiCam capabilities, AI-powered super resolution, and the future of meeting room experiences.If you want insider knowledge on the latest Microsoft Teams updates, this discussion is unmissable!The Microsoft Teams ecosystem is evolving faster than ever, and ISE 2024 was packed with groundbreaking announcements. Our expert panel breaks down everything you need to know about Teams hardware, AI advancements, and smart meeting room solutions.ISE 2024 Highlights – The latest Jabra, Shure, Logitech, and MaxHub Teams-certified hardware for next-gen meeting spaces.BYOD vs. Native Teams Rooms – The ongoing debate: When does a business upgrade to a full Teams Room solution?MultiCam for Teams Rooms – Now generally available, enabling seamless multi-angle viewing in large rooms & classrooms.AI-Driven Super Resolution – How Microsoft is using AI to upscale low-quality video in poor network conditions.Microsoft Teams Panels & Room Occupancy – Real-time sensor data now prevents those “awkward walk-ins” during meetings.Microsoft-Android Partnership (M-DEP) – The latest OEM partnerships and what it means for Teams hardware innovation.Microsoft Teams is redefining the way we work—from AI-powered enhancements to streamlined hybrid collaboration. If you're an IT leader, UC strategist, or Microsoft Teams power user, this episode is a goldmine of insights!Connect with our hosts David Dungay and Tom Arbuthnot on socials here:David DungayLinkedInTwitterTom ArbuthnotLinkedInTwitterThanks for watching, if you'd like more content like this, don't forget to SUBSCRIBE to our YouTube channel.You can also join in the conversation on our Twitter and LinkedIn pages.Join our new LinkedIn Community Group.
SaaS Scaled - Interviews about SaaS Startups, Analytics, & Operations
Today, we're joined by Zach Wasserman, Co-Founder of Fleet, open-source device management for IT and security teams with thousands of laptops and servers. We talk about:Best ways to build trust with usersImpacts of AI on open source, including using gen AI to describe human-created queriesCross-platform endpoint managementDetermining the scope of device management with BYOD & less traditional computing devicesDevice management surprises
In Episode S7E4,David Matalon, CEO and Founder ofVenn, joins Steven Bowcut to explore the evolving landscape of remote work security and the challenges of traditional Virtual Desktop Infrastructure (VDI). David shares insights into how financial services and other industries have struggled with data security, compliance, and usability in a BYOD-driven world, and how Venn'sSecure Enclave and Blue Border technology provide a more seamless, secure alternative. They also discuss the importance ofwork+life integration over balance, how Venn's approach enhances remote productivity without sacrificing security, and the lessons learned from scaling a cybersecurity business. The conversation delves into thefuture of BYOD, its growing strategic importance in hybrid workforces, and how Venn is shaping the future of secure remote access by integrating with existing applications and infrastructure. David also shares his vision for thenext phase of remote work, where BYOD becomes the standard rather than the exception.
Olly Henderson, Head of Video Product Management and Portfolio at Jabra, discusses the evolution of meeting room technology and how Jabra is redefining enterprise audio and video conferencing solutions.Launch of Panacast 40 VBS - a new Android bar designed for small huddle roomsThe Role of Edge AI in Jabra's video solutions for optimal performance and reduced cloud dependencyThe Future of BYOD in Meeting RoomsJabra's partnerships and collaborative efforts to enhance their product offerings, including the integration of the Microsoft Device Ecosystem Platform (MDEP)Simplifying the deployment process and reducing costs with features including zero-touch deployment and Jabra Plus management platform advancementsThanks to Jabra, this episode's sponsor, for their continued support.
Eshan Mathur, Senior Product Manager at Microsoft, helps us understand the evolving Bring Your Own Device (BYOD) landscape within Microsoft Teams, focusing on Microsoft's aim to provide seamless user experiences and enhanced manageability for IT admins for BYOD.Eshan's unique career journey from game development, including 'Where's my water', to enterprise solutionsEnhancements in Microsoft Teams BYOD experiences, including automatic audio device selection Auto-association for managing shared devicesFuture BYOD developments and recommendations for organisations in BYOD scenariosThanks to Logitech, this episode's sponsor, for their continued support.
As the year comes to a close, Rob Scott, joined by Tom Arbuthnot of Empowering.Cloud, and other renowned Microsoft Teams experts, explores the standout moments and innovations from 2024.This lively discussion sheds light on the game-changing updates that enhanced Microsoft Teams' functionality, customer engagement tools, and AI-driven capabilities.Here's what you'll discover:Top Numbers & Stats: Insights into Microsoft Teams' user base growth, including 20M Teams Phone users and 1M Teams Rooms milestones.AI Innovations: Key features like Intelligent Recap and the upcoming Translator Agent poised to redefine how global teams collaborate.Contact Center Expansion: The rise of Dynamics 365 Contact Center and its integration with Teams and Azure Communication Services.Big Tech Upgrades: The seamless rollout of Teams 2.1, advancements in BYOD management, and the Microsoft Device Ecosystem Platform (MDEP).Don't miss the panelists' predictions for 2025, including the anticipated impact of CoPilot, AI, and Teams Premium growth. Whether you're strategizing for hybrid work, streamlining your tech stack, or curious about the latest trends, this episode has something for everyone!
Businesses are facing increasing pressure to innovate cost-effectively amidst increasing investments driven by Generative AI, traditional AI, and cloud expansion, expect greater pressures on IT budgets as well as a bigger need for transparency and governance over IT costs In 2025, the pace of technological advancement shows no sign of slowing, and businesses are facing increasing pressure to innovate cost-effectively amidst increasing investments driven by Generative AI, traditional AI, and cloud expansion. This leads to greater pressures on IT budgets as well as a bigger need for transparency and governance over IT costs. Tangoe, the 25-year pioneer in technology expense management, makes five key predictions of tech costs and the revenue opportunities they present for Channel Partners. Chris Ortbals, Chief Product Officer at Tangoe, unpacks these five predictions and their impact on decision-makers and technology advisors: Innovation will Become the Biggest Financial Threat 2025: The Year of the Private Cloud Comeback Mobile Data Prices will Become a Sea of Sameness The End of BYOD is Near Mobility Leaders will be Deceived into Thinking Overspending has Been Solved In addition to his predictions, Chris offers Channel Partners a detailed action plan including specific revenue opportunities, tips for how advisors should guide clients in the future, and consulting service offerings to get Partners off to a strong start in the year ahead. Don't miss his Technology Reseller News article here. About Tangoe Tangoe pioneered technology expense management more than 25 years ago, and today we're the industry leader driving innovation through AI-powered automation, 70+ patents, and the largest ecosystem of global partners. We specialize in helping enterprises of all sizes save money, utilize IT resources more effectively, and gain visibility and control over their spending and mobile devices. With the industry's first complete solution for telecom, mobile, and cloud cost optimization alongside the largest technology spend under management, Tangoe is the preferred partner for those seeking cost savings, financial predictability, and ROI for digital innovation. Visit us at Tangoe.com.
Send us a textAn In-Depth Conversation With Tech Powerhouse Jason Kauffman on The Wireless WayJoin host Chris Whitaker in this compelling episode of The Wireless Way as he sits down with seasoned technology consultant Jason Kauffman. With a rich background spanning from SMBs to Fortune 50 companies, Jason delves into his extensive experience in unified communications, contact centers, IOT, cloud, mobility, cybersecurity, and more. Discover how Jason's career evolved from landscaping to becoming an industry leader with over 108 certifications. They also explore pressing issues like AI in cybersecurity, the complexities of BYOD policies, and the future of technology. Filled with personal anecdotes and industry insights, this episode is not to be missed.00:00 Introduction and Mystery Guest Teaser00:14 Meet Jason Kauffman: A Tech Powerhouse01:30 Jason's Personal Side: Food Enthusiast and Family Man07:03 Jason's Career Journey: From Landscaping to Tech Leadership14:13 The Role of AI in Modern Technology16:19 Cybersecurity in the Age of AI18:57 The Role of AI in Enhancing Efficiency19:53 Cybersecurity Threats and AI21:40 The Shift to BYOD and Its Challenges26:38 Content Creation and Knowledge Sharing32:14 Final Thoughts and Future PredictionsSupport the show
Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we discuss Apple's Private Relay function and whether it can be used in a group practice context. We discuss: Security policies around network security and device security, particularly BYOD policies How Private Relay works, and its limitations How Private Relay is similar to a VPN (and how it is different) What functionality is required for network and device security Private Relay alternatives and their limitations Our recommended VPN service Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website. PCT Resources Group Practice Care Premium weekly (live & recorded) direct support & consultation service, Group Practice Office Hours -- including monthly session with therapist attorney Eric Ström, JD PhD LMHC + assignable staff HIPAA Security Awareness: Bring Your Own Device training + access to Device Security Center with step-by-step device-specific tutorials & registration forms for securing and documenting all personally owned & practice-provided devices (for *all* team members at no per-person cost) + assignable staff HIPAA Security Awareness: Remote Workspaces training for all team members + access to Remote Workspace Center with step-by-step tutorials & registration forms for securing and documenting Remote Workspaces (for *all* team members at no per-person cost) + more HIPAA Risk Analysis & Risk Mitigation Planning service for mental health group practices -- care for your practice using our supportive, shame-free risk analysis and mitigation planning service. You'll have your Risk Analysis done within 2 hours, performed by a PCT consultant, using a tool built specifically for mental health group practice, and a mitigation checklist to help you reduce your risks.
UC Today's David Dungay hosts Sandhya Rao, Group Product Manager of Microsoft Teams Devices & Gauthier Renard, Group Product Manager, Barco.In this session, we discuss the following:Highlights from IgniteLatest trends in BYOD for Microsoft TeamsHow Barco and Microsoft are working together to create BYOD rooms
Dive deep into Network Access Control (NAC) - the cutting-edge solution safeguarding your digital assets. Join CEO Kyle, COO & CISO Todd, and Director of Cybersecurity Nate as they demystify NAC's core components and benefits. Discover how this powerful technology seamlessly integrates with compliance frameworks like Zero Trust to fortify your cyber defenses. Whether you're a multinational enterprise or a nimble startup, our experts guide you through implementing NAC with ease. Stay ahead of emerging threats and empower your workforce through secure BYOD access - all while leveraging CIT's renowned reliability. Don't miss this opportunity to future-proof your network security strategy.Learn more about Zero Trust: https://www.cit-net.com/navigate-zero-trust-traditional/https://www.cit-net.com/zero-trust-in-motion/
Send us a textPaul Knittle, Founder and President of MTMG, is a technology leader with over 30 years of experience in IT and telecommunications. He has led international expansion for a Managed Mobility Services provider in 18 countries and built high-performing B2B teams at T-Mobile, achieving record-breaking results. At MTMG, Paul oversees a team of experts, guiding businesses through digital transformation and solving complex IT challenges. As host of the MTMG IT Roundtable podcast, he engages top executives in discussions on emerging technologies. His leadership focuses on driving growth, efficiency, and long-term success for clients. Joe McGuire, Chief Solutions Officer at MTMG Inc., brings over 30 years of experience in sales, marketing, and business development across IT, mobility, and energy sectors. He leads a global team optimizing IT and telecom investments, specializing in MSPs, mobile management systems, and IoT solutions. Previously, Joe served as CRO at Autocavo, driving AI-powered fleet management sales, and led T-Mobile's B2B division, managing a partner portfolio and launching its first co-selling program. As Mayor of Northvale, NJ, Joe applies his leadership skills to public service. Known for collaboration and innovation, Joe consistently delivers growth and cost savings for clients.In this special edition of 'The Wireless Way,' the host introduces two esteemed guests, Paul Knittle and Joe McGuire, who bring decades of experience in IT, telecommunications, sales, and business development. Paul is the founder and president of MTMG, a company focused on guiding businesses through digital transformation and solving complex IT challenges. Joe, the chief solutions officer at MTMG, brings his expertise in optimizing IT and telecom investments. The conversation delves into the philosophy behind MTMG, which aims to help clients optimize their IT systems and save costs. Paul and Joe discuss their career paths, the importance of aligning IT goals with business objectives, the future of wireless technology, and the balance between corporate and BYOD policies. They also share insights from their podcasting experiences, emphasizing the human element in technology and business relationships.More on Paulhttps://www.linkedin.com/in/paulknittle/More on Joehttps://www.linkedin.com/in/josephmcguire/MTMG Podcasthttps://www.mtmg.eu/podcast.htmlSupport the show
This week, we discuss something near and dear to our hearts - RDP Shortpath! What is it, even? TCP and UDP? Get out of here! We touch on the current enterprise landscape, the need for BYOD, Microsoft's remote working capabilities, and how RDP Shortpath rules them all. Mostly. Also, Tobi asks Jussi an unexpected question.(00:00) - Intro and catching up.(04:50) - Show content starts.Show links- RDP Shortpath- Ctrl+Alt+Azure | 176 - Let's talk about Azure Virtual Desktop- Ctrl+Alt+Azure | 094 - Your PC in the cloud with Windows 365- Ctrl+Alt+Azure | 149 - Developing in the cloud with Microsoft Dev BoxWe want feedback!- Give us feedback!
In this episode of SaaS Fuel, we explore the journey of Dave Dittenber, who transitioned from a humble dishwasher in Northern Michigan to a tech innovator revolutionizing the restaurant industry. Discover how Dave's innovative solutions, such as BYOD (Bring Your Own Data) and Mabel, a virtual restaurant assistant, are enhancing decision making and streamlining operations without losing the essential personal touch.Learn practical tips for improving employee efficiency through customizable checklists, gamification, and structured processes within mobile apps. Finally, dive into the strategic challenges and partnerships that have fueled the growth of Dave's tech-driven solutions in the hospitality sector. Don't miss this episode— it's a masterclass in balancing people, processes and technology for operational success. Key Takeaways00:00 New leadership, changing market, outdated business models.03:56 Platform as a service enables scalable, sticky relationships.08:45 Leadership, followership, security insights from experts.11:41 Balancing technology and hospitality in restaurant management.16:21 Alerts to adjust TV for marketing initiatives.18:18 Historical data alone can't accurately predict sales.23:00 Need easy, customizable checklists to improve documentation.24:13 Easy-to-use customizable checklist for staff operations.28:13 Technology aids onboarding, enhances communication, personal touch.34:18 Lacked technology expertise after co-founder Frank passed.37:52 Challenges in adapting technology due to uncertainties.40:38 Shifting focus from small customers to enterprise.43:00 Converting convenience stores to digital for efficiency.47:11 Our product ensures user-centric data solutions, strategically.51:15 Different standards; resilience and learning are essential.52:46 Transitioned from simple bank debt to private equity.Tweetable QuotesStrategic Sales Relationships: "Instead of going out like lead gens and a lot of things that we were told in the beginning that we had to worry about, like, we can be a lot more tactical or strategic by through relationships and getting to know people." - Dave Dittenber 00:48:15Bootstrapping and Private Equity: "We bootstrapped, and we self funded, probably the 1st 2 years. And then as we were looking to say, okay, as you're gonna, you know, be more viable and you're gonna build build a business, it has to be investable." - Dave Dittenber 00:53:19The Weight of a Title: "The other thing is sometimes they put the CEO title behind your name and you think that you should know everything." - Dave Dittenberg 00:54:53Transparency in Business: "We also are really transparent with our investors. Right? If we're gonna go do something or thinking about doing something, you know, we communicate that." - Dave Dittenberg 00:55:09SaaS Leadership LessonsEmbrace an Unconventional Journey: Dave's path from dishwasher to tech entrepreneur highlights the importance of diverse experiences in shaping innovative solutions. His background in hospitality provided unique insights that a traditional tech background might not have offered. Embrace and leverage unconventional journeys to drive innovation in SaaS products. Integrate Technology with Human Touch: Dave's innovations like BYOD and Mabel show the importance of integrating technology to enhance human operations rather than replace them. The concept of “augmented intelligence” rather than “artificial intelligence” emphasizes that technology should support human decision making,...
The UK designates data centers as Critical National Infrastructure. Cisco releases patches for multiple vulnerabilities in its IOS XR network operating system. BYOD is a growing security risk. A Pennsylvania healthcare network has agreed to a $65 million settlement stemming from a 2023 data breach.Google Cloud introduces air-gapped backup vaults. TrickMo is a newly discovered Android banking malware. GitLab has released a critical security update. A $20 domain purchase highlights concerns over WHOIS trust and security. Our guest is Jon France, CISO at ISC2, with insights on Communicating Cyber Risk of New Technology to the Board. And, could Pikachu be a double-agent for Western intelligence agencies? Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest is Jon France, CISO at ISC2, sharing his take on "All on "Board" for AI – Communicating Cyber Risk of New Technology to the Board." This is a session Jon presented at Black Hat USA 2024. You can check out his session's abstract. Also, N2K CyberWire is a partner of ISC2's Security Congress 2024. Learn more about the in-person and virtual event here. Selected Reading UK Recognizes Data Centers as Critical National Infrastructure (Infosecurity Magazine) Cisco Patches High-Severity Vulnerabilities in Network Operating System (SecurityWeek) BYOD Policies Fueling Security Risks (Security Boulevard) Healthcare Provider to Pay $65M Settlement Following Ransomware Attack (SecurityWeek) Google Unveils Air-gapped Backup Vaults to Protect Data from Ransomware Attacks (Cyber Security News) New Android Banking Malware TrickMo Attacking Users To Steal Login Credentials (Cyber Security News) GitLab Releases Critical Security Update, Urges Users to Patch Immediately (Cyber Security News) Rogue WHOIS server gives researcher superpowers no one should ever have (Ars Technica) Pokémon GO was an intelligence tool, claims Belarus military official (The Register) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential security leaders in the industry. Learn more about our network sponsorship opportunities and build your brand where industry leaders get their daily news. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we're discussing the scope of responsibility and liability for device security in group practice. We cover what handling PHI means; device security measures for devices that touch PHI; a multi-prong approach to device security; Safe Harbor requirements; the benefits of having Safe Harbor in place; Safe Harbor and state data breach laws; the cost of implementing Safe Harbor on all devices. Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website. PCT Resources PCT article: Easy Steps to Ensure Safe Harbor: Implementing Technical Security Measures PCT podcast episode: Episode 332: To BYOD or Not to BYOD Group Practice Care Premium weekly (live & recorded) direct support & consultation service, Group Practice Office Hours Device Security: assignable staff HIPAA Security Awareness: Bring Your Own Device training + access to Device Security Center with step-by-step device-specific tutorials & registration forms for securing and documenting all personally owned & practice-provided devices (for *all* team members at no per-person cost) Remote Workspace Security: assignable staff HIPAA Security Awareness: Remote Workspaces training for all team members + access to Remote Workspace Center with step-by-step tutorials & registration forms for securing and documenting Remote Workspaces (for *all* team members at no per-person cost) + more HIPAA Risk Analysis & Risk Mitigation Planning service for mental health group practices -- care for your practice using our supportive, shame-free risk analysis and mitigation planning service. You'll have your Risk Analysis done within 2 hours, performed by a PCT consultant, using a tool built specifically for mental health group practice, and a mitigation checklist to help you reduce your risks and implement required safeguards.
In this episode of Insider's Guide to Energy, hosts Chris Sass and Niall Riddell delve into the intricate dynamics of the global battery and electric vehicle (EV) market with Steve LeVine, editor of The Electric. LeVine brings his vast expertise to the table, discussing the significant role China plays in dominating the battery supply chain and EV production. He explains how the US and Europe need to learn from China's advancements in battery manufacturing and technology to stay competitive in the rapidly evolving energy landscape. The conversation covers a wide range of critical topics, including the geopolitics of energy, the importance of securing raw materials like lithium, cobalt, and nickel, and the current state of the EV market in the West. LeVine shares his insights on why China has become a leader in this field, detailing the strategic moves that have allowed Chinese companies to control essential components of the battery supply chain. He also highlights the challenges and opportunities for Western car manufacturers in adapting to and competing with Chinese innovations in the EV sector. Furthermore, the episode explores potential strategies for the US and Europe to regain a foothold in the global EV market, such as investing in battery recycling and adopting new technologies like LFP batteries. LeVine underscores the need for a long-term commitment and collaborative efforts among Western nations to build a sustainable and competitive EV industry. By examining the lessons learned from past industrial transitions, this episode provides valuable insights into how Western countries can effectively navigate the future of energy and transportation. Meet our Guest: Steve LeVineVisit our Website: Insider's Guide to EnergyFollow our EV Channel: Insider's Guide to Energy EV
This classic episode of the ITPro Podcast was first published on 14 July 2023.When you consider the roles that hold influence over business decisions and operations, which come to mind? Doubtless, the CEO and CFO, as well as the COO if you have one. The CMO may also be there – but what about the CIO or CTO?The advent of cloud computing, bring your own device (BYOD), and increasing cyber security threats were all supposed to coincide with CIOs finally having their seat at the table. ITPro has published articles on exactly this trend.But it seems that in some areas, this shift is stalling or even reversing. In this episode, Jane and Rory are joined by Anthony Byrne, EY partner leading technology practice for the UK and Ireland to discuss what's behind this regression and the changing role that CIOs must play.Read more:What is BYOD?Majority of CIOs plan to expand their IT teams despite shrinking budgetsWhy people management skills are key to being a CIOHow CIOs and CTOs can collaborate more effectivelyIT Pro Podcast: Are chief metaverse officers here to stay?Protecting CIOs' IT budgets is "paramount" in maintaining business growthWhy business leaders – not technologists – make the best CIOs
Emerging technologies simplify many aspects of life, but they also make it increasingly challenging to safeguard privacy in both personal and professional settings. As a lawyer, it is essential for you to stay informed about how to protect privacy by utilizing the appropriate tools and equipment. Paul Secunda joined us today to talk about protecting your privacy, building open communication between employer and employee, tech tips to focus on your work, and more. Paul Secunda is a partner at Walcheske Luzi LLC. He leads the ERISA litigation unit, which focuses on retirement, medical, and disability class action litigation. He also serves as a consultant, testifying expert, and mediator in the fields of employee benefits and workplace law. Paul is a former labor and employment law professor with 18 years of experience at two law schools, focusing on employment law and employee benefits. Throughout his career, Paul has been engaged in litigating, teaching, and writing about workplace law, handling tasks from reviewing employee handbooks to managing complex class action lawsuits and submitting amicus briefs to the Seventh Circuit Court of Appeals and the U.S. Supreme Court. Paul's expertise spans employee rights and the practical application of technology in both professional and personal contexts. Join Paul and me as we talk about the following three questions and more! What are the top three tech tips you would advise any lawyer to maintain a separation from work and personal time? What are the top three tech rights an employee has when it comes to utilizing a personal tech device for a BYOD firm? What are your top three tech tips to ensure focus at work, to help prevent necessary work during personal time? In our conversation, we cover: [01.28] Tech Setup - Paul's current tech setup. [09.00] The Balance – Balancing technology as a small law firm. [10.00] Tech tips – Paul shares some tech tips for separating personal and professional life. [11.40] Clients - How to work with overbearing clients? [13.26] Superiors – Paul explains how you can handle your superiors. [16.38] Open Communication – The importance of open communication between employer and employee. [20.06] Tech Rights – Paul explains how employee privacy rights differ significantly between public and private workplaces. [25.44] Tracking Software – Paul explains why he would advise against letting your employer put tracking software in your computer. [29.52] Focusing on work – Paul shares three tech tips you can use to focus on your work and prevent working on your personal time. Resources: Connect with Paul LinkedIn - linkedin.com/in/paul-secunda-a17228/ Website - walcheskeluzi.com/ Equipment Mentioned in the Podcast Fujitsu Scanners - thescannershop.com/fujitsu-scanners/ HP Printers - hp.com/us-en/shop/mdp/printers/laserjet-pro iPhone 15 Pro - apple.com/iphone-15-pro/ MacBook Air - apple.com/macbook-air/ Software & Services Mentioned in the Podcast Adobe Acrobat Reader - get.adobe.com/reader/ Clio - clio.com/ Sanebox - sanebox.com/ TurboScan - play.google.com/store/apps/details?id=com.piksoft.turboscan WordPerfect - wordperfect.com/en/ Transcript 00:00:00] Michael D.J. Eisenberg: Episode 90, Balancing Your Use of Technology Between Your Work and Home with Labor and Employment Lawyer, Paul Secunda. [00:00:19] Michael D.J. Eisenberg: Paul is a former Labor and Employment Law professor with 18 years of experience at two different law schools specializing in ERISA and Employee Benefits Law. He is now an attorney with Woltersky Luzzi, LLC. Paul's legal career has been devoted to litigating, teaching, and writing about workplace law issues, handling all aspects of the employment relationship, from reviewing employee handbooks and summary plan descriptions, to litigating complex class action cases, and submitting amicus briefs to the Seventh Circuit Court of Appeals and the United States Supreme Court. [00:00:46] Michael D.J. Eisenberg: Paul caught my attention with his law journal article, The Employee Right to Disconnect, after I come across California's recent Employee Right to Disconnect bill. This bill would require employers to create a written policy guaranteeing California employees the right to disconnect from work communications during non working hours. [00:01:01] Michael D.J. Eisenberg: Join Paul and me as we discuss how employees, including lawyers, have rights and practical uses of technology in both their workplace and their private lives. Enjoy! [00:01:09] #Add Read #1: Consider giving us a five star review on Apple podcasts or wherever you get your podcast feeds. [00:01:09] Michael D.J. Eisenberg: Have you been enjoying the techsavvylore. page podcast? Consider giving us a five star review on Apple podcasts or wherever you get your podcast feeds. [00:01:21] Michael D.J. Eisenberg: Paul, welcome to the podcast. [00:01:23] Paul Secunda: Thank you for having me. [00:01:24] Michael D.J. Eisenberg: I appreciate you being here and to get things started, [00:01:26] Our Guest's Current Tech Setup! [00:01:26] Michael D.J. Eisenberg: please tell us what your current tech setup is. [00:01:28] Paul Secunda: Well, currently I'm working on a MacBook Air, about 11 inch screen and being assisted by the new iPhone 15 pro. [00:01:37] Michael D.J. Eisenberg: Nice. And is your MacBook Air, is it an M1 chip or an M2, M3, or are we looking at an Intel processor? [00:01:43] Paul Secunda: This is from 2023, and I believe it's an M2 chip. [00:01:48] Michael D.J. Eisenberg: Very nice. How do you like the speed? [00:01:50] Paul Secunda: The speed is much better than my previous iteration from 2019, which was a much slower processor, so I very much appreciate it. [00:01:59] Michael D.J. Eisenberg: So, I'm guessing that was an Intel chip? That is correct. So you should really notice like a boost. [00:02:04] Paul Secunda: And when you're working and jamming away at five different things at the same time, it really does make a difference as far as getting stuff done on a timely basis. [00:02:12] Michael D.J. Eisenberg: How has the battery been on that? [00:02:14] Paul Secunda: The battery's been okay. I would say I could go about three or four hours. But I'm on a high light and I am meaning I'm, I have a high brightness, I should say, and that seems to drain the battery, but I need that just to see things better, but I'm mostly plugged in most of the day. [00:02:31] Paul Secunda: So I don't really go without the plug, whether I'm at a deposition or whether even if I'm in the courtroom, I usually find a plug to plug in. So I haven't really had to test it that much. Do [00:02:43] Michael D.J. Eisenberg: you carry a backup battery with you? [00:02:44] Paul Secunda: I do not. [00:02:45] Michael D.J. Eisenberg: But I want to check out the anchor. Product line, they come up some really good backup batteries that are usually fairly light will fit in your suitcase or your briefcase. [00:02:52] Michael D.J. Eisenberg: I should say, [00:02:53] Paul Secunda: okay, well, I'm ready right now, [00:02:55] Michael D.J. Eisenberg: just sort of as an emergency. And if you go like on Amazon or something similar, I'm sure you'll find a deal at some point anchors had like 20 percent off. Here and there, and there's some good options. There's also of course other brands, but I would go with a reliable brand to make sure that the battery is made well, gonna last a while, and also doesn't cause some sort of like back feed, some sort of back charge by accident. [00:03:17] Paul Secunda: No, that's, that's really much appreciated because needless to say, that can be a lifesaver. [00:03:21] Michael D.J. Eisenberg: And any other tech that you use? [00:03:23] Paul Secunda: Well, I, I did mention the phone, but really I'm a fairly lean and mean operator, I guess. [00:03:29] Michael D.J. Eisenberg: So I have to ask, do you have a printer and do you use it a lot? [00:03:32] Paul Secunda: I tried to avoid printing out copies. [00:03:35] Paul Secunda: Can I use an app called TurboScan? In other words, I did take whatever I get in the mail or from others and put it in PDF form almost immediately. I digitize. And thereafter, whether I'm dealing with, let's say, a deposition, a court reporter, or various chambers, I try to stick mostly with PDF files. This is also true with dealing with opposing counsel. [00:04:01] Paul Secunda: We tend not to send things to each other by snail mail anymore. I send documents in discovery through servers and or digital files. [00:04:11] Michael D.J. Eisenberg: Do you have a PDF reader of preference? [00:04:13] Paul Secunda: Adobe Acrobat. [00:04:14] Michael D.J. Eisenberg: Okay. [00:04:15] Paul Secunda: Yeah, I use Word, Microsoft Word for my word process. [00:04:18] Michael D.J. Eisenberg: And you don't use Pages? Apple Pages? [00:04:21] Paul Secunda: Well, only when it, sometimes I get documents in Pages form. [00:04:26] Paul Secunda: Really? And so what I'll do, unusual, unusual, but what I'll do is I'll redo the format into Microsoft Word. It's what I'm comfortable operating in. [00:04:34] Michael D.J. Eisenberg: So I have to ask, the app that you use, when you get a lot of, Documents. I mean, isn't that a little time consuming to have to take a picture page by page by page? [00:04:43] Paul Secunda: Yeah. If I were to get a lot of documents, like a bundle, we'd feed it to the printer we do have in our office. Okay. And I would put it onto a thumb drive and then put it on my server that way. But if you're dealing with anything, let's say less than 25 pages, which is a lot of my documents, It's very handy. [00:05:01] Paul Secunda: It's very easy to use and the, the pages that are generated are very accurate and look good. [00:05:06] Michael D.J. Eisenberg: Yeah. I use the Fujitsu scan snap, which is considered like a staple of any cell loan, small practitioners. It's an ADF on a document feeder that. Takes 50 pages at a time and could really move through a lot of documents. [00:05:20] Michael D.J. Eisenberg: When I started practice way back when I was dealing with a lot of large VA files, Department of Veterans Affairs files for my clients. And that could be like a thousand, two or three thousand pages. And that would just taking, of course, also back then the iPhones and other smartphones, PDF capture was not as good as it is today. [00:05:38] Paul Secunda: That is true. And so I guess I should say in talking about PACs, since you've brought up the printer, I am using a Let's see if I can find it here. An HP laser jet pro. You eight zero. Wow. Yeah. So [00:05:53] Michael D.J. Eisenberg: how many pages can you fit into the scanner of that printer? [00:05:56] Paul Secunda: I think the feeder is up to 50 pages. [00:05:58] Michael D.J. Eisenberg: Cool. And you know about inkjet superstore, right? [00:06:01] Paul Secunda: I do, because we all know that inkjet could drive you into bank. [00:06:04] Michael D.J. Eisenberg: Although I haven't had to order for them in like a couple of years, because since COVID, everything's really gone, really, really gone digital. [00:06:12] Paul Secunda: Yeah. And that's what I was trying to say, which is I really don't do unless it's sent to me. I am not one to send other people things by hard copy. [00:06:22] Paul Secunda: I really do try to avoid it, not just because it's inconvenient, but all that sustainability stuff as well. [00:06:27] Michael D.J. Eisenberg: Gotcha. Gotcha. I'm with you on that. So you have an HP printer and what you have an all Apple. [00:06:34] Paul Secunda: No, this is very interesting. I'm the only person in my office who uses Apple, all the other partners that I have, of which there are four other partners on a HP slash Lenovo type of platform. [00:06:47] Paul Secunda: And so the way we handle that is we use a Clio, which is just a management software interacting with a Google business server, this kind of application. [00:06:58] Michael D.J. Eisenberg: So you have a Google business account, correct? And why don't you use. Google Docs versus Microsoft Word. [00:07:04] Paul Secunda: I just am a dinosaur, I guess. I've been in practice for 27 years and I just feel more comfortable. [00:07:11] Paul Secunda: It's not that I don't use Google Docs. I do. And in fact, some clients prefer to use Google Docs and I've I've certainly I have that capability, especially when we're working on documents together. It can be very, but if I'm writing a brief or if I'm writing other types of documents, I tend to feel just more comfortable in the Microsoft world when we're talking about something like that. [00:07:35] Michael D.J. Eisenberg: Fair enough. Fair enough. So wait, you're not using WordPerfect. [00:07:37] Paul Secunda: I'm not using it. It's funny. I started my life using WordPerfect. When I was in college and law school, I was a WordPerfect guy, and somewhere in the late 90s, early 2000s, maybe when I became a law professor, which was in 2002, I started using Microsoft Word and never went back. [00:07:53] Paul Secunda: So at this point, it's been over two decades I've been on Microsoft Word. [00:07:57] Michael D.J. Eisenberg: Do you believe that they still make WordPerfect and that some lawyers actually still use WordPerfect because of whatever little, the macros that they made, that they're afraid to start over again, which is amazing. [00:08:07] Paul Secunda: I have co counsel who use WordPerfect and Needless to say, we've come up with a way of interacting that doesn't get all sorts of codes and other problematic things in our documents. [00:08:17] Paul Secunda: But yes, there are a few people still out there. They're diehards, I would say. [00:08:20] Michael D.J. Eisenberg: How well does the conversion work between a WordPerfect document and a Microsoft Word document going back and forth with the file itself? [00:08:28] Paul Secunda: I would compare it to, have you ever used the converter on like an Adobe and gone to a Microsoft Word document? [00:08:34] Paul Secunda: Yes. So there are problems, right? You have to go through that document and take out codes and other types of information that is either wrong, or like, for instance, it messes up the footnotes, but you have to then remember the footnotes. So I would say it's very similar. I would say that you run into a lot of the same types of problems between Word Perfect and Word that you see between like Adobe and Word. [00:08:55] Michael D.J. Eisenberg: I commend you for you guys being able to work through that. [00:08:58] Paul Secunda: We are a. As a sole practitioner, you will understand that as a very small office, we do a lot of things on our own. We have no secretaries, no administrative assistants, no paralegals. We do our own work, and so when we do it, we try to do it in a way that is most comfortable for us individually. [00:09:17] Paul Secunda: But also we need to interact as a firm. So we're trying to have a tech balance there. If you will. [00:09:23] Michael D.J. Eisenberg: Yeah. I used to use open office, but I had a paralegal law clerk who had been with me for a while. And it just became too much for her that ultimately ended up getting Microsoft office just because I wanted to sort of keep the peace. [00:09:35] Paul Secunda: But people have a lot of, this comes up also in the PowerPoint world. When you're used the Google version or with the spreadsheets, people are very comfortable with Excel. So fine. There's a comfort there for a lot of people, including myself. Yeah. Well, let's get into the questions. Yeah. Okay. Please. [00:09:53] Q?#1: What are the top three tech tips you would advise any lawyer to maintain a separation from work and personal time? [00:09:53] Michael D.J. Eisenberg: What are the top three tech tips you would advise any lawyer to maintain a separation from work and personal time? [00:09:59] Paul Secunda: Well, the first thing is to put down your darn phone, right? I mean, no one can contact you if you're not constantly getting push notifications by text or by email or by some chat feature. Put down your phone, turn it off. It's good for your mental health and it will be very hard for people to reach you. [00:10:17] Paul Secunda: Now, needless to say, a lot of people are not going to do that because they feel at least in emergency situations that they need to be contacted. Intactable. So if you're going to keep your phone on, which gets into number two, I would tell you to really evaluate what's being asked. And when I say evaluate, I mean, consider the duration of how long it will take to do what's being asked. [00:10:40] Paul Secunda: If it's something that will take you a minute or two, okay, no big deal. And if you're helping someone out, go do it. But if you're talking about hours and interrupting your sleep, then really, I think you, you need to write back to the person who is writing you and ask them. them the priority and what's involved that requires you to do this kind of after the whistle blows. [00:11:00] Paul Secunda: And the third thing I would say to you is talk honestly and openly during the work day with your colleagues, whether they be. Your superiors, your people who are at the same level, people who are your subordinates. Have an honest conversation about electronic communications after the day's over. Because I think a lot of people fail to do that, and sometimes there's just a misunderstanding that can be dealt with if done proactively. [00:11:28] Michael D.J. Eisenberg: Well, how would you handle, say, an overbearing client? I think in the news, we're aware of at least one potential client like that, who expects to have his calls answered. at any time of the day. [00:11:38] Paul Secunda: Well, I think my same advice holds up. I think even with overbearing or maybe even anxiety laden people, because that's sometimes what you're talking about people who are just nervous and therefore overbearing, having an open, honest conversation at the beginning of that representation. [00:11:56] Paul Secunda: If you're Ernie or whatever business you're in and you have a client, set expectations. I think expectation setting is something that unfortunately doesn't happen because people are not having these basic conversations maybe the way they were 20, 30 years ago before the dawning of the age of social media. [00:12:12] Michael D.J. Eisenberg: What's interesting somewhat on the flip side, my day job, I represent veterans before the Department of Veterans Affairs. And one of my former clients called me on a Sunday, and I wasn't very, I wasn't necessarily happy about that. And I let it go to voicemail and I checked the voicemail if I recall this correctly, I believe I checked the voicemail. [00:12:29] Michael D.J. Eisenberg: I think he left me a voicemail and he was professing suicidal ideation, like eminent suicidal ideation. [00:12:35] Paul Secunda: And of course, you're not a mental health counselor. So I guess when you should have probably, I mean, I guess you did have to respond and try to get him to the appropriate person. [00:12:43] Michael D.J. Eisenberg: And that's what I spent a couple hours that night doing. [00:12:46] Paul Secunda: Well, that's obviously worth it. No one will tell you, you didn't do the right thing. But that's what I was saying in the beginning, if your phone's on, or if you're listening to your voicemail, evaluate it, I mean, needless to say there, there's nothing to evaluate. It's a life and death situation. It's easy. [00:13:00] Paul Secunda: You have to do what you had to do. But it's also needless to say that most employers who contact. Employees after hours don't do so in life and death situations. It's a matter of just feeling entitled to have your time and your attention even after the workday is over. [00:13:17] Michael D.J. Eisenberg: So I think you've kind of talked about how attorneys should handle clients. [00:13:21] Michael D.J. Eisenberg: How about handling their superiors? [00:13:23] Paul Secunda: Well, delicately, right? I mean, the problem is you have a power imbalance, right? Right. And one of the reasons in the article that I wrote back in 2018, 2019, the right to disconnect that I ended up focusing on occupational safety and health as opposed to wage and hours or autonomy or other bases, which you could make these kind of distinctions is because to me, workplace safety and health is a universal So. [00:13:51] Paul Secunda: Right and therefore a human right and therefore the idea is that power imbalances between different people in the workplace between bosses and subordinates should matter less or even if the boss doesn't realize then the subordinate has recourse either through Bringing up a regulation if it exists within your state, occupational and safety agency, or federally. [00:14:13] Paul Secunda: But at least it can be placed within a framework which your boss is hopefully going to at least acknowledge and discuss with you. [00:14:21] Michael D.J. Eisenberg: So the right to disconnect law that we're That kind of brought you to my attention. The one that came out in California or is coming out in California. I don't think it's passed yet. [00:14:30] Paul Secunda: No, it's just been introduced recently. [00:14:32] Michael D.J. Eisenberg: So are there any states that have this law? And what I'm kind of curious to know is if those that do, has any employer or say former employer been sued for violating that law? [00:14:42] Paul Secunda: So it did come up in New York a year or two ago. I'm not sure that really anywhere. I am not aware of any lawsuits over the right to disconnect. [00:14:51] Paul Secunda: One of the issues. And you see this with the California law, which has just been introduced by a democratic assemblyman out in California, is that they're trying to figure out how to implement it. Like, so for instance, California has a very stringent labor code that goes well on many states in the country. [00:15:08] Paul Secunda: And this is, this would be a state based law. But one of the things that relies upon is this wage and hour distinction, where if you're going to work Your work, you should get overtime. If you're going to put the hours in, you should get paid. No one should But the problem with that, of course, is not all workers are created equally under wage and hour law. [00:15:27] Paul Secunda: You have exempt workers and you have non exempt workers. And the exempt workers we usually refer to as salaried workers and the non exempt workers, you know, are hourly workers. So if you're an hourly worker, great, you work an additional two or three hours, you get an additional two or three hours of pay. [00:15:42] Paul Secunda: But if you're a salaried worker, and you're being paid a certain amount of year, no matter how many hours you work, and then you're putting over six hours a night extra, well, that can really add up. So I personally am not a fan of the California approach that is being considered right now, which, again, is based on this wage an hour idea, because I think out a number of workers. [00:16:04] Paul Secunda: I think it makes more sense if you want a universal right to go to the occupational safety and health route. [00:16:10] Michael D.J. Eisenberg: Oh, interesting. [00:16:11] Paul Secunda: Yeah. [00:16:13] Ad Read #2: Consider Supporting the Show by Buying Us a Cup of Coffee or Two! [00:16:13] Michael D.J. Eisenberg: Pardon the interruption. I hope you're enjoying the techsavvylary. page podcast as much as I enjoy making them. Consider buying us a cup of coffee or two to help defray some of the production costs. [00:16:21] Michael D.J. Eisenberg: Thanks and enjoy. [00:16:23] Michael D.J. Eisenberg: Well, let's go back to the question, though, because I think you've given us, I think, two answers. One, of course, is turn off your phone or don't have it with you. The second is better screening. [00:16:33] Paul Secunda: What would be their third? Well, I think the third is honest and open communication. I think if you are, again, it goes back to what we might call the third is expectation setting. [00:16:43] Paul Secunda: If you never talk to your employer about how you feel about them contacting you at 11pm at night, and then you start doing work at that time for them, don't be surprised when they ask you again a week or two later. Like, you've set that expectation. But on the other hand. It happens in the beginning, or if you can even address it as part of your beginning work with that employer, then it's less likely that the expectations would be misunderstood. [00:17:09] Paul Secunda: Look, I understand that American workers are suffering a huge power imbalance in the workplace. In this country, More than almost any other country in the world because we adhere to this employment at will flexibility for employers where you can be fired for a good reason, bad reason, no reason at all. [00:17:27] Paul Secunda: But on the other hand, I also understand that that's why we have laws and that's why if we can get something on the books that deals with the right to disconnect in a universal manner that applies to all employees. Hopefully employers will come over time to respect that kind of right that employees have to that time to themselves [00:17:47] Michael D.J. Eisenberg: what you don't pulling it back just a little bit more toward tech. [00:17:51] Michael D.J. Eisenberg: The one thing I'm surprised you haven't mentioned being an Apple user yourself is the focus modes that the Mac OS. IOS provide you, do you use that? [00:18:00] Paul Secunda: I have tried them in the past. You have purple mode, you have a sleep mode, you have a drive mode or just universal, do not disturb. I'm looking at it right now. [00:18:09] Paul Secunda: As you can also create your own focus modes. [00:18:12] Michael D.J. Eisenberg: Oh, you can do a custom one too. [00:18:13] Paul Secunda: You can set up any custom mode you want. I found it distracting to be honest. I even in the car and the driving mode had been turning on automatically. I have a hands free. Voice only way of responding to, uh, text messages. And I enjoy that. [00:18:29] Paul Secunda: So I guess what I'm saying is, and maybe we should take a step back. I am not saying that there should be a blanket prohibition against people working after work. There are some people who, maybe like me and maybe like you, are workaholics and enjoy working after work. And they shouldn't be prevented. I don't want to become paternalistic here. [00:18:48] Paul Secunda: I'm not saying, even if you want to, I know better what you need and therefore you shouldn't do it. What I'm trying to say is, in a world of an imbalanced workplace between the power the employer has and the less power that employees have, there should be some kind of legal intervention, regulatory intervention that provides employees who want to have the right to be left alone when they go home at night. [00:19:13] Paul Secunda: So for me, and this goes to the Apple's various kind of focuses, I just found it distracting because I do want to interact with people at different times of the day. And even during sleep, I tried that, but then I found that there were people who, like my family, who needed to contact me and, It would have been nice to know if I had gotten up during the middle of the night, that there was something going on. [00:19:34] Paul Secunda: So I've turned them all off, to be honest. I, I did not enjoy them personally, but I could see how for others, the focus mode would make sense. [00:19:42] Michael D.J. Eisenberg: Well, the focus mode definitely comes in handy when I'm recording. [00:19:45] Paul Secunda: Yeah, I can understand. [00:19:47] Michael D.J. Eisenberg: Last thing I need is dings, alarms, bells and whistles and the phone going off in the middle of a recording. [00:19:53] Michael D.J. Eisenberg: But let's move on to question number two. Go ahead. [00:19:55] Q?#2: What Are the Top Three Tech Rights an Employee Has Qhen It Comes to Utilizing a Personal Tech Device for a BYOD Firm? [00:19:55] Michael D.J. Eisenberg: what are the top three tech rights an employee has when it comes to utilizing a personal tech device for a BYOD firm? [00:20:01] Paul Secunda: Yeah, I'm going to sound a little bit redundant here, but it's about expectations that in the privacy world. So in employee privacy, first of all, I have to separate the world into two different areas. [00:20:12] Paul Secunda: One is the public employment world, right? The other. Private employment world. In the public employment world, believe it or not, because the government is your employer, you have constitutional rights. They're not vibrant constitutional rights, but you do have the right under the Fourth Amendment, uh, which is the privacy amendment under the Constitution, and even under the First Amendment, uh, to a certain amount of autonomy and privacy in the public workplace. [00:20:36] Paul Secunda: Uh, and then you're saying, well, don't I have that in the private workplace? And the answer is, you don't. Definitively, no, you do not. And the problem is there is no state action in the private workplace and therefore under our state action based Constitution, you don't have a right to privacy just because of the constitution to the extent that you have privacy rights in the private workplace They're either granted to you statutorily or by the common law. [00:20:59] Paul Secunda: So statutorily, there are Now, in a number of states, somewhere between 10 and 15, what we call off duty conduct statutes, and basically off duty conduct statutes say is as long as you're engaged in legal, lawful, recreational activity outside the workplace, your employer has no business seeing you. Now, obviously, this becomes a little gray when you get into certain types of contact. [00:21:26] Paul Secunda: Maybe using marijuana on your own time, or engaging in certain, let us say, avant garde sexual types of proclivities. So, those have been litigated, and to be honest, the cases are all over the place. In the common law, there is, under the tort restatement, a right to be free from an invasion of privacy. And the invasion of privacy right comes in a lot of different flavors. [00:21:51] Paul Secunda: It can be akin to a defamation right, where people can't put you in a false light. Or it can be just a matter of autonomy. That your autonomy is sacred and People shouldn't interfere with what you consider your own private affairs. So in that situation, it goes back to what is your legitimate expectation of privacy? [00:22:10] Paul Secunda: If you're at your employer's brick and mortar business and you're in the bathroom, you have a fairly significant right to privacy, right? There's going to be very little reason that an employer should be spying on you on your bathroom breaks. On the other hand, if you're in your office and you're on your computer and they want to make sure that you're not engaging in Amazon shopping or other inappropriate activities, they can do a basic keystroke surveillance and that is considered acceptable if it's business based. [00:22:40] Michael D.J. Eisenberg: I want to pause you on that one specifically. So since we are more at a work from home right now and say the employee Perhaps a lawyer is working from home on their computer and they have to be button seat from like 8am to 5pm and they're working on whatever. Does the employer have a right to watch those same keystrokes and or more so put like certain monitoring software in the person's own personal computer? [00:23:09] Paul Secunda: I would say it depends on the expectations and the workplace policies that are in place. I mean, If you and your employee handbook have an electronic communications policy that says we will be keeping track of what you're doing during the day, we expect that you will only focus on our business during the workday, then that's a re, then, then an employee says, well, I didn't realize they were doing that when they signed an acknowledgement form saying I realized they were doing that. [00:23:37] Paul Secunda: That's problematic for the employee. A lot of employers, it goes without saying, including law firms, don't have electronic communication policies. Or if they do, they're much more narrow. Don't, don't surf porn. Don't, won't shop. But how about the in between when your kids call you or have to deal with something that's come up during the day that's almost akin to an errand? [00:23:58] Paul Secunda: That's less clear. And so, What I would say is, in my, I've been an employment lawyer for over 27 years now, and I would tell you, and mostly on the employee side, and I would tell you that, generally speaking, most employers do not have such restrictive workplace policies. If anything, as the employee becomes more sophisticated, has more discretion during the workday, like most attorneys, this isn't a huge issue. [00:24:25] Paul Secunda: It's more in. Kind of the warehouses, the blue collar workplace where employees are being monitored much more diligently. Take for instance, the Amazon drivers or even people who deliver packages for UPS or Federal Express. Right being very closely, not only because they want to keep track of where the packages are, but they want to make sure that you're not stopping off and getting a beer when you should be delivering the package to Mr and Mrs Jones. [00:24:53] Paul Secunda: So I really don't think there's a an answer I can give you. I mean, you could see how I kind of. Very lawyerly kind of divided the workplace. And then I said, well, even in the private, you have statutory protections and common law protections. And then even then it depends on what's in your workplace policies and what kind of expectations you've established with your workers, [00:25:14] Michael D.J. Eisenberg: but would you generally speaking without giving legal advice, would you advise someone who's like, all right, I don't want to specify lawyers, but you advise a lawyer. [00:25:25] Michael D.J. Eisenberg: Who has a work from home policy to allow their boss to put on their personal computer, some sort of tracking software sites that they look at typing times logged in, et cetera. [00:25:39] Paul Secunda: Absolutely not. I would push back very hard against that. An unnecessary violation of my privacy and autonomy. And that's because I believe what lawyers do is not so necessarily only within the time bounds of the day. [00:25:52] Paul Secunda: I think lawyers, because of the discretion and the creativity they bring to their work, tend to do their work at various times of the day. So perhaps the right to disconnect means something different in our industry than it might mean Let's say in a blue collar industry, but I would advise if an employer said to an attorney, a young attorney, Hey, I understand you're going to be working remotely. [00:26:16] Paul Secunda: Please know that we're tracking you. I would say I'm going to look somewhere else. I don't know many firms that do that, to be honest, [00:26:23] Michael D.J. Eisenberg: but there was some articles. I remember a couple of years ago during COVID that they were employers were actively tracking some of their employees. And I'm talking about lawyers. [00:26:33] Paul Secunda: Yeah. I mean, There's an exception to every rule. I think it's, I think first of all, it leads to very low morale and less productivity. So I think it's foolhardy. I think if you're going to have professionals working for you, giving them independence and discretion is part of saying you trust and believe in them, but I'm not the employer and therefore people do all sorts of different things for different reasons. [00:26:54] Paul Secunda: I'm saying personally, and it's not legal advice. If someone came to me and said, Hey, I'm going to track you. I'd say, okay, well, I'm not working for you because to me, personal privacy and autonomy are important intangibles in my life. [00:27:09] Michael D.J. Eisenberg: So from the obvious of not looking at porn, not shopping, not looking at information to overthrow the government. [00:27:16] Michael D.J. Eisenberg: Are there any other tech tips you might give employees when it comes to things they should obviously not do with devices that are BYOD or even if it's the employer's device? [00:27:28] Paul Secunda: Yeah, there are a lot of employees and actually this was very relevant because last week the Federal Trade Commission came out with a new proposed rule about getting rid of all covenants not to compete. [00:27:40] Paul Secunda: Needless to say, that will be tied up in litigation for the next two to three years. So any such rule will probably be enjoined until it's worked out by the courts. But needless to say, there are employers who have employees who have sensitive information which they have protect, whether it be through confidentiality provisions. [00:27:58] Paul Secunda: They can do it through non solicitation clauses or non competition clauses. And so what I would say to employees is again, make sure you understand what information you have that is protectable by your boss. I mean, in the law area, we're not allowed to have covenants, not to compete under our professional rules of conduct, but nevertheless, you are under an obligation under attorney, uh, client privilege and other privileges to keep things. [00:28:26] Paul Secunda: Confidential under also the model rules of professional conduct. So maybe law is kind of a little unique, but in, in other parts of the workplace, you have to understand that depending on the types of information you have, if you're dealing with pricing information or customer databases or trade secrets, then yeah, you don't want to be kind of dealing with that type of information without Providing some protection. [00:28:50] Paul Secunda: Let me give you an example in the legal. When I exchange Discovery as a litigator with other law firms, either the other law firm or I don't just send that information attached to an email, almost never. We always use a server which has dual authentication. So we make sure the person getting it is only getting it because they have a user ID and a password. [00:29:12] Paul Secunda: Plus they didn't have to authenticate. They are who they say they are. So that is the reality of whether you're using Dropbox or a lot of these large law firms these days have their own servers with the capability of sending out large swaths of documents. So. There's an example of where you just don't want to deal with sensitive documents in a way that they can be intercepted or used inappropriately. [00:29:38] Michael D.J. Eisenberg: Let's move on to our last question. Sure. [00:29:40] Q?#3: What are Your Top Three Tech Tips to Ensure Focus at Work to Help Prevent Necessary Work During Personal Time? [00:29:40] Michael D.J. Eisenberg: What are your top three tech tips to ensure focus at work to help prevent necessary work during personal time? [00:29:46] Paul Secunda: Yeah, well, one we've already discussed, and this is a harder one, which is you can't turn necessarily your phone off, but what you can do is eliminate a lot of those push notifications. [00:29:56] Paul Secunda: This is from personal experience. Used to have every newspaper and every person possible able to kind of get through my screen and kind of tell me they're looking for me or want to sell me something, tell me about a new news tip. And what I would tell you is go to your notifications, whether you're on an app or another phone and really only limit them to the things that you really need. [00:30:19] Paul Secunda: And even with. And your text, you can set up VIP lists so that only those people who are most important in your family, your children, your spouse, whatever, can get in contact with you. I've done that increasingly. So that's number one. Number two, it's a matter of, Learning how to screen your text, emails and other information that you're looking at in a efficient manner. [00:30:44] Paul Secunda: I have, I use an Apple mail, right? And it has kind of a preview where within probably 5 to 10 seconds, I can tell from just when it comes up whether I need to deal with it now. An hour from now, tomorrow, a week from now, and then I categorize stuff that way using that technology. So that's number two. And then number three, I would say it's just a matter of focus, which is kind of funny to say. [00:31:10] Paul Secunda: I don't mean focus like the Apple tech focus, but you have all this technology coming at you through computers and phones and don't people use the telephones I'm told, but you have to focus. I mean, we are a society of attention. Deficit disorder. And I, I don't mean that cavalierly or in a flip way. I mean that honestly, as a society, we have trouble paying attention. [00:31:34] Paul Secunda: We're being pulled in a hundred different direction. And so this is where it's very unique to each person's individual circumstance. What allows you to focus for me? I can't have music on. I can't have other like talk radio or talk, whatever, because it's too, I need complete silence, but someone else Might be able to put on their air pods and put on some soft music in the background and that's the way they kind of tune other things out. [00:31:58] Paul Secunda: So my point is use tech to allow you to focus. That would be my third point. [00:32:03] Michael D.J. Eisenberg: Well, I'm going to go back and pull a little bit on your last two answers. Your second answer, this is something I want to share. I use a service called SaneBox and it sort of adds onto your email. Are you familiar with it? I'm not. [00:32:17] Michael D.J. Eisenberg: So SaneBox is a monthly subscription. It's like 10 bucks a month. I think you'd have to double check. And what it does is it allows you to set special rules into your email. And quite frankly, like it works with all, like almost all different email server types, whether it's Gmail, whether it's personal, whether it's this or that or whatever. [00:32:35] Michael D.J. Eisenberg: And it works in the background, not on your computer, but on a server. And if you put, say, an email, like, a constant solicitation. Right. If you put it in the same black hole box, you'll never see that again. In other words, if they send you another one, you'll never see it again. So, I'm just Throw it in there just to help kind of declutter. [00:32:53] Paul Secunda: As opposed to unsubscribing from every unwanted piece of spam you get. [00:32:57] Michael D.J. Eisenberg: Well, the problem with unsubscribing is you're telling them there's a warm body there. [00:33:02] Paul Secunda: Yeah, and then that gives them more incentive to try to get in contact with you. [00:33:06] Michael D.J. Eisenberg: Whether it's through that in particular email or perhaps like a different service they may be working with as well. [00:33:12] Michael D.J. Eisenberg: So it opens you up to more spam email. But it also has some neat tricks to it like saying. Tomorrow, say next week, so that it doesn't stay in your inbox right now, but it goes, disappears for a day or a week or three hours or until 5 p. m. and then it repopulates to help manage. And like, it also, there's some other functions I'm probably not remembering, but I encourage you to take a look at it. [00:33:36] Michael D.J. Eisenberg: Somewhat of a godsend for me because Lord knows I'm getting more and more. Spam and I no longer answer my own phone because half the calls are not business. Right. Yeah. The other thing I do, you know, you talk about focusing at work and as a small and solo practitioner, you're sort of like the, you wear many hats. [00:33:55] Michael D.J. Eisenberg: And when I have to focus on writing a brief, what I'll do sometimes. Or often is I will take my laptop and I'll go to a Starbucks or coffee shop and just plant myself there for like an hour and a half or two hours and I can usually pop out some solid writing and I'm not constantly being interrupted by everything else that's going on around here. [00:34:15] Paul Secunda: That makes a lot of sense too. [00:34:16] Michael D.J. Eisenberg: And if it's too noisy in there, I just pop in my Apple AirPod Pro Mac to the headphones, and I can drown out most of the noise, but I'm usually pretty good about drowning out noise around. [00:34:27] Paul Secunda: Yeah, well, that's a good, that's a good skill to have, I have to say. [00:34:31] Michael D.J. Eisenberg: Yeah, the only thing I can't deal with is screaming children and crashes. [00:34:36] Paul Secunda: Yeah. [00:34:37] Michael D.J. Eisenberg: No offense to parents out there. [00:34:39] Paul Secunda: Yeah, I can't help you with that one, but yeah, I understand. [00:34:42] Michael D.J. Eisenberg: Excellent. Paul, I wanna thank you for being here. [00:34:44] Where You Can Find Our Guest! [00:34:44] Michael D.J. Eisenberg: Please tell us where people can find you. [00:34:46] Paul Secunda: They can find me online at kunda E-S-E-C-U-N-D-A. Mm-Hmm at zeke luzi.com. It's a difficult Wisconsin name, so I'm gonna spell it. [00:34:55] Paul Secunda: W-A-L-C-H-E-S-K-E-L-U-Z i.com. That is the name of the law firm I'm at in the Milwaukee, Wisconsin area. And my email and contact information is there. And if you'd like to hear more about the right to disconnect or any other employment law topics, feel free to give me a ring. [00:35:13] Paul Secunda: I will be sure to have all that in the show notes. [00:35:15] Paul Secunda: And if there's anything else you'd like to share, please feel free to send it to me before we publish. But again, Paul, I want to thank you for being here. [00:35:21] Paul Secunda: It's a pleasure, Michael. So nice to talk to you today. Likewise. [00:35:24] Thank You for Listening and Join Us in Two Weeks for a New Episode! [00:35:24] Michael D.J. Eisenberg: Thank you for joining me on this episode of the techsavvylawyer. page podcast. Our next episode will be posted in about two weeks. [00:35:30] Michael D.J. Eisenberg: If you have any ideas about a future episode, please contact me at michaeldj at the techsavvylawyer. page. Have a great day and happy lawyering.
Join Gartner experts Eric Grenier and Chris Mixter on this episode of CISO Edge for a conversation on the steps that CISOs must take to close the gap between prioritizing employee productivity and cybersecurity in end-user device management.Eric Grenier is a Director Analyst with Gartner, focusing on endpoint security including endpoint protection (EPP) and endpoint detection and response (EDR). Eric's research and advisory supports clients implementing EPP and EDR tooling, securing endpoints and using tools like unified endpoint management (UEM) and strategies such as bring your own device (BYOD) and bring your own PC (BYOPC) that allows users to remain productive from wherever they work and be secure. In addition to his work at Gartner, he is also a professor at Central Connecticut State University.
Join Chris Whitaker on 'The Wireless Way' as he sits down with Matt McNamara from IBM to discuss the essentials of Mobile Device Management (MDM) and its evolving trends. Learn about Matt's journey into tech sales, the importance of securing mobile and laptop devices, and the crucial role of MDM in managing corporate data. Discover insightful anecdotes, customer experiences, and practical tips for deploying IBM's MaaS360 effectively in both corporate and BYOD environments. A must-watch for tech enthusiasts and professionals navigating the MDM landscape! 00:00 Getting Started and Introductions00:26 Diving Into Mobile Device Management (MDM) with Matt McNamara01:07 Matt's Journey into the MDM World02:25 The Learning Curve and Mastery in MDM04:49 Trends and Shifts in Mobile Device Management06:38 Exploring Customer Demographics and Needs07:36 The Personal Touch: Explaining MDM at a Cookout12:30 BYOD Challenges and Solutions in MDM16:11 The Insider Threat: A Cautionary Tale17:17 Securing Devices with Geofencing and Cloud Control18:14 Overcoming BYOD Challenges: Sales Insights and Strategies21:34 Deployment and Support: Ensuring Customer Satisfaction23:55 Competitive Landscape and Final Thoughts25:55 Personal Anecdotes: The Importance of Device Security30:03 Closing Remarks and Podcast Wrap-UpMore on Matt- https://www.linkedin.com/in/mattmacnamara/?profileId=ACoAABdBoEoB22FEUOl1VuctY0dkEQcB5yklJZ8His YouTube channel- https://www.youtube.com/@mattmacnamara.cybersecuritySupport the Show.
All anyone wants to talk about today is AI and the way that it's going to change our industry in the future, but I find it nearly impossible to see how it's impacting day to day operations today. That's why I called my friend and fellow restaurateur Dave Dittenber to discuss his latest project MABEL. MABEL is the assistant we deserve and that we've all wished we could have. In our conversation, Dave discusses how MABEL is changing the game for operators today and the roadmap for how he intends to transform our industry tomorrow. For more information on Dave, BYOD, and MABEL, visit https://byod.ai/. ____________________________________________________ Full Comp is brought to you by Yelp for Restaurants: In July 2020, a few hundred employees formed Yelp for Restaurants. Our goal is to build tools that help restaurateurs do more with limited time. We have a lot more content coming your way! Be sure to check out our other content: Yelp for Restaurants Podcasts Restaurant expert videos & webinars
Join co-hosts Kat Garbis and Sean Rabbitt to hear an update on security from Jamf. Sean opens the podcast by sharing an update from RSA. AI, mobile security, and all the ways one can get hacked came up frequently at RSA 2024. Jamf won three awards: Market Leader — Zero Trust BYOD, Market Leader — Mobile Device Security, Cutting Edge — Mobile Endpoint Security. Guests, Max Simpson and Harry Jenkins (Jamf — Security), join to discuss one of Jamf's security solutions, Jamf Executive Threat Prevention (JETP). The team unpacks how it is different than Jamf Protect, types of organizations and individuals within an organization that would leverage this niche security solution, as well as ways it can prevent sophisticated mobile attacks and also provide mobile forensics. Edited by: Merlin Gulick
In this episode of the restaurant growth show podcast, we sit down with David Dittenber, an entrepreneur with over 25 years of experience in the restaurant industry, to discuss his journey from starting as a dishwasher to creating BYOD, an operational management platform that uses AI to provide real-time predictive data for restaurateurs. Dittenber shares his insights on integrating technology with traditional business models, the importance of aligning people, process, and technology for successful innovation, and how BYOD and its virtual assistant Mabel are transforming daily operations in restaurants. The conversation also covers the challenges and benefits of adopting new technologies in the restaurant industry, the role of predictive analytics in restaurant management, and effective marketing strategies for attracting and retaining customers. Additionally, Dittenber highlights the significance of cloud-based point of sale systems and offers advice on fostering innovation within teams. 00:12 Unveiling BYOD: Revolutionizing Restaurant Management 03:12 The Genesis of BYOD and Mabel: A Tech Solution for Restaurants 08:01 AI and Machine Learning: Enhancing Decision-Making in Restaurants 11:32 The Essential Tech Every Restaurant Needs: Cloud-Based POS 13:17 Balancing Tried and True Technologies with New Innovations 18:20 Harnessing Predictive Analytics in Restaurant Management 18:33 The Realities of Implementing AI and Data Analytics 23:08 Navigating Post-Pandemic Changes and Staff Turnover 25:12 Leveraging Technology for Customer Loyalty and Marketing 26:08 Innovative Use of Technology to Enhance Customer Experience ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ Audio Podcast Links Spotify | Apple | Google | Amazon | RSS | Download Leave your suggestions for new topics in the comments! We read every single one.
Building a strong foundation is essential for long-term business success, especially when faced with unexpected challenges. We spoke with Dave Dittenber, Co-Founder and CEO of BYOD, who faced the ultimate challenge with the unexpected passing of his Co-Founder, Frank Luijckx. He recounts the loss and emphasizes how Frank's forward-thinking and meticulous planning had a lasting positive impact on the business's trajectory and contributed to its continued success.In this episode, Dave shares his remarkable journey from starting as a dishwasher at age 12 to becoming the CEO of a cutting-edge AI company that powers Mabel, the first virtual restaurant assistant. He also provides personal insights into the challenges and strategies of funding a tech startup, stressing the importance of prudent financial planning and maintaining investor confidence through transparency and strategic growth.Key takeaways from this episode:How active participation in industry associations offers key insights, connections, and mentorship for software entrepreneursHow transparency with investors helps build trust and drive business growthThe importance of thorough documentation, recovery plans, and strategic playbooksOther resources to check out:Interview with Vinay Bhagat, Founder and CEO of TrustRadius who publishes a yearly report about how B2B buyer behavior is changing.The Lead Gen Mistake I Guarantee You're Making – how to create content that better identifies intent from today's b2b buyer.And, if you want an outside look at your content with actionable advice, take advantage of our Content Audit. Valued at $20K in free consulting.---Is your messaging a sales ally or sneaky saboteur? Let us help with our free content audit.We'll look at your website's messaging, content, and conversion potential from the eyes of today's buyer and deliver a presentation with new combinations to more sales conversations and demos. And the best part? It's absolutely free. Get started today!
Join us on "The Late Night Restaurant Show" as we look into the transformative world of artificial intelligence in the restaurant industry with our special guest, Dave Dittenber. Dave, a seasoned restaurateur and operations expert, is at the helm of BYOD (Bring Your Own Data), a pioneering AI tech company that's reshaping how restaurants operate. We explore how AI can streamline operations, enhance customer experiences, and drive business efficiencies, all through the lens of Dave's innovative platform. Dave shares his journey from working in a dish pit to leading a tech revolution, discussing the practical applications and benefits of integrating AI into everyday restaurant management. Discover how tools like BYOD's virtual assistant, Mabel, are empowering restaurant managers by providing real-time insights and decision-making support, significantly reducing operational costs and improving service quality. Tune in to unravel the future of dining, where technology meets tradition, and learn how AI is not just a trend but a valuable ally in the restaurant industry's ongoing evolution. Whether you're a restaurant owner, manager, or just a tech enthusiast, this episode is packed with valuable insights and forward-thinking ideas. Learn more here --- Send in a voice message: https://podcasters.spotify.com/pod/show/latenightrestaurantshow/message
Join us on "The Late Night Restaurant Show" as we look into the transformative world of artificial intelligence in the restaurant industry with our special guest, Dave Dittenber. Dave, a seasoned restaurateur and operations expert, is at the helm of BYOD (Bring Your Own Data), a pioneering AI tech company that's reshaping how restaurants operate. We explore how AI can streamline operations, enhance customer experiences, and drive business efficiencies, all through the lens of Dave's innovative platform. Dave shares his journey from working in a dish pit to leading a tech revolution, discussing the practical applications and benefits of integrating AI into everyday restaurant management. Discover how tools like BYOD's virtual assistant, Mabel, are empowering restaurant managers by providing real-time insights and decision-making support, significantly reducing operational costs and improving service quality. Tune in to unravel the future of dining, where technology meets tradition, and learn how AI is not just a trend but a valuable ally in the restaurant industry's ongoing evolution. Whether you're a restaurant owner, manager, or just a tech enthusiast, this episode is packed with valuable insights and forward-thinking ideas. Learn more here
By Adam Turteltaub It used to be that tracking email usage was considered tough. These days the workforce is also communicating via text, WeChat, Slack and countless other channels both internally and externally. That can be a total nightmare since prosecutors want access to all those conversations. What makes things harder is that employees may be resistant, feeling that the communications they have on their phone, especially in organizations with a Bring Your Own Device (BYOD) policy, is private. The employee owns the phone, not the company. Eddie Green (LinkedIn), CEO of SnippetSentry advises companies get their heads around this problem. Digital compliance is broadening out from the investment community to pharma and elsewhere. To manage the issue, some companies are now scrapping BYOD policies and making it clear that all work communications need to go on work-owned devices. They are also looking for solutions which enable employees to communicate in familiar ways, but with the tracking that logs all those communications. Listen in to understand the challenge and how to approach it more effectively.
Sign your NDAs and BYOD for our biggest, most explosive episode yet. Platonic third McKenzie Gerber (@mckenziejames25) joins Jenn and Rachel to talk parallel powers, upgraded supes, and the jaw-dropping fight scene that concludes Herogasm. No octopi were harmed in the making of this episode.Connect with your co-hosts: @girlsontheboys> Jenn: @jennferatu, @LosersClubPod, @theladykpod,@SfAntagonist > Rachel: @VinylGrrrl, @HalloweeniesPod, @LosersClubPod If you like the podcast, please rate, review, and subscribe!Check out Anatomy of a Scream for more great content and the other Network pods Hosted on Acast. See acast.com/privacy for more information.
New year means time for new resolutions and new budgets. If your IT team has big plans to invest in new infrastructure and high-value projects this year, adopting a bring your own device (BYOD) policy can help your organization save money without compromising on functionality. BYOD programs aren't the right choice for everyone, but if your business needs fall under any of the following, a BYOD program may be right for you:End users with locally installed applications on native endpoints who work in a hybrid or remote environmentThird-party contractors or partners who need to securely access your corporate resources from their employer's device Employees who hold extremely mobile roles and need a device that works on the go, such as a laptop or tabletThin or fat client users who work in a hybrid or remote setting for some portion of timeCitrix technology allows employees and contractors to securely access corporate resources from any device, including personal devices. The advantage of choosing Citrix for your BYOD policy is that Citrix offers an exceptional range of features, including a high-quality user experience, simple operational management, Zero Trust security, and reduced hardware costs. Plus, Citrix can save your business over 1 million dollars annually with a BYOD program when you switch 10,000 users from a managed endpoint program to a Citrix BYOD program. Let's take a closer look at how Citrix can ease the implementation of BYOD policies and reduce infrastructure costs.Host: Andy WhitesideCo-host: Monica Griesemer
UC Today host Rob Scott is joined by Microsoft Teams Expert and Co-Founder of Empowering.Cloud, Tom Arbuthnot and a panel of experts from the Microsoft Teams community.In this update, we talk through the most popular Teams news headlines with this month's special guests:Graham Walsh, Product Specialist at NeatKevin Kieller, Co-Founder and Lead Analyst, enableUCMicrosoft Teams News10 years of Satya NadellaHighlights from ISE 2024Android Roadmap UpdateMicrosoft Teams and other Office Apps on the Apple Vision ProImprovements for BYOD meeting spacesMicrosoft Copilot for Sales and Copilot for Service are now generally availableDecorate your Teams Video background now GA (Premium)EventsMicrosoft Teams Devices Ask Me Anything - 19-20 FebruaryTeams Nation Online - 21st FebruaryMicrosoft Teams Phone Summit - 5-7 MarchMicrosoft UC User Group London at Poly EEC - 7 MarchEnterprise Connect - Everything a Teams Service Owner needs to know - 25 March
Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we're covering what you need to know about HIPAA and your smartwatch. We discuss common questions we get from group practice leaders about smartwatches; the limitations of smartwatch security; whether smartwatches should be included as BYOD registered devices; potential issues with smartwatch notifications; and security measures to put in place for Apple Watches and Android smartwatches. Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website. Resources From Apple: Apple Watch System Security From Apple: Apple Watch Notification Settings -- See "Customize Your Apple Watch Notification Settings" and "Keeping Notifications Private" sections in particular Google Pixel Watch: How to Enable/Modify/Disable Screen Lock Google Pixel Watch: Notification Settings From Samsung: Set a Security Lock on Your Samsung Smart Watch From Samsung: Manage Notifications on Your Samsung Smart Watch PCT Resources Group Practice Care Premium weekly (live & recorded) direct support & consultation service, Group Practice Office Hours + assignable staff HIPAA Security Awareness: Bring Your Own Device training + access to Device Security Center with step-by-step device-specific tutorials & registration forms for securing documenting personal & practice-provided devices (for *all* team members at no per-person cost) + assignable staff HIPAA Security Awareness: Remote Workspaces training for all team members + access to Remote Workspace Center with step-by-step tutorials & registration forms for securing documenting Remote Workspaces(for *all* team members at no per-person cost) + more HIPAA Risk Analysis & Risk Mitigation Planning service for mental health group practices -- care for your practice using our supportive, shame-free risk analysis and mitigation planning service. You'll have your Risk Analysis done within 2 hours, performed by a PCT consultant, using a tool built specifically for mental health group practice, and a mitigation checklist to help you reduce your risks.
En este episodio dialogamos con la Profa. Vanessa Santiago sobre las consideraciones a tomar para implementar la estrategia BYOD (Bring Your Own Device) en la sala de clases. Si deseas que tus alumnos utilicen sus dispositivos personales como herramienta de aprendizaje o ya lo utilizan en tu sala de clases, este episodio es para tí. --- Send in a voice message: https://podcasters.spotify.com/pod/show/entremaestrospodcast/message
Defense against CMG spying, privacy with work apps, our desert island food choices & more from SR160Q&A, join our next Q&A on Patreon: https://www.patreon.com/surveillancepodSupport us on PatreonSupport us on LiberapayMonero: 46iGe5D49rpgH4dde32rmyWifMjw5sHy7V2mD9sXGDJgSWmAwQvuAuoD9KcLFKYFsLGLpzXQs1eABRShm1RZRnSy6HgbhQDTimestamps00:00 Introduction00:30 Defending against eavesdropping advertisers04:25 BYOD and privacy07:52 Our desert island food choices10:00 Best use cases for front-ends This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit surveillancepod.substack.com
Feedback & Shout Outs Xhausted Educators RechargED with Kyle Hill - November 2 Teachers on Fire - December 16, 2023 House of #EdTech Smackdown Featured Content Managing student technology use is crucial for productive, engaged classrooms. Learn vetted tips for setting screen guidelines, dealing with digital distraction, limiting off-task time, and bolstering curriculum through IT best practices across elementary, middle, and high school grade levels. Whether you're striving for targeted 1:1 implementation or just troubleshooting bring your own device policies, this engaging episode breaks down research and hard-won experience on everything from monitoring software to incentivization tactics. Tune into this insightful discussion evaluating real-world policies, responsible use contracts, tablet time allocation, charging stations, music listening policies, and more. With balanced takeaways across all K-12 environments, educators leave equipped to reinforce digital citizenship, nurture creativity, and build life-ready skills. Think about... How can teachers set clear expectations around learning-focused tech use across grade levels? What troubleshooting tips help minimize digital distractions and reign in device misuse? What creative incentives motivate students to self-monitor and stay engaged during tech-based activities? How can device policies balance educational value, productivity, and age-appropriate online access? What best practices allow students to leverage technology for collaboration, creation, and enhanced learning?
Andrew McNeile is the Chief Customer Officer of ThinScale Technology. He is based in Dublin, Ireland. ThinScale enables remote and hybrid work using bring-your-own-device by ensuring that remote employees can connect securely. The company saw a boom as the pandemic forced office workers to work from home, but what does the situation look like now? Is WFH and hybrid here to stay in CX and BPO? Mark Hillary called Andrew at his base in Dublin to catch up and see how he thinks BPO will evolve... https://www.linkedin.com/in/amcneile/ https://www.thinscale.com/
Ephemeral messaging applications like Snapchat, WhatsApp, and Telegram have presented a complex challenge for compliance professionals and legal counsel. On one hand, these technologies can reduce data storage and preservation costs, minimize breach exposure, and allow prioritization of communications data. On the other hand, they can create blind spots by deleting communications records and seriously obstruct internal investigations. How can companies balance the benefits of ephemeral messaging against the risks of compliance program undermining? In this week's episode of Corruption, Crime and Compliance, Michael Volkov discusses recent DOJ guidance regarding ephemeral messaging risks and outlines practical steps organizations can take to strike the right balance. You'll hear him discuss:Ephemeral messaging can reduce data storage and preservation costs, which can be significant for companies facing litigation or investigations. It also reduces potential breach exposure by deleting data.However, ephemeral messaging can obstruct internal investigations and create corporate blind spots by deleting communications records before they can be reviewed. This undermines compliance programs.DOJ's guidance outlines several steps companies can take to allow ephemeral messaging while mitigating risks:Understand how the apps delete data and what types of data are stored;Tailor policies on use to your specific risk profile and business needs;Clearly communicate policies to employees and ensure regular enforcement;Examine how policies impact the ability to conduct investigations and respond to subpoenas;Evaluate the overall reasonableness of the risk mitigation strategy.Practical steps to make ephemeral messaging safer include:Restricting use to specific authorized purposes like scheduling;Requiring employees to maintain deletion settings;Conducting periodic audits of devices;Requiring preservation and company access to work communications,Coordinating ephemeral messaging policies with broader data preservation policies.If a company provides devices to employees, it has more control and ability to restrict apps and access data, but even then, steps need to be taken to mitigate risks.BYOD policies are more complex since consent and privacy restrictions may limit what companies can do. However, a BYOD policy still needs to address comprehensively: Preserving data Allowing corporate audits and access Segregating work data where possible Outlining consequences for violations Respecting local privacy laws Getting employee consentWith the right policy framework, BYOD can potentially allow ephemeral messaging while protecting data availability.KEY QUOTES“Companies have a vested interest in preserving their internal communications for a variety of reasons, to hold internal actors accountable, or even outside actors sometimes, and to protect the organization from potential private and government claims or investigations that may have serious direct or collateral consequences.” - Michael Volkov“If the government issues a grand jury subpoena as part of a criminal investigation and the company fails to preserve data generated by use of an ephemeral messaging system, a company could be held liable for failing to preserve data relevant to the criminal investigation. Such consequences can be significant...” - Michael Volkov“While a company may have limited access to employees' personal devices when it supplies devices to its employees, the company should regularly secure certifications by its employees that has not used its personal device for work-related purposes, with emergency exceptions, of course. Similarly, companies have to develop testing protocols for its BYOD policy and secure employee consent to examine the personal device limited solely to business data.” - Michael VolkovResourcesMichael Volkov on LinkedIn | TwitterThe Volkov Law Group
All links and images for this episode can be found on CISO Series. Large language models and generative AI are today's disruptive technology. This is not the first time companies just want to ban a new technology that everyone loves. Yet, we're doing it all over again. Whether its ChatGPT or BYOD, people are going to use desirable new tech. So if our job isn't to stop it, how do we secure it? Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining us is our special guest, Carla Sweeney, SVP, InfoSec, Red Ventures. Thanks to our podcast sponsor, Censys Censys is the leading Internet Intelligence Platform for Threat Hunting and Exposure Management. We provide the most comprehensive, accurate, and up-to-date map of the internet, which scans 45x more services than the nearest competitor across the world's largest certificate database (>10B). Learn more at www.censys.com. In this episode: Whether its ChatGPT or BYOD, people are going to use desirable new tech. So if our job isn't to stop it, how do we secure it? Are tools like ChatGPT so different from what we've seen before that we can't apply lessons already learned? What risks are we solving for with it and where do we go from there? Is this just a security issue?