The preparation technology on the assumption that you will be hacked – the New York Times

How New York Times journalists use technology in their work and in their personal lives? Points Frenkel, a technology reporter in San Francisco, discussed the technology they use.

Q: Do you cover the cyber security and is careful about the security of your devices, and communications applications. What’s your setup look like?

A – I go to this job every day on the assumption that you’ve already been hacked. Being defensive keeps me vigilant about the place that I left myself vulnerable in my day to day use of my mobile phone and other technology.

If the e-mail would be super embarrassing if I leak maybe it would be better not to write it? If the picture or video of my family will leave my loved ones feeling relating to if made public, maybe you should not keep it on my work laptop? I know that this is not an easy way for everyone to live, but I’ve covered enough of the breaches that we know that no one expects to be hacked, when, the first thing they say they wish they didn’t leave themselves so vulnerable.

My setup is basically two systems: a laptop to work on trying to keep everything professional so that when the damage will be minimal, then the second laptop, which I can use any thing personal and did not contact my work.

On both laptops, can I use a password manager multi-factor authentication, which means that you should check out who I am before I can get anything from Twitter to Gmail.

I think that these requirements are the minimum of what we all must do. And even with all this, I suppose I’m going to be a breakthrough any day.

What could be better about it?

My phone is probably the only place that I could not keep my standards separate work from personal life. I tried to have two phones for a while but found it impossible to keep straight.

Photoimagem05-10-2018-05-10-12 imagem05-10-2018-05-10-12[/commentary]two of the phones, however, become very confusing, so Ms. Franklin has only one.CreditCayce Clifford The New York Times

I also can’t help but keep some of the pictures of my daughter on my work laptop. And is currently the desktop. It’s nice not to stare at all day.

What are the worst information security practices that see many people doing?

Passwords! Today one of the technology companies will invent something better than passwords, but now they are still the weakest link in the average person’s setup. If I could get people to stop two practices, they would be: don’t use obvious password such as your name or your baby’s name or your birthday and don’t use the same password for everything.

Most technology companies do a terrible job of educating people about security, because they tend to just flood the region with information and make it seem that if you don’t do everything, you’re a failure. Most of the people I talk to say they are intimidated by what they think they need to do in order to stay safe on the internet — and end up doing nothing at all.

I wish there was a five-step programme of internet safety. You will start with basic things like how to come up with a strong password and use a password manager and build from there.

What tech products you and your family are currently obsessed with in the House?

We’re not a big technology family! We are trying hard to keep technology out of sight of the 1 year old. Funny kids — although we don’t watch TV around you like to carry the remote control around the House. My iPhone is his favorite shopping game and know how to get the laptop from my bag and sliding it across the floor so she can hide under the couch.

So I would say one piece of technology that was truly useful is the tracking function — find my iPhone or find my Mac on both devices. I was laying the tiles the location of wireless devices trackers that help us keep tabs on the items, on everything else.

During the past year, I’ve also been giving a lot of internet-connected toys is designed for children and their parents. All of them either returned or left in the boxes when I saw how bad the security was.

The image of the”I wish there was a five-step programme of internet safety,” said Mrs. Franklin, on the street in Berkeley, California.CreditCayce Clifford The New York Times

You’ve written about the feeling of motherhood a full-time job. Are there any technology tools that helped it?

When you are pregnant you are using the app can get my hands on to keep track of what was happening. I knew I was giving up a lot of data, but I like how apps like glow compared to my child grows a piece of fruit each week so I can imagine how it went from the size of the tutu, really big squash.

When I was born, I thought the same of those applications will give me a sense of community where you can ask questions and get advice. Instead, I discovered a bottomless pit of mommy-shaming and strange place parenting cliques that seem designed to make women feel that all they were doing was not enough.

So I went old school and women I knew who seemed to be dealing with motherhood and their jobs in a manner that I was impressed. When it came time to find a nanny, I’ve talked with people I trusted and interviews with the nannies in person until I met someone who made my daughter smile looked at the family. There are a lot of apps nannies and babysitters, but this wasn’t the kind of thing I wanted crowds to accumulate points.

I’m sure the day will come when we have a wonderful mysterious robots that Nurse children for us as the perfect nannies. But now, I’ve found that friends and family who are willing to drop everything to come and help really the most important thing.

Oh, the Amazon Prime membership.

Seja o primeiro a comentar

Faça um comentário

Seu e-mail não será publicado.


*