Hari Ravichandran
  • HOME
  • BIO
  • MEDIA
  • Menu Menu

Business Insider – Tech Investors Love These 17 Startups Driving the Work-From-Home Revolution into 2021

News

Business Insider – Tech Investors Love These 17 Startups Driving the Work-From-Home Revolution into 2021

2020 has been the year of remote working, with coronavirus forcing unprecedented numbers of white-collar workers to leave offices for home set ups.

From video calls to cybersecurity, businesses everywhere have been forced to adapt to the new normal.

Business Insider asked some of Europe’s biggest VC investors to pick out the remote work startups which they think are the most exciting after a massive year for the industry.

COVID-19 has been an accelerant to many industries, from finance through to healthcare, but perhaps no more so than the remote working space.

Companies large and small were forced into what was previously unthinkable — a fully remote workforce.

The trend looks set to become permanent, with one US survey finding two-thirds of firms will be WFH in some form forever. More than 20 blue-chip firms have likewise confirmed permanent remote working in some form, including Google, Microsoft, and Indeed.

That’s led a shakeup in the tech stack that companies rely on, with an uptick in software for video meetings and virtual events, as well as changing requirements around HR software.

Business Insider spoke to nine venture capital investors across Europe, asking them to pick out best startups pushing the remote working revolution forward into 2021.

Check out their picks below:

Aura CEO – Hari Ravichandran

Aura

Cited by: Lars Fjeldsoe-Nielsen, Balderton Capital

In the Balderton portfolio? No

What it does: “Aura products offer a powerful shield safeguarding the digital lives of those you love. Their digital threat protection platform unites best-in-class privacy, identity, and security products that enable customers to manage disparate cybersecurity needs with ease and maximum effectiveness.”

Why it’s hot in 2020: “As we’ve embraced working from home in a year like no other, everyone is living remotely, and all our digital activity is happening from the perceived safety of our homes.

“Unfortunately, identity thieves and fraudsters are taking advantage. That’s why Aura is special. Trusted by millions of customers, Aura is a technology company dedicated to simplifying digital security for consumers.”

December 22, 2020/by Hari Ravichandran
https://hariravichandran.com/wp-content/uploads/2020/12/businessinsiderlogo.png 151 333 Hari Ravichandran Hari Ravichandran2020-12-22 19:21:402020-12-22 19:25:14Business Insider – Tech Investors Love These 17 Startups Driving the Work-From-Home Revolution into 2021

Forbes – Holiday Shopping Cybersecurity Tips

News

Holiday Shopping Cybersecurity Tips 

The holiday season is upon us, and as we embrace new shopping traditions in a year like no other, we can expect to see online traffic at an all-time high as consumers stay home and search for gifts from the comfort and safety of their homes. Unfortunately, while we adjust our typical holiday activities amid the pandemic, identity thieves and fraudsters remain at the ready to take advantage of the accelerated e-commerce boom that’s driving more shoppers online earlier than in years past.

Why Is This Risky Business?

Hackers like money, and there is plenty of it during the holidays. Holiday shopping this year is estimated to increase between 1% and 2.6% for the three-month period beginning in October compared to last year, which generated $1.1 trillion in sales, according to AlixPartners. As shoppers spend more time and money online, they’re sharing their sensitive data and payment information across countless sites and platforms, putting them at a higher risk of being targeted by hackers than ever before.

Fortunately, there are a few simple cybersecurity tips that consumers can use to help protect their data and information for a merry holiday season.

1. Keep An Eye Out For Phishy Behavior

Be vigilant with your inbox. Phishing — when a hacker sends an email appearing to be from a familiar or reputable company to get personal details like credit card information — is a common method that hackers employ during the holidays. Review all emails closely, especially those appearing to come from retailers with promotions. Remember, a reputable seller will never request credit card details via email. With that in mind, do not open any attachments or click embedded links. Instead, go directly to the retailer’s website and search for the promotions there. The extra legwork is worth your security.

2. Use Alternative Payments

According to survey results, shoppers most frequently pay for their holiday purchases using debit cards. When it comes to cybersecurity, think about using an alternate payment method such as a credit card or a third-party online payment system like PayPal or Venmo.

Thanks to the Fair Credit Billing Act, consumers are liable only up to $50 in fraudulent charges. fMost major credit card companies, including Visa, MasterCard and American Express, offer policies that afford customers zero-liability protection. Completing purchases using PayPal and Venmo are also good alternatives to debit cards as the store never directly receives your financial information through these third parties. In the event your digital information becomes compromised, you can rest assured that you’re protected against fraudulent charges.

3. Shop Small

For hackers, the street cred for taking down a large retailer follows the adage: The bigger they are, the harder they fall. Well-known retailers like Amazon, Target and Walmart, and platforms like Etsy and Shopify, are at risk of being targeted and breached during the holiday shopping season. Shopping with smaller businesses may reduce the risk, and it allows you to support local businesses during this important season.

For consumers who choose to shop with larger retailers, be sure to reset account passwords once you finish your holiday shopping. Doing so will help prevent exposure in any potential data breaches following the holiday shopping season.

4. Diversify Your Passwords

You’ve heard it before, but are you actually using different passwords for different sites and platforms? The more diversified passwords you have, the more difficult it will be for your accounts to be hacked. This is the easiest thing you can do this holiday shopping season to safeguard your digital information. In fact, there are many password managers you can use or gift to someone else to ensure your loved ones’ cybersecurity year-round.

5. Spot A Shady Website

There are several tell-tale signs that the site you’re shopping from may not be reputable, starting with its address. Check to see if “https” appears in the URL. The “S” indicates the website is secured by an SSL (secure socket layer) certificate, making the connection secure and safeguarding the sensitive data that passes from you, the customer, to the retailer. While you’re looking at the address, verify the brand is not in a subdomain; be sure you’re shopping from retailer.com and not retailer.buy.com.

Overall, review the site for misspellings, grammar mistakes and even low-quality images — all are a giveaway that a site may not be legitimate. Lastly, look for an email or phone number on the contact page and verify validity. Double-checking when making online purchases is an extra (but worthwhile) step that will help you spot a shady website.

Ensuring A Happy And Secure Holiday Season

With these easy-to-follow tips, consumers can try to keep their holiday season merry and bright — something we all need this year. It’s important to be aware of the risks when online shopping, but with the proper precautions, you can stay safe while still making sure the stockings are stuffed. Let’s believe in the magic of the holidays but approach this shopping season armed with security tips and a healthy dose of skepticism to find fraud before you fall for it.

November 30, 2020/by Hari Ravichandran
https://hariravichandran.com/wp-content/uploads/2020/11/Forbes-Picture.jpg 619 907 Hari Ravichandran Hari Ravichandran2020-11-30 14:59:072020-11-30 14:59:07Forbes – Holiday Shopping Cybersecurity Tips

Forbes – Step Inside the Mind of a Hacker To Reduce Vulnerabilities

News

Step Inside The Mind Of A Hacker To Reduce Vulnerabilities
At a time when everyone is spending more hours online, from business owners working to ensure the safety of their networks and employees to remote workforces and kids learning virtually, there has never been a better reason for us to collectively safeguard ourselves from the cyber risks that exist today.

There are many lists of tips and best practices available, but instead of preaching the benefits of a password manager or two-factor authentication, let’s step inside the mindset of a hacker to better understand how their world works. Through that perspective, we can gain valuable insight into how best to protect ourselves from a variety of cyberthreats.

Step One: Identifying A Vulnerability

A hacker first needs to find a way in, and there are several options to explore. They can exploit vulnerabilities within a device, network, system or application to allow unwanted access by outside parties. The CISA explains that you can significantly decrease this risk by keeping apps, operating systems and devices up to date because many vulnerabilities are caught and fixed fairly quickly through this measure.

What hackers often rely on instead are human vulnerabilities, or user errors that can easily expose sensitive data or open the door for unwanted access. This can include weak or repeated passwords, inadvertent downloading of malicious software and much more. Many data breaches — 90%, according to a recent CybSafe analysis (via InfoSecurity) — are a result of a human vulnerability, and with so many users online and working remotely this year, Iomart (via CNBC) found there has been an increase in data breaches as a result.

Finally, hackers can also look to exploit a network vulnerability, which I’ve found occurs most often when a network’s hardware or software is exposed to the potential for intrusion, such as an insecure Wi-Fi network or insecure devices that can be used to gain access to your network.

Step Two: Wreaking Havoc Or Worse

Once a hacker has found a way in, they typically try to take as much advantage of their entry as possible. If an email and password combination works on one site, a hacker will frequently input the same information into hundreds or even thousands of other sites. The program they use might also try slight variations on the password. A hacker hits the jackpot when they suddenly have access to many websites where credit card information and other personal details are stored. Hackers may later post or sell these credentials on the dark web, quickly spreading the victim’s information even further, but usually only after they’ve accessed all your valuable data before you even realize (if you do at all). However, if the program comes back without additional access, usually because the consumer uses unique passwords, the hacker may be forced to move on. Even worse is when the correct email and password requires additional verification, usually via text message or an authentication app, pushing the hacker back to square one. Another dead end is often a secure Wi-Fi network with a strong password that limits their access.

If the hacker gains access to a computer, they can run code, access a system’s memory, install malware or modify data. They look at a system’s hardware, software, network and users, and when they find one that meets their motives, they can leverage these flaws in their attack, putting your identity and personal information at risk in the process. What they’ll be disappointed to find is a user who has an updated OS with firewalls and antivirus software installed.

Step Three: Savvy Scamming

I’ve found that hackers are also always on the lookout for an especially complex system that has a greater chance of misconfiguration or a device that is overly connected. If that isn’t evident, a savvy hacker might forge their way into a system through a phishing scheme using email, social media, phone calls and more to steal valuable data. These scams can be remarkably tailored and are often successful because they outsmart spam filters and use information found on public social media accounts to customize the communication and impersonate people the user actually knows by targeting an email domain that has easily mistaken letters — like “m” instead of “rn.” Phishing schemes are typically most successful when the target is in a hurry and likely discounts a gut reaction to something looking a bit off. These fraudulent communications will often ask for payment details via email or through a questionable webpage without branding or typical payment processes. While these schemes can be convincing, the hacker is beholden to an action from the target and will not gain access to anything of value if the communication is simply deleted.

Staying A Step Ahead

You may not be able to prevent every type of cybercrime. In fact, it’s likely you will experience some form in your life, if you haven’t already. However, all hope is not lost, and there are many actions you can take to protect yourself and your personal information and make a hacker’s job more difficult.

There is an instant advantage in understanding the most common vulnerabilities and what you can do to better manage these weaknesses to prevent successful hacking. Cyberattacks are constantly evolving, so managing vulnerabilities and protecting against them is a continuous process. Luckily, there are a wide range of tools — including password managers, vulnerability scanning software and identity protection services — and easy behavior changes that can help. While it’s tempting to repeat the same password, ignore prompts to update software, and click quickly through emails or pop-ups, taking the time to get these right will make the hacker’s work much harder and may even cause them to move on to their next target.

November 9, 2020/1 Comment/by Hari Ravichandran
https://hariravichandran.com/wp-content/uploads/2020/11/lock.jpg 605 910 Hari Ravichandran Hari Ravichandran2020-11-09 17:55:012020-11-09 19:46:04Forbes – Step Inside the Mind of a Hacker To Reduce Vulnerabilities

Forbes – Leadership During A Crisis: Making Decisions For Growth, Not Survival

News

Leadership During A Crisis: Making Decisions For Growth, Not Survival

According to the National Bureau of Economic Research (via Forbes), the U.S. economy has been in a recession since February.

For entrepreneurs of a certain age, this isn’t news. They can recognize the signs because they have been here before. In fact, this is the third time they’re confronting financial chaos in just 20 years. These entrepreneurs were at the helms of tech companies during the dot-com bubble of 2001, only to face economic turmoil a few short years later following the 2008 market crash. What they learned through those experiences have undoubtedly prepared them to lead their businesses through the financial crisis currently gripping the country.

For those new to business or leadership positions, this is a learning curve. Economic uncertainty is challenging. That said, there are several lessons you can take from the past to ensure your company is best positioned for success.

Rethink Your Business Plan

Tackling uncertainty isn’t easy, particularly when considering your existing plans and thinking about the future. It’s important to come to terms with the new normal as quickly as possible. We aren’t going back. In 2001, when the tech bubble burst, we learned that the world changes after major disruption. Coming to terms with this sooner rather than later can provide a competitive advantage.

As part of this, it’s critical to reframe your business plan for two years. It will take time for your business to adapt, and you need to be prepared for that. At the same time, we don’t know what the future holds, so looking beyond two years isn’t necessarily useful at this stage. When setting the plan, your company’s long-term strategy should not change, but your rate of investment should slow slightly. For example, if you had five key areas you wanted to pursue this year, you might choose to start with two and tackle another the next year.

Contrary to popular belief, it is paramount that you resist the urge to make cuts to survive. Instead, think about cutting costs to facilitate growth. That may seem like a luxury, but it’s the only way to come out successfully on the other side. Again, your long-term business strategy should remain intact, so consider the cuts you can make to help manage costs in the short term but that will actually enable your long-term growth strategy.

Finally, you absolutely need a plan B, and probably a plan C, but don’t give up too soon. Have confidence that you can rely on your backup plans but remain on course. You may be surprised by how little you need your fallback options.

Invest In Company Culture

There is often a debate between prioritizing company culture or business strategy, and particularly in a crisis, business strategy tends to win out. Our current environment has the majority of employees working remotely, many for the first time. Not only have impromptu hallway conversations, coffee breaks and happy hours become nonexistent, but employees’ personal lives have been upended.

Investing in company culture is more important now than ever before. In fact, there has never been a stronger need for companies to facilitate “fun” that employees love to complain about. These activities don’t need to be complicated or expensive. Start the week with a team meditation. Host a daily BYOB coffee break or happy hour via Zoom. Conduct virtual events that offer employees the chance to introduce their significant others, children, pets or homes.

Look for opportunities to show employees their hard work doesn’t go unnoticed. Maybe that is a gift card for dinner or a subscription to a meditation app. Particularly for those who are new to remote working, the risk of boredom, sense of isolation and loss of community are high. You don’t know just how much someone might need that companionship.

Company culture during a crisis is also dependent upon communication from senior leadership.

Particularly when your staff is remote, there is no such thing as overcommunication. It’s essential that leadership is available to employees and communicates openly about the challenges and plans for the future, for better or worse. When possible, providing employees a forum to ask questions and offer ideas can be particularly beneficial and encourage ownership in the process. This can not only lead to a better company culture, but a more productive, empowered and invested workforce.

Redefine Your Leadership Approach

As the leader of a company, you are likely accustomed to having all eyes on you. During moments of uncertainty or significant change, this is particularly true. As employees continue to balance personal and professional obligations, manage job security fears, deal with financial stresses and health risks while battling remote working burnout, they will look to senior leadership for guidance.

It’s important to remember the full range of outcomes. During stressful moments, you see many people anchor in the possible negative results, but there are a number of ways in which a decision can net positive, and it’s essential to give both sides equal focus. When you do this, you redefine reality and give hope to those around you. It’s OK to show that difficult decisions are painful, but ultimately, it’s your job to show the path forward.

An important opportunity to lead by example exists around work habits. We know that routines are important. Closing your laptop and truly shutting it down is an important part of that routine. Your ability to set structure for yourself will enable your managers and the rest of your organization to do the same. The risk of burnout is high and is easily avoidable. This is a marathon, not a sprint.

Learning from the past teaches us how to prepare for the future, invest in our culture and think about our role as leaders so we can succeed. The situation can seem dire, but it’s important to remember that some of the best innovation comes from necessity. Don’t panic, stay true to your strategy and be open to ideas along the way. You might be surprised where you are when you look back on this moment.

August 25, 2020/by Hari Ravichandran
https://hariravichandran.com/wp-content/uploads/2020/08/Forbes-Pic.jpg 608 911 Hari Ravichandran Hari Ravichandran2020-08-25 15:11:262020-08-25 15:29:19Forbes – Leadership During A Crisis: Making Decisions For Growth, Not Survival

TechRadar – Aura bolsters security offerings with Pango acquisition

News

Aura bolsters security offerings with Pango acquisition
Aura aims to provide all-in-one security and privacy protection for consumers

The digital security company Aura has announced that it will acquire Pango for an undisclosed sum in an effort to expand its current identity protection and security offerings.

In addition to being the company behind the popular VPN Hotspot Shield, Pango also offers a password manager called 1Password as well as a service called Robo Shield that blocks robocalls. Last year the company partnered with Aura to offer its identity theft protection service IdentityGuard alongside its own products in a subscription service to help protect users online.

Through its acquisition of Pango, Aura aims to become the premier unified security suite that protects consumers and their families with comprehensive, data-driven products. The combined entity will provide all-in-one protection for consumers by combining both firms’ privacy, identity and security products.

  • Hotspot Shield can now secure your Wi-Fi router
  • Email is still the biggest security risk around today
  • We’ve also highlighted the best identity theft protection

Aura and Pango

In a press release, founder and CEO of Aura, Hari Ravichandran explained how the acquisition will allow the combined company to offer a holistic solution to protect users’ privacy and security, saying:

“The momentum Aura is building with the acquisition of Pango uniquely positions our business to continue scaling as we integrate exceptional products that provide a digital halo of protection for consumers. Privacy and security are more important than ever and Aura aims to be the simple holistic solution. The combined global business is profitable with well over $200 million revenue and a talented team of more than 450 all-stars committed to ensuring that our millions of subscribers have the most advanced technology to protect themselves and their loved ones.”

Aura recently acquired FigLeaf and PrivacyMate and their products alongside Pango’s will be consolidated into a holistic security and privacy solution over the next four to six quarters.

Once the acquisition of Pango is complete, Ravichandran will remain Aura’s CEO and he will be joined by Pango’s most recent CEO Sujay Jaswa who will serve as chairman of the board.

July 7, 2020/by Hari Ravichandran
https://hariravichandran.com/wp-content/uploads/2020/07/Techradar.jpg 330 596 Hari Ravichandran Hari Ravichandran2020-07-07 19:46:402020-07-07 19:46:40TechRadar – Aura bolsters security offerings with Pango acquisition

Forbes: 16 Tips For Effectively Leading A Distributed Tech Team

News

16 Tips For Effectively Leading A Distributed Tech Team

Managing a tech team can be a complicated task. When a previously in-office team suddenly becomes distributed, it can complicate matters a lot more. Tech leaders guiding their teams through and after a shift to working remotely need to learn on their feet—fast.

Fortunately, many of the members of Forbes Technology Council have long-term experience in managing distributed teams. Below, 16 of them offer their experience and expertise for tech leaders learning the ropes of the remote workplace.

1. Bring human interaction online.

Our company has always been global, and we’ve been very focused on remote team building. The key is to keep it personal. We are all motivated by human interaction, and successful remote teams bring more human interaction online. Do this by requiring meeting attendees to enable cameras and set an example for active meeting participation. Also, build in time for culture no matter how busy things get! – Einat Metzer, Emedgene

2. Lean more heavily on established tools.

Many are not equipped for this change and don’t have the necessary tools to heighten productivity. Rather than introduce a new work collaboration hub that may cause confusion, I think it’s best to build on the momentum of a tool you’ve already been using. We’ve increased the number of calls we have, intensified our use of Slack and switched on our cameras during Zoom calls to feel more connected. – Harinder Takhar, Paytm Labs

3. Talk to each other.

You have to communicate regularly—not just by email, but by phone and video. As leaders, we always have this need to control things. And right now, as we all face this pandemic, the feeling of control may seem elusive. Regain some of that feeling of control by staying connected with your team daily and encouraging them to avoid knee-jerk decision-making. Keep calm, and talk to each other. – Gail Peace, Ludi, Inc.

4. Keep video conferences open while you work.

For teams that are accustomed to working next to each other and collaborating in real time as they work, I’d recommend hosting a video meeting that everyone can have up and running while they work. This would allow open discussions for whatever is needed. – Russell P Reeder, Infrascale

5. Clarify communication with custom emojis.

Written communication is easily misconstrued, and sarcasm doesn’t always translate in writing or across cultures, so clearly communicating is huge. When meeting face-to-face isn’t an option, emojis can help set the tone for written communication. Creating custom emojis specific to your company culture is another great way to help convey thoughts while also unifying you as an organization. – Keith Valory, PLEX

6. Trust your gut to stay ahead of the curve.

I like to confer with my leadership team across the U.S. so I can see the situation from different angles—geography, family structures, local mandates and more. I also rely on my investors and venture capital community to share how other leaders manage their organizations. My advice is to huddle up with trusted colleagues, listen to your employees and make decisions to stay ahead of the curve. Trust your gut. – Cameron Weeks, Edify Labs

7. Share and store knowledge.

Whether you are meeting one-on-one or with a group, there should be nonephemeral ways of capturing knowledge so that others may learn. It could be notes stored in Google Docs, issues in Asana, recordings in Google Drive or code in GitHub. A culture that encourages team members to help others learn by sharing matters more than the tools you use to share this knowledge. – Paul Duvall, Mphasis Stelligent

8. Introduce rituals and document processes.

Things can get disorganized quickly, so it’s key to set up routines—such as daily standups—to help team members establish effective remote-working habits and boost productivity. It’s also important to have a regularly updated internal process document—a “self-service” manual your team can use to ask questions and share solutions, even if they can’t physically be in the same room. – Fred de Gombert, Akeneo

9. Support flexible work schedules.

Within reason, give remote employees the ability to design their own day. Depending on the job this may not always be possible, but managers who make an honest effort to be flexible will often see teams respond more positively and productively. This flexibility may be even more critical during the COVID-19 crisis when working remotely may be more complicated and stressful than usual. – Rita Selvaggi, ActivTrak

10. Embrace asynchronous work.

Just as transitioning to a fully work-from-home environment can be challenging, managing remote teams can feel disconcerting. Stay connected by supporting and protecting your teams so they have the balance and focus to create great things. Embrace asynchronous work in these uncertain times; empathy and mental health are exceptionally important to retaining and elevating great talent. – Sid Sijbrandij, GitLab Inc.

11. Keep the lines of communication open.

Your team will look to you for guidance. What and how you communicate matter, even if it’s via Zoom, conference calls or other channels. Remain calm and be transparent, and keep the lines of communication open (and constant) via Slack or email. Make sure your employees know you are prioritizing them and they will prioritize the business. – Hari Ravichandran, Aura™

12. Ask clarifying questions.

A lot is lost when you can’t be in the same room together. Don’t assume people are on the same page after a brief video call. Everyone needs to assume that you’re not on the same page and take the time to ask clarifying questions. Many times I think I have given a clear answer, but then found out later I didn’t even answer the question. There can be a question behind the question. – Steff Kelsey, Blues Wireless

13. Empower your team.

Treat Monday like it’s the most important day of the week—schedule recurring key meetings to ensure the team is aligned. I also strive to be available and communicate frequently and candidly with my senior leadership to ensure clarity on priorities and goals, enabling them to have meaningful conversations with their teams. Empowering teams unites us across geographies and boosts employee engagement. – Brian Stafford, Diligent Corporation

14. Actively seek feedback from team members.

It is important to lead with empathy during this period. We should actively seek feedback from our competent team members. Members of my IT team work in four different countries, primarily in the Caribbean and the U.S. Collecting and sharing creative ideas for improving emotional and physical well-being, service-level agreements, and service excellence were thought-provoking. Our teams crave clarity and appreciate empathy. – Londell Albury, Adtalem Global Education

15. Avoid multitasking during meetings.

When teams are on calls or video conferencing, rather than in the same room, it’s tempting to multitask. However it’s clear when someone is distracted or typing away, and it can come across as disrespectful. If you are a manager or leader, make it clear that people in meetings should not be checking email or doing other things. Live that yourself. Block separate time for email, IM or text messaging. – Chris Barbin, GGV

16. Lean in and be helpful.

Now is not the time for unsolicited pitches. As a business that conducts remote technical interviews, it would be easy to dial up our sales campaigning. But instead, we’re focused on being helpful partners and human-centered leaders. The first question I ask—whether I’m speaking with an employee, client, prospect or investor—is “How are you doing?” It gets to the root of what is most important. – Mohit Bhende, Karat

May 4, 2020/by Hari Ravichandran
https://hariravichandran.com/wp-content/uploads/2020/05/Capture.jpg 361 546 Hari Ravichandran Hari Ravichandran2020-05-04 21:34:232020-05-04 21:35:13Forbes: 16 Tips For Effectively Leading A Distributed Tech Team

Forbes: How To Clean Your Digital Clutter

News

Every year as the weather starts to warm, brooms across the country are prepped for annual spring cleanings. With a majority of folks at home during this unprecedented time, take a moment to clear your browser. What most people don’t realize is that your digital life is vulnerable to clutter, too.

In a study conducted by Risk Based Security, there were over 3,800 publicly disclosed data breaches that exposed 4.1 billion records in the first six months of 2019 alone. In this digital age, spring cleaning should be about more than just purging homes; it should be about cleansing your digital footprint as well to ensure your personal information is organized and safe.

Many people are unaware of the importance of a digital cleanup, while others avoid tidying their cyberspace because they don’t fully comprehend all the harmful effects a disorganized digital presence can have. Cluttered devices and outdated profiles are all signs of a security breach waiting to happen. By following a few easy steps, everyone can take solace in knowing that their digital life is clean, secure and at less risk.

Empty The Trash

An easy first step is to literally take out the trash: Empty your desktop recycling bin. Nothing you delete is permanently gone until you’ve done so. All those old documents, embarrassing photos, and programs you no longer use are still lingering on your hard drive, taking up space and putting you at risk of old files resurfacing. It’s important to remember that once you’ve taken the time to clean out old files and downloads, always trash the trash.

Declutter Mobile Devices

Have you ever downloaded a seemingly “cool” app that you ended up using only once? Make sure you delete all those unused apps that are taking up space on your mobile devices. Most likely you were prompted to provide personal information upon downloading the app, and now that information is sitting on your device, at risk of being compromised. In addition to deleting unused apps, it’s important to make sure that the apps you do use are up to date, as outdated apps are at risk for malware and viruses.

Refresh Your Online Presence

The security settings you agreed to when you set up your Facebook account in 2005 are likely extremely outdated. Take the time to review privacy and security settings on all your social media accounts and online profiles to make sure you are comfortable with how much you are actually sharing and with whom. Having your location services turned on for all your accounts or apps is a decision you may have made years ago, but it may be time to reconsider. Do your acquaintances from college need to see all your family photos? What you’re making for dinner? Consider reviewing your list of friends to make sure everyone still belongs.

Minimize Your Online Accounts

With the rise of e-commerce and online shopping, it’s likely that you’ve ordered items from websites you no longer frequent. Unfortunately, that means that your credit card and other personal information may still be floating around in cyberspace. Make sure you delete any online accounts that you don’t actively use to minimize the odds of having your personal details be part of a data hack. Remove saved personal information in accounts that you don’t use on a regular basis, including credit or debit card details and addresses.

Use Unique Passwords 

While remembering different passwords for a seemingly endless variety of personal or business accounts may feel tedious, it could be what saves you from identity theft. Using the same password for all your accounts makes it easier for hackers to access your personal information and your accounts. Consider using a password manager to store and protect all your unique passwords, and in an effort to keep your accounts even more secure, look into using multifactor authentication (also known as two-step verification) on critical accounts such as your email and banking accounts.

Dispose Of Old Electronics

When you finally get the newest device on the market that you’ve been eyeballing, don’t forget to properly clear out and dispose of your old one. Any device with the ability to store information can retain your data long after you deleted it. This includes mobile phones, copiers, printers, scanners and networking equipment such as Wi-Fi routers. It’s important to thoroughly wipe all electronics by clearing the data or consult with a trusted professional to help you properly and securely dispose of the device.

Tune Up Your Browser

It’s easy to forget about the cookies that store bits of your information within your browser as you surf the web. Moving forward, make a conscious effort to check your browser settings on a regular basis to ensure they’re configured to perform automatic updates. Also, consistently clear out your browsing history, and avoid using autofill to store passwords when possible.

Staying healthy during this time means washing your hands and taking precautions. But staying safe online can be simple when you remember to clean your data as often as you clear out your closet to stay as protected as possible in this digital age!

April 8, 2020/by Hari Ravichandran
https://hariravichandran.com/wp-content/uploads/2020/04/Spring-Cleaning.jpg 363 544 Hari Ravichandran Hari Ravichandran2020-04-08 19:44:242020-04-08 19:44:24Forbes: How To Clean Your Digital Clutter

Safer Internet Day: Empowering Everyone to Use the Internet for Good

News

On February 11, 2020, millions of people in more than 140 countries teamed up to promote the responsible use of online technologies for Safer Internet Day. With the theme of “Together for a better internet,” this year’s event focused on engaging all stakeholders—politicians, technology companies, schools, parents, children, and young people—to do their part to promote internet safety.

More than just a once-a-year event, Safer Internet Day is a movement that advocates for online security and against cyberbullying, disinformation, and other harmful online content. Additionally, Safer Internet Day focuses on the need to protect kids from predatory behavior online.

 

With many benefits come serious problems

The internet is more than just useful—it’s an essential part of human culture that connects people and provides a way to share news, information, art, music, and ideas. It can bring much of the entire history of human knowledge and wisdom to anyone with a computer or mobile device. Thanks to the connectivity it facilitates, the internet can also act as a democratizing force across societies, particularly in its ability to help marginalized people to come together.

Yet its dark side is well known: propaganda, disinformation, identity theft, privacy concerns, and other threats. The wellbeing of children has become of particular concern as so many cases of online addiction, cyberbullying, and abuse have been widely publicized.

Safer Internet Day celebrates the benefits of the internet, increases awareness of its dangers, and empowers people to use digital technologies positively, creatively, critically, and responsibly.

 

Beginnings in Europe

Safer Internet Day began in 2004 as part of the European Union’s SafeBorders project. The event was designed from the start to help children and youth use online technologies safely. In 2018, the event achieved a significant growth milestone: it reached 30 million people around the world.

 

ConnectSafely leads in the United States

The Silicon Valley nonprofit ConnectSafely is the lead coordinator of Safer Internet Day in the US. The organization relies on an approach that is both global and community-oriented.

ConnectSafely provides evidence-based information and news updates on internet security, privacy, and safe practices for parents, teachers, and policymakers. The organization works to dispel panic-driven attempts to address these complex issues, instead promoting rational discussion about the benefits and problems that come with increasingly sophisticated technology.

For Safer Internet Day 2020, ConnectSafely sponsored two special events, including a live-streamed, student-centered program at the Computer History Museum in Mountain View, California. Attendees included local politicians, educators, and students, as well as representatives from Google, TikTok, Instagram, Facebook, Roblox, and other tech companies. Later in the day, TikTok’s office in Mountain View hosted the “Get Into the Game” family night for parents and kids. The event promised to show parents what their kids are doing online and demonstrate strategies for safely using these platforms.

 

The PTA and Google

Elsewhere, Safer Internet Day was also celebrated by the National Parent Teacher Association. Local PTA groups hosted hundreds of events around the country on February 11. In addition, the National PTA has also collaborated with Google to create digital safety education for parents.

Through its collaboration with the PTA, Google created the Be Internet Awesome campaign, which helps kids explore the internet and other technologies confidently and safely. The aim is to create a new generation of smart, kind digital citizens who make informed, positive decisions about what they want their online world to look like. A curriculum for educators, the Interland online game for kids, and even a family internet safety pledge are all available on the BIA website.

The campaign and all its resources focus on a few fundamental principles for kids online:

  • Share with Care: If it’s not right to say something “in real life,” it’s not right to post it online.
  • Don’t Fall for Fake: Think critically before acting online, and learn to spot lies and scams.
  • Secure Your Secrets: Create a strong password and practice good digital hygiene.
  • It’s Cool to Be Kind: Use the internet to spread positivity and speak out against bullying.
  • When In Doubt, Talk It Out: Parents and educators need to foster an open dialogue, so kids feel comfortable talking about anything iffy they see online.

 

A year-round dedication to internet safety

At the conclusion of the 2020 Safer Internet Day, organizers had already put out the call for planning for 2021, with the date set as February 9.

Anyone interested in learning more should visit SaferInternetDay.us to find out how to become involved. The website offers conversation-starters for families, a kit for organizing groups at the local level, and targeted lesson plans for students that put the focus on individual responsibility for using the internet to build people and communities up, rather than tear them down.

Safer Internet Day organizers have also created Twitter and Facebook accounts to help make it easier for people anywhere in the world to connect with its programming and resources. Check out the hashtag #SID2020 to see what people were saying about this year’s event.

February 28, 2020/by Hari Ravichandran
https://hariravichandran.com/wp-content/uploads/2020/02/safer-internet-day.png 371 618 Hari Ravichandran Hari Ravichandran2020-02-28 16:26:272020-02-28 16:26:27Safer Internet Day: Empowering Everyone to Use the Internet for Good

Keep Your Holidays Happy — And Safe From Online Scams

News

‘Tis the season for sales! Historically, Black Friday has been the traditional time to grab a bargain during the holiday season, but times change, and technology is transforming our shopping habits. As a result, Cyber Monday, the digital version of Black Friday where you can find the best deals online, has been steadily gaining popularity.

Now, a survey from Deloitte (via CNBC) shows that of those looking for bargains this holiday season, 53% will be looking on Cyber Monday compared to 44% on Black Friday. As Cyber Monday takes over as the most popular shopping day, it’s time to take a step back and think about what that means for our online shopping safety overall.

Everyone knows that security is important when shopping online. However, when bargains are available, it’s easy to get caught up in the moment and forget. Hackers and other online frauds are most active around the holidays. Unless you’re careful, the hunt for savings may cost you more.

There are plenty of things to keep in mind, including being careful, using common sense and avoiding anything that doesn’t feel quite right. However, at this time of year, the scams get creative, so let’s look at the more common ways consumers can be scammed during their search for online bargains.

 

Scam Watch

There are a number of scams we can fall prey to in the scramble to find a bargain. Always apply the old saying, “If it looks too good to be true, it probably is.” There are great deals to be had during the holiday season, but you should be wary of extreme savings. If that $1,000 TV is selling for $100, there may be something amiss.

Here are some scams that are common all over the holiday period:

• Fake Online Stores: This is unfortunately quite common. In this instance, a fake online store is set up featuring great offers. Behind the scenes, it’s harvesting card numbers and personal details.

• Account Hacking: This can affect both retailers and consumers. Account hacking is when accounts are hacked and orders are made to a different address. The cybercriminal may use fake credit card numbers or, for accounts that store payment details, may even use stolen card details.

• Email Links: Here, fake emails coming from seemingly trusted sites are distributed with links to tempting bargains. When the unknowing consumer clicks through to purchase, they’re sent to a copy site that harvests their details.

• Public Wi-Fi: While it may be tempting to do a bit of online shopping on the go and at the coffee shop, beware. Data is not secure on public Wi-Fi and may be intercepted, making it easier for cybercriminals to steal identities and card numbers.

• Unencrypted Sites: Some legitimate online stores fail to use encryption, leaving the consumer vulnerable. Unencrypted transmissions that store financial and personal details can be intercepted and stolen. In many cases, that’s why the site fails to use encryption in the first place.

• Goods Never Sent: A seemingly legitimate site may simply disappear after a sales scramble is over, meaning the consumer never actually receives their purchased goods.

There are many more scams out there, but most follow the patterns you can see in these examples. Knowing where the risk comes from is one thing, but how can you stay safe and still grab a bargain?

 

Staying Safe Online

• For Consumers: Around the holiday season especially, but whenever you’re shopping online, always be vigilant. You can limit the risk you are exposed to. Stick to stores you know, and if you find something from an unknown supplier, check out the site. Look for reviews or comments, and make sure the site is secure before making purchases. Check for contact details in case your order doesn’t arrive, and make sure credit card companies support their payment system.

Keeping your accounts secure means being careful. Don’t store passwords on your phone or devices that others can get access to. Use original, strong passwords that won’t be guessed, and check for activity on the account that may show signs of hacking.

During the holiday period, you’ll also be overwhelmed with email offers. Never just click a link. Double-check the sender’s legitimacy, and if in any doubt, visit the site via a bookmark, or enter the address manually. For additional peace of mind, you can also invest in a cybersecurity tool. This will help ensure your identity and your family remain safe from unwanted criminals during what should be the happy holiday season.

Above all, always be aware of what you’re clicking on, entering details in or looking at. It takes seconds to double-check, so always do, and you can have a great holiday.

• For Retailers: Identity fraud is one of the most common issues retailers come across during the holiday season, and it can be difficult to spot. Implementing an email validation for account setup or bank validation for payments can avoid many of the common identity fraud approaches before they cost you money. Delivery is another area where you can take measures. Many fraudsters will be looking to have parcels redirected to new addresses. If the goods are being sent to another city or state from the identity given, it may be something that could be flagged as a warning in the system.

Ensure all your software and systems are up to date to provide the best protection possible, and be aware of the signs of account takeover activity such as multiple failed password entries and the use of several IP addresses when logging in.

 

Conclusion

While this sounds scary, you can still enjoy shopping during the holiday season and grab those bargains you have been dreaming of. If you take care, double-check that sites and payments are legitimate and follow the advice here, you will have a safe (and successful) holiday.

Read the original article published at Forbes.

December 23, 2019/by Hari Ravichandran
https://hariravichandran.com/wp-content/uploads/2019/12/womenshopping.jpg 640 960 Hari Ravichandran Hari Ravichandran2019-12-23 15:50:072019-12-23 20:37:48Keep Your Holidays Happy — And Safe From Online Scams

What We Can Learn From This Year’s National Cybersecurity Awareness Month

News

National Cybersecurity Awareness Month (NSCAM) has been an annual fixture since October 2003. The goal of the last 16 years has been to raise awareness of the importance of security when it comes to your digital data, and today, that message is more important than ever.

Endless studies and reports are exposing our highly digital consumption habits. A 2019 report from Hootsuite and We Are Social shows we’re spending on average of six and a half hours online each day. Half of that is spent on mobile devices.

We’re spending more time online than ever before. We shop more online, spend more time on social media and do more of our financial and regulatory business online, too. Most of us use banking apps, file taxes online and share images of family, friends, holidays and almost every aspect of life on social media.

Online accounts for our grocery stores, video streaming and a hundred other things all add up, and the result is a huge amount of information about our personal lives out there in the digital world. At the time, how many of us think about entering names, dates of birth and other information when we are asked? It’s easy to put out there, and this is why cybersecurity awareness is so important — not just in October, but all year long.

Own it; secure it; protect it

“Own it; secure it; protect it” was the theme of this year’s NSCAM, with the focus on individual privacy, consumer devices and e-commerce security. All are areas that are increasingly under threat, especially as we approach the holidays, when e-commerce is even more popular.

Despite the increased threat, cybersecurity remains an afterthought for far too many. At a time when we, as a country, are spending more time on mobile devices than TV, the sheer amount of digital data out there about every one of us should make us stop and think. Yet, we are often unaware of the risks posed, never mind what the consequences might be. There are various common areas of attack that are increasingly in use today.

Cloud databases make life easier for us all, with images and messages uploaded to the cloud for easy access. But they are also a significant vulnerability. If you hear in the news that a celebrity had their phone hacked, what likely happened is their cloud storage was hacked, giving the hacker access to all their photos, messages and other data.

Another common threat you will often hear about is a data breach. In this case, a business’s databases or servers are compromised, giving criminals access to everything contained within. That could be your shopping history, credit card numbers and so on. And it happens with alarming regularity.

But that’s not all — biometric data often gives us a false sense of security, but systems are not as secure as we may think. Artificial intelligence (AI) has become so powerful that not only passwords but fingerprints or face detection may be bypassed. With AI quickly growing in sophistication, we must accept that soon, hackers will have access to tools that can overcome these kinds of locks on our devices and data.

What can we do?

The threefold idea behind this year’s theme helps individuals and businesses understand the risks they face and the often-simple solutions that can make all the difference:

• Own it: Update privacy settings to keep your data secure. Know which apps are running to ensure you always know where your data is going. Additionally, stay safe on social media by watching what is shared and with whom.

• Secure it: Create strong, secure passphrases — ideally, a different one for each account. Use multifactor authorization whenever possible, and always watch for phishing attacks. Never click on a link without first checking the sender.

• Protect it: Always protect whenever you connect. Have up-to-date security software on your devices, and be careful with public Wi-Fi. For businesses, always maintain adequate safety protocols for customer data.

To ensure these ideas are acted upon, it is up to us to spread the message and raise awareness. Whether individuals, businesses or government bodies, we must all act. Tell others; raise awareness, and put these ideas into practice yourself. If you are unsure about a site, double-check before handing over your data, and consider cybersecurity software for additional peace of mind.

Conclusion

Staying secure in the digital world shouldn’t be an afterthought. The more we rely on digital solutions for almost every aspect of life, the more vulnerable we become to cyberthreats. NCSAM is a timely reminder that we should all be more aware of that vulnerability and of both the threats and the things we can do to minimize them.

 

Click here to read Forbes article.

November 26, 2019/by Hari Ravichandran
https://hariravichandran.com/wp-content/uploads/2019/11/lock.jpg 720 960 Hari Ravichandran Hari Ravichandran2019-11-26 20:13:142019-11-26 20:21:08What We Can Learn From This Year’s National Cybersecurity Awareness Month
Page 1 of 3123

Recent Posts

  • Business Insider – Tech Investors Love These 17 Startups Driving the Work-From-Home Revolution into 2021
  • Forbes – Holiday Shopping Cybersecurity Tips
  • Forbes – Step Inside the Mind of a Hacker To Reduce Vulnerabilities
  • Forbes – Leadership During A Crisis: Making Decisions For Growth, Not Survival
  • TechRadar – Aura bolsters security offerings with Pango acquisition
© 2021 | Hari Ravichandran
  • Terms of Service
  • Privacy Policy
Scroll to top