Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity: Did Your Computer Have "Intel Inside"? It Won't For long! (2024)

Nov 29, 2021

DidYour Computer Have "Intel Inside"? It Won't Forlong!

We're going to talk a little bit about shopping right now. Thenwe'll get into our chip crunch, and why Intel is being left on theside of the computer road.

[Following is an automated transcript.]

[00:00:16] There's lots of fun stuff to do. And it's kind of fungetting out of the house. Isn't it getting out, going out, goingaround? There's a, an outlet store close by where I live and it'skind of one of these outdoor. Outlet things. And it was fun. Justwalking around, enjoying the little bit of fresh air, no matterwhat the weather has.

[00:00:40] Uh, I even enjoy going up there when there's somesnow on the ground. Because again, it's a little bit of a, uh,it's, it's fun. It's a little bit of a change, which is not. Partof what I love about living in the Northeast. You really get allfour seasons and they can be really, really nice. Well, blackFriday of course came and went.

[00:01:01] It was not a bad black Friday, but one of thequestions I been asked all week long, all month long, frankly, hasto do. When should I buy, what should I buy? What are the deals?And it is weird this year. Let me tell you really weird. And thereason I say that is I didn't my show prep. And I spent some hoursjust looking on different websites and looking at opinion pieces,looking at news sources, just trying to find, okay, what's goingon?

[00:01:36] What's the real word out there. Our items, as rare aseverybody seems to be saying they are, or is it easy enough tofind. Well, that's what we're going to talk about right now.Really. We've had a very turbulent two years for retail, everybranch of retail, whatever it is, it's been been terrible. So manypeople have lost their businesses.

[00:02:03] So many small businesses, small retail restaurants,some restaurants that I, I enjoy and just haven't been to in years,really. Completely gone, which is such a crying shame. And a lot ofpeople have put a lot of the blame for the general retail malaiseon Amazon and Walmart. Because again, you know, I had a discussionjust this last weekend with.

[00:02:35] Oh, friend's father. And he was saying, well, youknow, I've been a biologist in pharmacology for years. And, uh, youknow, th this is just as just a science. It's all science talkingabout the lockdown. And so I pointed out how, well, let me see, letme see. I got family from Canada. They cannot drive across theborder because of the lockdown, but in, in the states, they won'tlet us, us, we won't let them fly.

[00:03:03] But they drive in, I should say, but they will letthem fly in. How does that science, right. There's coronavirus notsurvive at 30,000 feet. Is that what it is? You know? No, come on.People it's politics and part of the politics was. Walmart got tostay open and all of these other small businesses couldn't so whatare they supposed to do?

[00:03:29] How are they supposed to compete? And yet, Hey, Iunderstand you need clothes, right? And you need food. MostWalmarts have both. You might need medicine in order to evensurvive. So that kind of makes sense, but why. Walmart. Why did thegovernment choose Walmart and target are going to survive all ofyou, little mom and pops stores, you know, that maybe have beenmulti-generational where it's your parents.

[00:04:00] And maybe even your grandparents that started thestore, started the restaurant. And now all of a sudden there's alockout and you cannot be over. It just, it entirely political,entirely political. And I understand the science behind all ofthis. I have spent a lot of time studying it and you might rememberif you've listened to me even.

[00:04:26] Dean or 20 years ago, I'm trying to remember when itwas, I started talking with scientists about RNI, RNA interferenceand the coolest stuff that was happening with African violets andgetting the, the purple flowers to change to white and all of thestuff they were doing. It it's exciting. It's fun. But why.

[00:04:49] Did we use politics here. And so many people losttheir livelihood. So many people lost their businesses. It's, it'sabsolutely incredible. And just pain companies basically to stayclosed. Uh, doesn't make sense either. Because now you're pumpingmore money into the economy and that's causing inflation becausethere are not more products or not more vendors.

[00:05:15] There's not enough competition. So the prices go up.And when there's inflation, how about people who are retired, whohave saved something. And now their money is worth what theinflation rates are. Again, it's a hidden tax, but it's really hardon retirees because their money that they've saved, you know,they're getting the pitons, you put it in a savings account andyou're making a fraction of 1%.

[00:05:43] And yet we're seeing inflation rates on things likefuel being almost a hundred percent. Think about what it was likein 2019, what the gas prices were. It is insane. So smallbusinesses have to be supported. They are the backbone. They arethe innovators. Walmart didn't start as a big company. They startedvery small.

[00:06:10] He innovated his claim to fame. That old Sam Waltonwas let's go ahead and have the best prices and anywhere. Right.And so they got the best prices by beating up their suppliers, etcetera, but it all worked. And Walmart increased, raised its it'sdemonstrable again through real science, but they raise thestandard of living in every community.

[00:06:39] They opened a store. It's absolutely funneling. ButWalmart stopped innovating a long time ago. Now again, theinnovations come just like they do in the tech world. Typically notfrom the existing companies, right. Facebook isn't innovating, theybought WhatsApp, they bought so much of the technology they'reusing to drive their company.

[00:07:02] Oculus. You look at it, right? That's their future.According to of course, uh, you know, Mr. Mark. What did it comefrom? What was the cost? Right. They by their competition. So Iwant to encourage everybody to really try and go out of your way,try and shop at these small places. There are. And so many of thesemalls nowadays kind of local stores where they've got together andthey're running their co-op or where someone's managing a bindproduct from local craftsman, really that they, everything fromthese women that are knitting doilies all the way on out, throughvery cool black iron work things, things that you can findthere.

[00:07:54] That maybe you can find on Amazon, maybe they comefrom China. Maybe they're locally sourced. Not very likely, butit's been a very, very tough, tough time here for so many of theseindustries. One of the things that I did talk about this week, I,one of my radio appearances is. Tik TOK live shopping. If youhaven't heard of tick tock, tick tock is this short form videosite.

[00:08:21] And it kind of started by people saying, okay, wellwith this song, uh, use that song to make a funny little 32nd. And22nd and that's what people did. And it was really quite cool tosee they there's some innovative people out there. Tick talk has alot of, I share nowadays way more popular amongst the youngerpeople than Facebook is Facebook has kind of become something forthe older people.

[00:08:49] But what tech talk is now doing is providing liveshop. And this is an innovation that really started in China, whichof course is where tick-tock is located. But in 2020, there was asurvey done that found that two thirds of Chinese consumers saidthat they bought products via live stream in the past year.

[00:09:13] So what's live stream. I want you to think about QVConline share or a television shop. Those channels, thoseinfomercials that come on at night, but particularly the channelsthat are constantly selling stuff like micro did a little bit ofthat at one point in time, right? His interview was, he came in andthe, he, the guy who was interviewing him, held up a pen.

[00:09:37] Is that okay, you sell me this pencil. And so microwent on and on for 10 minutes or more just talking about the penciland everything related to the pencil and what a great quality was.All he course, she didn't know anything about it. Right? And that'spart of what bothers me about some of these things, right?

[00:09:55] These people are just making stuff up, but talk livenow is allowing you to go ahead and make funny little things. Gainan audience. Maybe they're not funny. Maybe they're justinformative. Have them inserted into people's streams and then sellit right there. In fact, instant purchasing of a featured productduring a live stream.

[00:10:22] And then obviously audience participation, they gotchat functions, reaction buttons. This is what's coming our way.And so all of you, small businesses out there, I really want toencourage you pay attention to social media. This is the sort ofthing that you can do. You can target your local area, which iswhere most small businesses operate, right?

[00:10:48] It's in, in your town. It's maybe a 10, 20 mileradius, depending on what, what you're doing, what you're selling.And you can micro target nowadays. That's the joy. That's thebeauty of the online world. Micro-targeting Hey, and if you'reinterested, let me know. We can talk a lot more about this becauseI have studied this for years now.

[00:11:12] Hey, stick around Craig peterson.com online.

[00:11:20] So while you're shopping online, what are some of thethings you should do or look out for? I've got a few ideas. I'mgoing to tell you what I do, and it has worked wonders for me. Sohere we go.

[00:11:35] When you're shopping online, there are some obvioustips, just run through them very, very quickly because I don't, Ithink you guys being the best and the brightest really know thesethings.

[00:11:50] So just very quickly, make sure your security. Today,make sure that everything is patched up the way that it should be,that you have some really great anti-malware hopefully advancedanti-malware, but apply any updates before you start doingshopping, because this is a bad time of year to lose all of yourpersonal information and to have your money stolen.

[00:12:18] Uh, number two. If you're seeing an email or you'reseeing a deal that really looks too good to be true. Take, takecaution here. Right? Do you see a place? Oh, I got five brand newSony PlayStation fives for sale. You might not want. To buy those,right? The minister, Jeff Foxworthy. Here's your sign. So becareful about that.

[00:12:46] Criminals are really taking advantage of consumerswho, uh, you know, life's been tough, money's been tight. You'retrying to find a deal. So be careful about that. Okay. Coupons orother way, the bad guys have been trying to get consumers. Tocompromise their own cyber security. Okay. Uh, 12% of emails outthere are considered to be spam emails.

[00:13:15] I think it's more like 80% or 90%, but then I've hadthe same email address for 30 years. Okay. Uh, so don't click onlink. Be sure you shop on the real website and apply coupons thereby manually typing out the code. So for instance, if, if let's sayyou use duck, duck, go for your search engine, which you should beusing for most cases, most searches a duck duck go says, okay, letme see where coupons here you go.

[00:13:46] Here's a site that has a lot of coupons be carefulabout those sites, because some of them are trying to lure you in.Are the websites you're going to the real ones, the legit one. Areyou clicking a link in your email in order to get to that salesite? Double check, because what they're doing is using some ofthese URLs that aren't.

[00:14:14] Right. And we see those all of the time. They'll havea misspelling of the business name or they'll, they'll do somethingelse. So they might have Amazon Dodd bad guys.com. Oh, okay.Amazon. Okay. Is Amazon, uh, obviously they wouldn't say bad guys,but yeah. That's kind of what they're doing. So be careful. So onceyou're on a website, look for that little padlock that's to theside, click on it and double.

[00:14:43] To make sure that it is legit because they might haveus. What's called a secure, sir. And they might have a certificatethat's valid for the site that you just went to, but it's not,there's a different kit for Amazon or Walmart or target or w youknow, whatever Joe's clothing.com. It might be something entirelydifferent.

[00:15:07] So be careful, okay. Is what you're looking at on thead. Because there are a lot of fake advertisem*nts out there thatlooked like they got great deals. And even though black Friday hascome and gone, they're going to continue to do this through the endof the year and be on. Okay. So rather than clicking on the ad,just type in the retailer.

[00:15:35] Information, because some of these ads that areshowing up are in fact, almost every last one of them is comingfrom what's called an ad network. So that ad network is wherepeople go and buy ads and they say, Hey, I want to retarget peoplethat were at this site or clicked on this link, et cetera, etcetera.

[00:15:54] And now. If you are a bad guy, all you have to do issneak into one of those big ad networks. And all of a sudden yourbad guy ads are showing up everywhere. So you see a great ad for aChromebook. For instance, we've talked about those before you canjust go ahead. Okay. Chromebook. No problem. Wow. Yeah.

[00:16:14] Yeah. Type it in. If the ads for a Chromebook fromWalmart, just type in walmart.com. Okay. Avoid clicking on ads.Isn't it terrible how bad it's gotten, man. I liked the internetbetter back in the 1980s and nineties. Uh, how should you pay?We're going to talk about that in a minute. Public why fi is apotential problem.

[00:16:40] The bad guys will often create fake hot spots and youare now using their hot spot. Now this isn't as much of a problemas a used to be because your visits to most websites nowadays areencrypted. Do you remember that lock? I mentioned in the URL. Well,that means it is using SSL or TLS, which is a secure communicationspro protocol.

[00:17:07] So if you're seeing that, you know that you basicallyhave a VPN, you don't have to buy a VPM service. You don't have touse a VPN service. You have a VPN that's being provided by thewebsite, your. And that's really what that lock means. So thepublic wifi is less of an issue for the monitoring, what you'redoing, although yeah, they can still do some monitoring.

[00:17:33] They might play with DNS and things, but they canalso scan you, which is the biggest problem from my perspectiveabout using public wifi and never. Share your personal data. If youcan avoid it, one of the things we're going to be covering in theupcoming boot camps and workshops is using fake or alternate emailaddresses.

[00:17:57] I do it all of the time. That's why I have 3000,3000. Yes. You heard it right different log-ins right now in useactive use on. Uh, in my password manager, at least over the lastdecade. So I've accumulated a lot of them. So I use a differentemail address pretty much all of the time. And I'll, I explain howto do that in the boot camps and workshops that are coming up.

[00:18:25] So keep an eye on. On my weekly emails again, Craigpeterson.com/subscribe. So you can find out about them, you know,these, the free ones. I really want to give you guys all of thebasics, right? So that's what I'm going to be doing anyways. Howshould I pay? This is maybe the even bigger side of things. It isvery, very rare that I actually put my credit card number in on awebsite at least.

[00:18:54] Real credit card number. There's a number of optionsthat are available to you now that weren't before, even if it's nota credit card, even if it's a debit card and generically, this isknown as single use credit cards. So we've got a few things. I usetypically capital one's email E N O. If you have a capital one cardof any sort, this is a little browser plugin that you can puton.

[00:19:25] Now, the downside of this is they will by default,try and look. Every web page you visit. So from their perspective,it's worth it because now they get that data from you. However, inall modern browsers, you can restrict when it runs. But whathappens is I go to a website, it wants a credit card and I can popup that little Eno browser plugin.

[00:19:53] And now. Todd, uh, I can generate a virtual creditcard number that's tied in behind the scenes to my real credit cardnumber. I can even put an expiration date on that credit cardnumber. So it can't be used after a certain. Some of these virtualcredit card options, even allow you to say, Hey, it really is onlysingle use.

[00:20:18] It can only ever be used once. And that way the badguys can't run up your credit card. Bill Citibank, Americanexpress, JP Morgan, and the more have these types of options andbasically any visa or MasterCard. Look for virtual credit cards.From your bank or whoever's providing your credit card. Hey, stickaround.

[00:20:42] You're listening to Craig Peterson and I'll be rightback.

[00:20:46] We're going to talk a little bit now, since it'sgetting near the end of the year, about what kind of technology dowe think is going to be big next year. And I've got to mention thisproject. My daughter has been working on it. Finally hit theocean.

[00:21:02] My daughter has been busy. You might know she's beenin the maritime industry for quite a while now.

[00:21:11] And a man, she went to, she graduated 2008. I thinkit was this, this daughter. And you probably already know I havefive daughters, right? Uh, three sons too. So it was kind of a mix,but she has been working on a ship called the Yarra Burkland it'sover in Norway. And what the ship is doing here is haulingfertilizer, anything.

[00:21:38] Oh, wow. Isn't that exciting? Wow. Craig, I'm soexcited for you. Well, it is the world's first autonomous electricship period. Okay, cargo ship and what it is doing ultimately, isit to eliminating the need for about 40,000 truck round trips ayear. See what's happening over there in Norway is there's afactory that's right.

[00:22:07] Located right next to a mine. That's making all ofthis fertilizer and it needs to be hauled down through some fjords.To get to the main shipping Depot where it can be loaded onto thebig ocean ship. So these trucks are going up and over the mountainsalongside the fjords. And this is a ship that's going to take atrip that's about seven and a half nautical mile.

[00:22:34] So give or take eight miles and on the water. And nowNorway is doing this in its own waterways. So there's no problemwith international rules and regulations about ships here. This isjust local and it loads itself. It drives itself and it unloadsitself. I think that's really, really cool. And what it does is itplugs itself.

[00:23:02] When it is on either port w now we've seen this withsome ships, right? You might've been on some of these ferries thatare electric. They work pretty well for electric ferries. Causethey're usually short haul. They connect up to shore power and theydo a rapid charge and they're ready for. The next leg of their shipwhile they are busy taking all of their load in right.

[00:23:26] Makes sense. And you might've done it, but this is,this is different. And a lot of the incidents that happen inshipping are due to human error. Think about all of the problemswe've had with Navy ships, even running into things, human error,and a lot of that's due to fatigue. On the ships. I don't know ifyou know it.

[00:23:47] I have two kids that, well, three actually that havebeen in the maritime industry, uh, the, the big maritime industryand they take four hour shifts. So four on four off four on fouroff every day. So fatigue is a very big deal for a lot of theshipping industry. And for the first few years, they're planning onhaving the ship be.

[00:24:15] They're going to be up, of course, on the bridgemonitoring everything, because you've got a problem with artificialintelligence machine learning. If a big ship is coming along andthere's a kayak in the way, it's actually the kayaks job to get outof the way. But if you run over a kayaker things, aren't going togo very well for you, frankly.

[00:24:37] But how does a computer recognize a kayak? MaybeMarine life or even some sort of a swell that's out there. So theythink they've got most of this solved. And this is the project thatmy daughter's been working on for a few years here. She's aMariner. She has her captain's license unlimited. Tonnage unlimitedvessels on unlimited waterways anywhere in the world is justincredible.

[00:25:06] All of the stuff she's done. So the wheelhouse coulddisappear all together, but they've got to make sure thateverything is working pretty darn well. Okay. Uh, large vessels. Doanything about the kayak? All they can do is warn, but theydefinitely can't maneuver. And that's why the deep draft vesselshave priority over sailboats or pretty much anything else that'sout there.

[00:25:32] But, and what that brings up is the fact that wedon't have the regulations yet for these autonomous ship. Well, wedon't have the regulations yet for the autonomous cars, right? Thisis normal. The technology tends to proceed the regulations, and wehave regulations in place right now for autonomous vehicles incertain areas.

[00:25:57] But they're nowhere near mature. It's going to take awhile before everything has all frigging. And now that is leadingus into our friends at Ford. Ford's done a couple of interestingannouncements over the last couple of weeks. So I have to bringthe. And an effort really to deal with this ongoing chipshortage.

[00:26:21] Ford has made a deal with global founders. Globalfoundries is a chip maker and they have a non-binding agreement.Now that makes it interesting. If it's non-binding. Why evenbother, but the press release says opening the door for globalfoundries to deliver more chips to Ford in the short term. Butwhat's happening right now because of the chip shortages.

[00:26:50] Well, companies are designing their own. Purposebuilt chips rather than relying on the general purpose chips madeby Intel or AMD Qualcomm, Samsung and video media tech, dependingon what kind of chips we're talking about. This is fascinatingbecause it is hurting Intel. No question about it. And AMD. So whatdoes Intel done?

[00:27:15] Intel is moving its stance to being more of acontracted chip manufacturer. So you can go to Intel and say,here's my chip design. Go ahead and make that for us. And offthey'll go and they will manufacture it and they probably even helpyou with some of the design things. Fascinating. Now, the otherthing that's been happening for a while is if you look at apple,for instance, they have been using their own chips in their Iphones and eye pads.

[00:27:52] Now they also are using their own chips in thelaptops and various desktop computers. So apple is the highestprofile example I can think of offhand. That have replaced Intel'schips. That's absolutely amazing. Google has also created its ownchip for the latest pixel phone. So if you buy the latest flagshippixel, which I would not do, because this is the first time they'rereally using their own chip, but they've got their own chipnow.

[00:28:28] Amazon has been deploying its own chips in itsinternal servers to improve performance as well as to make itbetter for the Alexa voice assistant. You see how long tail that'sa marketing term, but really how special purpose purpose designedpurpose built chips are. So it's huge. Intel's changing course.

[00:28:55] They've never been a great chip designer. If he askedme and a few know my history, you know, I've been down at the chiplevel. I was down there for many years in the kernel of operatingsystems and dealing directly with all. From chips, you know, whenyou're thinking about drivers and the low end and the operatingsystem, that's what I did for a lot of years.

[00:29:18] So I'm, I'm glad to see this happen. It's going to bebetter for you because the devices can be cheaper because theydon't use a general purpose chip. The chip is built and designed.For what it's being used for. So good news there for four, becauseFord is going to be kind of doing the same sort of thing.

[00:29:39] I bet mark my words. Okay. Well, I didn't get to thepredictions for this year, but I will, when we get back thisupcoming year, stick around, of course you listening to Craig,Peter Sohn, you can get all kinds of information. And in fact, ifyou sign up for my email list, which is not a heavy marketing.

[00:30:02] Believe me, you'll get a bunch of different specialreports. So ones I think are going to help you out the most. Craigpeterson.com.

[00:30:13] Well, we just talked about the future when it comesto chips and our computers, we're going to continue that discussdiscussion right now on artificial intelligence and machinelearning. What else is going to be important next?

[00:30:29] So, what is the future?

[00:30:31] We're getting close to, you know, the end of the yearand the beginning of the year. So what am I looking forward to?Well, you just got my basic predictions about what's going tohappen with chip manufacturing. These various vendors of variousdevices are going to continue to move away from Intel AMD, etcetera, these general purpose chips and move more to specialpurpose chips.

[00:31:02] Now there's a number of special purpose type designsthat have been out there for a very long time. For instance, a sixOCB in industry. No, those I programmed some way back when. I havegotten much more complicated, but for instance, when we're puttingin systems for a business, we will typically use Cisco systems thathave a basics so that everything is extremely fast.

[00:31:29] You don't notice any delay and yet it can do veryheavy duty filtering. Packet examination, stream examination,because it's being done in hardware. That's the advantage to it. Sowe're going to see more and more that since Apple's already movedto their own chips, Google has already moved to their own chips,Amazon, their own chips, et cetera.

[00:31:53] And there'll always be a need for general purposechips. In fact, you can say that the apple chips for instance, arefairly. The purpose they're being used in your iOS devices, youriPhone, your iPad, but they're also being used in desktopapplications. But if you look more closely at what Apple's done, ithas a couple of different types.

[00:32:16] Of CPU's inside the chip. So it has thehigh-performance CPU's that are only engaged when it needs someserious computing going on. It has the low power, lower performanceCPU's that are also built into that same chip that now handle kindof background tasks, things. Dated the don't need a whole lot ofCPU or don't need to be really fast.

[00:32:42] And then it also has graphics processing units thatwill handle things like screen updates, moving stuff around on thescreens. There is a lot of technology in that chip in reality, it'sit would use to take three. Completely different sets of chips todo what the one apple chip can do. So it is an example of a specialpurpose CPU.

[00:33:11] We're going to be seeing more and more of those nowas a consumer, you're not really going to notice other than, wow,this thing's fast or wow. This battery lasts forever. You're goingto have some great, great functionality. And I think we are seeing,because they're spinning. $2 billion a week right now in theindustry, you're going to be seeing more of these fabs come online,chip fabrication plants, and they take a long time to build and putup online, but they're going to be making more specialized chips,which I really.

[00:33:46] Well, there's an article that came out based on asurvey from the I Tripoli. And this is called the impact oftechnology in 2022. And beyond of these are some global technologyleaders. Of course I Tripoli was all about electrical engineeringback in the day today, it's more about general technology. Buthere's the results.

[00:34:12] What is important for next year? Now, remember, Idon't give investment advice. So don't look at this as things youshould be putting your money into. This is just stuff that is goodto know and probably should be considered, but this is not again,investment advice. So. Technologies will be the most important in2022.

[00:34:33] While according to this kind of little, little braintrust, if you will, amongst the respondents more than one in five,say that AI and machine learning are going to be very important.What's the difference between artificial intelligence and machinelearning. Uh, the lines are blurred nowadays. They used to be a lotmore clear machine learning used to be the, the machine, thecomputer learns it.

[00:35:02] Let's say it's working on a factory floor and it hasto do some welding on a joint. And the, it has sensors and itlearns, oh, okay. Well, this part, when it comes into me may behere, but I might be there and I might be here. So I got to kind ofmove around a little bit. That's basic machine. Artificialintelligence, which I think is a super set of machine learning, butother people argue the other way, but you know, they don't knowwhat they're talking about.

[00:35:30] There is artificial intelligence is where it doesn'teven have to be taught how to learn. It. Just figures things out.So it's. When it's built, talk to learn where that piece that itneeds to weld is likely going to be and how to find it. It justknows. Okay, well, I'm supposed to weld. So how do I do that?

[00:35:56] That's much more of an artificial intelligence. Sothat's number one, artificial intelligence next. Cloud computing20%. Now my opinion on cloud computing is not very high, frankly,because cloud is just the name for somebody else's computer cloudcomputing does not mean it's safer. It does not mean that itrequires less work on your part where I think cloud computing canhelp a business is where.

[00:36:30] Push over flow to the cloud. The many businesses thathave moved technology to the cloud have moved it back now becausefrankly, the cloud did not provide them with what they thoughtthey'd get, which is cheaper, better computing. And a lot of thebreaches that we're getting nowadays are in the cloud.

[00:36:53] People's databases being exposed, applications, beingexposed. It's great for hackers because they know. Okay, well, letme see. Amazon has the majority of all cloud computing in theworld, so let's just scan Amazon computers and see what we canfind. Right. And they're going to find that this bank has thisopener, that company has that database available, et cetera, etcetera.

[00:37:17] So be careful with that, but they think cloud'snumber two, five G. 17% that I am very excited about it. And here'swhy five G is kind of a generic term for the high speed, uh, roomwireless data. So think cell phone basically, but why it reallymatters is it's designed to handle billions of devices. So that youcan have a lot of people sharing data and getting to data, sharinga network connection in a densely populated area.

[00:37:58] That's where it really, really shined. And then italso has a faster data rate than the older technology. One of thethings you'll find as you compare, if you really dig into thetechnology compare, the various cell companies is that forinstance, T mobile, which is who I use has a lower frequencyspectrum.

[00:38:24] Lower frequencies can not carry as much data for, butwhat they can do, I'm really oversimplifying. But what they can dois more readily peers, glass, and brick and walls. So T-Mobile'sfrequencies are lower than Verizon, for instance. So Verizon canget you faster data. But can't get it into as many places and notas well as T-Mobile just really putting this quite simply.

[00:38:57] And in fact, just what was it? Two weeks ago, we hada court order stopping the deployment of these higher frequency, 5gnetworks. Because of complaints from some people, uh, particularlyin the avionics, in the airline industry where they're saying,well, they could be squashing some of our critical systems becausethey're using some of the old satellite frequencies for 5g up inthe upper bands.

[00:39:25] Anyhow, one of the things that 5g. Which has alreadybeen used for is what I was involved with. You know, I was involvedwith emergency medicine for a long time and I was an EMT I P D uh,back in the day. So almost a paramedic. And think about what couldhappen now, you're in the back of an ambulance that you could bethe hands for the doctor who can be seeing the patient as you'redriving down the highway, bringing that person in, becausehistorically I remember this one woman.

[00:40:01] Placenta previa and had just soaked through sometowels with blood. She was in really bad shape and we weresqueezing IVs to get fluid into her. It was, it was incredible. Itwas something else. And we brought her right in on the gurney, inemergency room and right up to the operating room and put her onthe table, right from her ambulance gurney while with five G.

[00:40:27] They can be doing that now, not just in an ambulance,but in, in more rural areas, doctors can be operating remotely onsomeone. It's very cool. This whole tele medicine, including remotesurgery. It's huge. So these technology leaders agreed with me onthat 24% is the number one, most benefit four or five Gtelemedicine.

[00:40:53] Number two, remote learning and education 20%.Personal and professional day-to-day communications. Think of allof the stuff we're doing now, how much better that's going to getentertainment, sports, live streaming, manufacturing, and assemblytransportation, traffic control. Now we're down to 7% and by theway, that's where the cars are talking to each other.

[00:41:16] If you have five G. You don't need a mesh because youcan use 5g, carbon footprint reduction in energy efficiency. That's5% and 2% farming and agriculture. Our farming equipment is alreadyusing GPS in order to plow fields, planned fields, harvest fields.It's amazing. So there you go. Those are the top pieces oftechnology that are predicted to influence us next year.

[00:41:46] I think it's absolutely correct. And I've got to giveyou a bit of good news here again. 97% of these people polled agreethat their teams are working more closely than ever before. Becauseof these working from home workplace technologies and apps foroffice check-in, et cetera. Good news. All around.

[00:42:11] Hey, if you want more good news. If you want to knowwhat's happening, even some bad news, I got the right place for youto go. I have five minute little trainings in my emails every week.I have bootcamps again, all of this is the freeze stuff. Youimagine what the paid stuff is like, but I want you to understandthis.

[00:42:32] Okay. Craig, peter.com/subscribe. Do it rightnow.

[00:42:39] I had a good friend this week that had his life'swork stolen from him. Yeah. And you know what caused it? It was hispasswords. Now, you know what you're supposed to be doing? I'mgoing to tell you exactly what to do right now.

[00:42:55] Well, let's get right down to the whole problem withpasswords.

[00:43:00] I'm going to tell you a little bit about my friendthis week. He has been building a business for. Maybe going on 10years now, and this business relies on advertising. Most businessesdo so in some way, we need to have new customers. There's alwayssome attrition there's customers that go away. So how do we keepthem?

[00:43:25] Well, we do what we can. How do we get new customers?Well, for him, it was. Advertising, primarily on Facebook. He didsome Google ads as well, but Facebook is really where he wasfocused. So how did he do all of that? Here's the bottom line. Youhave to, if you are going to be advertising on Facebook, you haveto have an advertising account.

[00:43:51] Same thing's true with Google. And then on thataccount, you tie in either your bank account or your credit card. Irecommend a credit card so that those transactions can be backedup. And on top of all of that now, of course you have to use apixel. So the way the tracking works is there are pixels onwebsites, you know, about those already.

[00:44:17] And the bottom line with the pixels. Those are also.Cookie's about the pixels are used to set a cookie so that Facebookknows what sites you've gone to. So he uses those. I use those. Infact, if you go to my website, I have a Facebook pixel, the getset. And the reason for all of that is so that we know with.

[00:44:39] I'd be interested in something on the site. So I knowthat there's a lot of people that are interested in this page orthat page. And so I could, I have not ever, but I could now do someadvertising and I could send ads to you so that if you were lookingat something particular, you'd see ads that were related to that,which is what I've always said.

[00:45:04] Is the right way to go. If I'm looking to buy apickup truck, I love to see ads for different pickup trucks, but ifI don't want a car or truck, I don't want to see the ads. Right. Itisn't like TV where it seems sometimes every other ad is about. Caror a pickup truck. It drives me kinda crazy because it's a waste oftheir money in advertising to me because I don't want thosethings.

[00:45:33] And it's also not only just annoying in moneywasting. There are better ways to do targeting. And that's what thewhole online thing is. Anyways, I told you about that because hehad set up this pixel years ago. Basically the Facebook pixel getsto know you gets to know. All of the people who like you, thatmight've bought from you.

[00:45:58] Cause you can have that pixel track people throughyour site, your purchase site, they know what you purchase on theshopping cart, et cetera. And you can identify these people over onFacebooks and them ads because they abandoned the cart or whateverit is you want to do there. There's just a whole ton of stuff thatyou can do for these people.

[00:46:19] And it's so bad. It is so valuable. It takes years tobuild up that account years to put that pixel in place. And ourfriend here, he had done exactly that. Then he found that hisaccount had been compromised. And that is a very bad thing in thiscase because the bad guy used his account to place ads. Now there'sreally two or three problems here.

[00:46:52] We'll talk about one of them is. Why was the bad guygoing after him? Well, he has been running ads on Facebook for along time. So as far as Facebook is concerned, his account iscredible. All of the ads he runs don't have to be reviewed by ahuman being. They can, can go up almost immediate. He doesn't haveto wait days for some of these things to go up.

[00:47:21] So our bad guy can get an account like his, that hasyears worth of advertising credibility, and now start advertisingthings that are not correct. So there again is part of the value ofhaving one of these older accounts for advertising. And so the badguy did that use his credibility. And then secondly, he used 25grand worth of my friend's money to run ads.

[00:47:51] Also of course, very bad, very, very bad. So I satdown with him. In fact, it was this last week and I was out on atrip with just kind of a vacation trip. It was absolutelywonderful. You know, I, I never just do vacation. Right. It'salways business plus work whenever I do anything like this, but Iwas on.

[00:48:11] Trip last week. And so my eldest son who worksclosely with me, and he's also part of the FBI InfraGuard program.I had him reach out to my friend and they, he helped them out andthey talked back and forth. Here's the problem that he has. And I'mtrying to figure out a really good way to solve this. And I haven'tfigured that out yet.

[00:48:35] And you know, if you guys have an idea because youare the best and brightest, you really are. Go ahead and drop me anemail me@craigpeterson.com if you know, a good way around thisparticular problem, which is he has. This Facebook could count aswell as many other accounts, including his website, hostingaccount, his email account, et cetera.

[00:48:57] And. Uh, he has people who manage his ads for him whomanages website for him, who put up some of the promotions for him,you know, the advertising and everything else. So these arethird-party. This is what we generically call a supply chain, riskpeople who are not him have access to his stuff, his privatestuff.

[00:49:24] And, well, how does he do it or how did he do it? Ishe went ahead and gave them. Access by giving them accounts orpasswords. How well were they guarding their passwords and theiraccounts? So the first thing I had my friend do was go to have Ibeen poned.com. You'll find that online at have HIV. E I been.

[00:49:50] Poem dispelled PW, N E d.com. So I took him to have Ibeen poned and I had him put in his email address, the one he usesthe most and it showed up in five different. Hacks data dumps. Sothese are five different sites where he had used that same emailaddress in this case. And he found out that in those five cases,the bad guy's got his passwords and personal information.

[00:50:21] All bad. Right. And he went ahead and cleaned it up.So I said, well, put in the password because have I been, ponedalso let you check your password, just see if it has been used bysomeone else and then stolen. So there are billions of passwords inthis database. It's incredibly. Of all of these knownpasswords.

[00:50:44] So he put in his password and no it had not beenstolen, but the problem is how about the people that were managinghis ads on Facebook and managing his Facebook ad. We're theusernames, which are typically the email addresses and thepasswords kept securely. That's a supply chain thing I'm talkingabout, and that's where I I'd love to get him.

[00:51:12] But from you guys, me@craigpeterson.com. If you thinkyou have a good answer, What we've been doing. And our advice tohim was use one password. That's the only one to use. I don't trustthe last pass anymore. After their last big hack where they gothacked, uh, one password, the digit one password. And go ahead.

[00:51:33] And set it up. And in a business scenario, you canhave multiple vaults. So have a vault. That's just for people thatare dealing with your Facebook ad account, maybe have another vaultfor people who are posting for you on Facebook. Or better yet whenit comes to Facebook, go ahead and have an intermediary that istrusted, uh, kind of like the, if this, then that, or there's a fewof them out there that can see that you put the post up on thewebsite and automatically posted on Facebook.

[00:52:09] So you don't have to get. All of these people, yourpasswords, but again, it's up to you. You got to kind of figure outif that makes sense to you that those are the types of things thatI think you can do. And that is what we do as well. Now, one of thebeauties of using one password like that, where you're not sharingall of your passwords to everything you're sharing, the minimumamount of login information that you possibly can share is that ifthey leave your employees, All you have to do is remove theiraccess to the appropriate vault or volts, or maybe all of yourvolts.

[00:52:49] And this is what I've done with people that workedfor me in the U S and people would work for me overseas and therehave been a lot of them and it has worked quite well for me. Sowith one pass, We can enforce password integrity. We can make surethe passwords on stolen. One password ties automatically into haveI been postponed.

[00:53:12] So, you know, if a password has been exposed, if it'sbeen stolen online, it's a great way to go. Now I've got an offerfor you guys who are listening. I have a special report that I'vesold before on passwords, and it goes through talks about onepassword. He talks about last pass, which I'm no longer reallyrecommending, but give some comparisons and how you can use thesethings.

[00:53:35] Make sure you go and email me right now. Me, Me@craigpetersohn.com. That's Emmy at Craig Peter Sohn, S O. Dot comand just ask me for the password special report, and I'll be gladto get that on off to you. There is a lot of good detail in thereand helps you, whether you're a home user or a business.

[00:54:02] So the next step in your security is multi-factorauthentication. Interesting study out saying that about 75% ofpeople say that they've used it for work or for business, but thehard numbers, I don't think the.

[00:54:18] One of the things that you have to do is use goodpasswords. And the best way to do that is to use a passwordmanager.

[00:54:27] I was talking about a friend of mine who had beenhacked this last week and his account was hacked. His Facebook adaccount was hacked. We asked him if we could reach out to. BI andhe said, sure. So we checked with the FBI and they're looking toturn this into a case, a real case, because they've never seen thistype of thing, the hijacking of an advertising account who hijackedit.

[00:54:56] And why did they hide jacket? Was this in preparationmaybe for. Playing around with manipulating our next election cyclecoming up. There could be a lot of things that they're planning ondoing and taking over my friend's account would be a great way tohave done it. So maybe they're going to do other things here.

[00:55:15] And our friends at the FBI are looking into it. Hownow do you also keep your data safe? Uh, easily simply. Well, whenwe're talking about these types of accounts, the thing to look atis known as two factor authentication or multifactorauthentication. You see my friend, if he had been usingmulti-factor authentication.

[00:55:42] I would not have been vulnerable. Even if the badguys had his username, email address and his password, they stillwould not be able to log in without having that little six digitcode. That's the best way to do multi-factor authentication. Whenwe're talking about this code, whether it's four or 5, 6, 8 digitslong, we should not be using our cell phones to receive those.

[00:56:16] At least not as text messages, those have a problembecause our phone numbers can be stolen from us and they are stolenfrom us. So if we're a real target, in other words, they're goingafter you. Joe Smith and they know you have some, $2 million inyour account. So they're going after you while they can, in mostcases take control of your phone.

[00:56:45] Now you might not know it and it doesn't have to behacked. All they have to do is have the phone company move yourphone number to a new phone. Once. So that means one of the thingsyou need to do is contact your telephone vendor, whoever it is,who's providing new that service. That's a company like Verizonsprint T-Mobile, uh, a T and T one of those companies that aregiving you cell service, you have to contact them and set up apass.

[00:57:15] So that if they have a phone call coming in and thatphone call can be faked. So it looks like it's coming from yourphone, even if there was a phone call coming in, whether it'scoming from your phone or not, they have to get that password orpass code that you gave them. And once they have that pass codenow, Right.

[00:57:37] Uh, and that's great, but if you don't have that inthere targeting you specifically, then you're in trouble. So formany of us really, it, it may not make a huge difference. Uh, but Iwould do it anyways. I have done it with every one of my cell phonecarriers now. A couple of decades set up a password. So the nextstep is this multifactor authentication.

[00:58:03] If I'm not supposed to get it via text message to myphone, how do I get it? Well, there are a couple of apps out there.There's a free one called Google authentic. And Googleauthenticator runs on your phone. And once it's there on your phoneand you are setting it up on a website, so Facebook, for instance,your bank, most websites out there, the bigger ones, all you haveto do is say, I want to set up multi-factor authentication, andthen it'll ask you a case.

[00:58:34] So how do you want to do it? And you can say, I wantan app and they will display. A Q R code. That's one of thosesquare codes with a bunch of little lines inside of it. You'reseeing QR codes before they become very common. And you take yourphone with the Google authenticator app. Take a picture. Of thatlittle QR code on the screen, and now it will start sinking up sothat every 30 seconds Google authenticator on your phone willchange that number.

[00:59:08] So when you need to log back into that website, it'sgoing to ask you for the code. You just pull up Googleauthenticator and there's the code. So that's the free way to doit. And not necessarily the easiest way to. Again, going back toone password. I use this thing exclusively. It is phenomenal forkeeping my passwords, keeping them all straight and then encryptedvault, actually in multiple encrypted vault it's so that I canshare some of them.

[00:59:37] Some of them are just strictly private, but it alsohas that same authenticator functionality built right into it.Microsoft has its own authenticator, but you can tell Microsoftthat you want to use the standard authenticator. Of course,Microsoft has to do everything differently. Right. But you can tellit.

[01:00:00] And I do tell it, I want to use a regularauthenticator app, not Microsoft authentication. By the way. That'swhy I advise you to do don't use the Microsoft authenticator, justuse one authenticator for all of the site, and then Microsoft willgive you that same QR code. And then you can take that picture andyou're off and running.

[01:00:20] Next time you log in, it asks you for the code andinstead of texting it to you to your phone smarter, otherwise itwill not. That require you to open up your authenticator. So forme, for instance, when I'm logging into a website, it comes up andasks for the username, asked for the password. Both of those arefilled out automatically by one password for me.

[01:00:44] And then it asks for that code, uh, indication codeand. One password automatically puts it into my pace to buffer copypaste, buffer, and I just paste it in and they they've got thecode. So I don't have to remember the codes. I don't rememberpasswords. I don't have to remember usernames or emailaddresses.

[01:01:05] One password remembers them all for me. Plus it'llremember notes and other things. So you can tell, I really like onepassword. We use it with all of our clients. That's what we havefor them. And it does meet even a lot of these DOD requirement ontop of. Depending again, how much security you need. We will useduo D U O and it also has this authenticator functionality and wewill also use UBI keys.

[01:01:37] These are those hardware key. They do oh, can provideyou with hardware tokens. Those are those little tokens that can goonto your key ring. That show a changing six digit number every 30seconds. And that's the same number that would be there in yoursmartphone app. Your one password or Google authenticatorsmartphone.

[01:01:59] Hopefully, I didn't confuse you too much. I thinkmost of the reason we're not using the security we should isbecause we're not sure how to, and we don't know what we're goingto be. And I can see that being a big problem. So if you havequestions about any of this, if you would like a copy of mypassword security, special report, just send an email to me.

[01:02:25] M e@craigpetersohn.com. That's me Me@craigpeterson.com. That's S O n.com. I'll be glad to send it toyou. Also, if you sign up for my newsletter there on mywebsite@craigpeterson.com, you are going to get. I was hold littleseries of these special reports to help you out, get you going. Andthen every week I send out a little bit of training and all of myarticles for the week.

[01:02:56] It's usually six to 10 articles that I consider to beimportant so that, you know, what's going on in the cybersecurityworld. So you can. With it for yourself, for your family, for yourbusiness. Craig peterson.com. Stick around everybody. We'll beright back again. Craig peterson.com. .

[01:03:20] According to researchers. 32% of teen girls said thatwhen they felt bad about their bodies, Instagram made them feelworse. And you know what Facebook knew and knows Instagram is toxicfor teen girls.

[01:03:37] There's a great article that came out in the wallstreet journal.

[01:03:40] And I'm going to read just a little bit here fromsome of the quotes first. When I went on Instagram, all I saw wereimages of chiseled bodies, perfect. Abs and women doing 100 burpeesin 10 minutes, said, Ms. Uh, now 18, who lives in Western Virginia.Amazing. Isn't it. The one that I opened now with 32% of teen girlssaid that when they felt bad about their bodies, Instagram, I madethem feel worse.

[01:04:12] So that is some studies again, that looks like, um,yeah, these were researchers inside Instagram and they said this ina March, 2020 slide presentation that was posted to Facebook'sinternal message board that was reviewed by the wall street journalquote comparisons on Instagram can change how young women view anddescribe themselves.

[01:04:38] Apparently for the past three years, Facebook hasbeen conducting studies into how Instagram is affecting itsmillions of young users. Now, for those of you who don't know whatInstagram is, it allows these users to create little stories, tohave. Pictures videos of things that they're doing, and it it's alifestyle type thing you might've heard of course, of how this,this, uh, I don't know what it is.

[01:05:09] Kidnapping murder plot. These, this young couple andthe body I think was found up in Wyoming. Uh, I'm trying toremember, but, uh, of her and it's yeah, there it is. It wasn't myOMI. And I'm looking up right now, Gabby potato. That's who it is.She was what they called a micro influence. And I know a lot ofpeople who can loom, that's what they want to be.

[01:05:37] There's a, a young lady that stayed with us for a fewmonths. She had no other place to live. And so we invited her inhere and, uh, we got some interesting stories to tell about thatexperience. And it's, you know, a little, a little sad, but anyhow,she got back up on her feet and then she decided she was going tobecome an influence.

[01:06:01] And what an influencer is, is someone that has a lotof followers. And of course, a lot means different numbers. You getthese massive influencers that have tens of millions of people thatquote, follow unquote them. And of course, just think of theKardashians they're famous for. Being famous, nothing else.

[01:06:23] Right. Uh, they have subsequently done some prettyamazing things. At least a few of them have. And we've got one ofthose daughters who now was the first earliest billionaire, I thinkit was ever youngest. So they have accomplished some amazing thingsafter the fact, but they got started. By just becoming famous byposting on these social media sites.

[01:06:48] So you get a micro influencer, like Gabby Petito, whois out there posting things and pictures. And you look at all ofthese pictures and, oh my gosh, they're up at this national park.Oh, isn't she so cute. Oh, look at her boyfriend. They'll look sogood together. And people. Fall for that image, right? It's justlike Photoshopping these pictures of models, changing them.

[01:07:16] There've been some real complaints about those overthe years. So Instagram sets these kids up with these pictures ofpeople that are just totally unrealistic. One of the slides from a2019 presentation says, quote, we make body. Excuse me. We makebody image issues worse for one in three teenage girls teams, blameInstagram for increases in the rate of anxiety.

[01:07:49] And depression said another slide. This reaction wasunprompted and consistent across. Groups among teens is thisaccording to the wall street journal who reported suicidalthoughts, 13% of British users, and 6% of American users trace thedesire to kill themselves to Instagram. Again, according to one ofthese presentations, isn't this just absolutely amazing.

[01:08:18] And you might've heard it discussed a little bit. Isaw some articles about it, obviously in the news wall streetjournal had it, but this is a $100 billion company, Instagram.That's what their annual revenues. More than 40% of Instagram usersare 22 years old and younger. And about 22 million teens log intoInstagram in the U S each day, compared with 5 million that loginto Facebook, the younger users have been declining.

[01:08:57] Facebook it's getting, uh, the population there isgetting older and older on Facebook. In average teens in the usspend 50% more time on Instagram than they do on Facebook. Uh, andalso tick-tock, by the way I took talk has now surpassed YouTube insome of these metrics, quote, Instagram is well-positioned toresonate.

[01:09:20] And when with young people said a researcher's slideposted internally. Inside Facebook and post said there is a path togrowth. If Instagram can continue their trajectory. Amazing. SoFacebook's public phase has really tried to downplay all of thesenegative effects that the Instagram app has on teens, particularlygirls, and hasn't made its research public or available toacademics or lawmakers who have asked for it.

[01:09:54] Quote, the research that we've seen is that usingsocial apps to connect with other people. Positive mental healthbenefits said mark Zuckerberg. He's the CEO of course of Facebook.Now this was 2020. In March one at a congressional hearing, he wasasked about children and mental health. So you see how he reallylawyered the words that they can have, can have positive mentalhealth benefits, but Facebook's own internal research seems to showthat they know it has a profound negative effect on a largepercentage of their users.

[01:10:36] Instagram had Adam Moseri told reporters in may ofthis year, that research he had seen suggest the app's effect onteam's wellbeing is likely quote quite small. So what the wallstreet journal seems to be pointing out here is that Facebook isnot giving us the truth on any of this stuff. It's really sad.

[01:10:58] We've got to be careful. No, apparently Mr. Moserialso said that he's been pushing very hard for Facebook to reallytake their responsibilities more broadly. Uh, he says they're proudof this research. I'm just kind of summarizing this before we runout of time here, but it shows the document. Uh, internal documentson Facebook show that they are having a major impact on teen,mental health, political discourse, and even human trafficking.

[01:11:36] These, this internal research offers an unparalleledpicture. Uh, Courtney told the wall street journal of how Facebookis acutely aware that the products and systems central to itsbusiness success routine. Fail great article. I've got it in thisweek's newsletter. You can just open it up and click through on thelink to the wall street journal.

[01:12:01] They have a pay wall and I kind of hate to usepayroll articles, but this one, this one's well worth it. And theydo give you some free articles every month. So if you're not onthat newsletter, you can sign up right now. Craig peterson.com.You'll get the next one. If you miss a link today, if you wantsome, you know, the special report on passwords, et cetera, justemail me directly.

[01:12:29] Give me a few days to respond. Uh, but me Me@craigpeterson.com. That's me M e@craigpeterson.com.

[01:12:41] We've all worked from home from time to time. Atleast if we're somehow in the information it industry, I want totalk right now about why you need a personal laptop. Even if thebusiness is providing you with a laptop.

[01:12:57] Laptops are something that was designed to bepersonal, but many of us are using them as our main computer.

[01:13:06] I know I often am using my laptop, a couple of mykids and my wife. It's really their main computer, even though theyall have other computers that they could potentially be using,laptops are just handy and you have them with, you can take themwith you. We've got workstation set up that are kind of.

[01:13:27] Workstations, if you will, where there are threescreens set up and they're all hooked up into one central screencontroller that then has a USBC connection that goes right intothe, your laptop. So you can be sitting there with four screens onyour Mac laptop on your Mac pro if you needed four screens, it'sreally handy.

[01:13:53] No question. Many of us have a laptop for home and alaptop for business. And many of us also look at it and say, ohwow, this is a great laptop I got from work. It's much better thanmy home laptop. And you start to use the business laptop for work.At home. Okay. That's what it's for. Right. But then we start touse that business laptop for personal stuff.

[01:14:25] That's where the problems start. We've seen surveysout there that are shown. Then half of workers are using work issuedevices for personal tasks that might be doing it at home. Theymight be doing it at the office. Things like personal messages,shopping, online, social media, reading the news. So the prospectof using your work laptop as your only laptop, not just for work,but also for maybe watching some movies, group chat and messaging,reading, fan fiction, paying bills, emailing to family orfriend.

[01:15:06] It just seems not. It's so tempting. It's justnatural. I'm on it. I'm on it all day long. Why wouldn't I just useit? And this is particularly true for people who are working fromhome, but we have to be careful with that. It's really somethingthat you shouldn't be doing for a couple of reasons. One that.

[01:15:30] Top that's a business. Laptop is the property of thebusiness. It's just like walking home with boxes, full of pencilsand paper back in the old days, it is not yours to use for personaluse. We also have to assume, assume since it is the company'slaptop that hopefully it's been secure. Hopefully they haven't setup.

[01:15:57] So it's going through a special VPN at the office andit's going through special filters, maybe snort filters orsomething else. That's doing some deeper inspection on what'scoming through your laptop. Well, there are also likely on thatlaptop. Tools that are monitoring your device. Things like keyloggers, biometric tracking, Jill location, software that tracksyour web browser and social media behavior, screenshot, snapshotsoftware, maybe even your cam.

[01:16:34] Is being used to keep track of you. I know a numberof the websites that I've used in the past to hire temporaryworkers. Those workers have to agree to have you monitor whatthey're doing. These hourly workers, subtle take screenshots oftheir screen, unbeknownst to them. Yeah. Pictures from the camerasat random intervals.

[01:16:58] Again, unbeknownst to them, it'll track what they'redoing. And so I can now go in and say, okay, well he billed me fivehours for doing this. And I look at his screen and guess what? Hewasn't doing that for all of those five hours that he just billedme. Well, the same thing could be true for your company, even ifyou're not paid by the hour.

[01:17:23] Right now, we're looking at stats that show over halfof the businesses that are providing laptops for the employees touse more than half of them are using monitoring software. Andthrough this whole lockdown, the usage of these different types ofmonitoring systems has grown. Now there's some of the programsyou're using.

[01:17:50] You might be VPN in, you might be using slack or Gsuite enterprise, all good little pieces of software. They canmonitor that obviously, but it goes all the way through to thebusiness. And using your slack access as paid for, by thebusinesses also idiotic to do things like send messages to yourbuddies, set up drinks after work, complain to other people aboutsomeone else in the business, your boss, or otherwise your it,people at the business can see all of that.

[01:18:31] They can see what you're doing with slack. Even ifyou have a separate personal account. It's still more likely thatyou'll end up mixing them up if you're logged into both on the samecomputer. So the bottom line is if you are on a work computer,whether it's a laptop or something else, you can reasonably assumethat I T can see everything.

[01:18:56] That's not. They own it. Okay. And they have to dosome of this stuff to protect themselves. We put software onlaptops for companies not to spy on employees. That's none of ourbusiness, but we put software on computers for employees. To makesure they stay safe. Think of what happens when your computer, yourlaptop, whatever it might be connects to the company's network.

[01:19:25] Now that can be through a VPN. It can be because youtake your laptop home or on the road when you're traveling and youbring it back into the office. If that computer is infected,somehow now you've brought that infection into the office. Andthat's how a lot of the malware works. It goes from computer tocomputer.

[01:19:48] So once they get in that front door where there'sthrough a website and email that you clicked on or in a computerthat you're bringing into the office, they can start to movearound. Now it's not just your activity. And this is an interestingarticle from the verge by Monica chin. It's not just your activitythat they can see on your laptop, but in many cases, they're alsoable to look at anything you're downloading any of your photographsor videos that you might've sinked up from your smart.

[01:20:26] Laura loading these types of things, your textmessages on your work device for safe keeping, or just because it'syour primary device might seem harmless, right? Cause you're justgoing to remove them before you hand it in. But some companies suchas apple won't allow you to wipe your device before handing it inregardless of how personal the contents are.

[01:20:48] And that makes sense too, because many times anemployee leaves. And they don't give the company all of theinformation that they have, that they're obliged to give back totheir employer. Things that they've been working on, customerinformation, et cetera. So Manalive, there are plenty of otherdevices out there.

[01:21:10] Hopefully if you leave your company with plenty ofnotice, moving a bunch of things off your work device in the lastfew days, uh, might raise some eyebrows at the. And I'm sayinghopefully, because they should notice that sort of thing, becauseit could be malicious activity. It could be an insider risk thatmaybe they're not even aware of.

[01:21:33] There's so much you could go wrong here. So bottomline don't use the work laptop for home. So what should you use?You know, my personal recommendation. Almost always is get a Mac.They are safer to use the patches that they get are usually notdestructive. You know, sometimes you can install a patch forwindows and now your machine just don't work anymore.

[01:22:01] Right. You've had that happen. I know every last oneof us out there that are tried to install Microsoft patches for awhile have had that happen to them. All of a sudden the patch hascompletely messed up your computer and you are so out of luck, it'sridiculous. Right? So don't, you know, hopefully don't do that, butI like the max because they are basically safer than windows.

[01:22:27] And also because the patches just work on them, appletends to get them out in plenty of time to try and protect us thenext level. If he can't afford an apple in. Apple laptops reallyare not expensive when you consider how long they last and thequality that components, they are not expensive at all.

[01:22:47] But if you can't afford that, the next thing I wouldlook at is getting a Chromebook. There are a lot of companies thatmake Chromebooks Chrome is an operating system from Google. It'ssimilar to Android. Google keeps the Chromebooks up-to-date. Theypatch them quite regularly and make sure that there aren'tnastiness is going on.

[01:23:11] You just have some of the same issues and Android haspatches might take a while to get to you because it has to gothrough the vendor that made the Chromebook. You might have aChromebook for Sam from Samsung, for instance, it's not Google'seven though it's called a Google Chromebook. Now Chromebooks relyheavily on the cloud services that Google provides, but they canalso run just locally.

[01:23:38] So with a Chromebook and you can get them for aslittle as 150 bucks, but remember you get what you pay for. Or asmuch as I've seen them in the $2,000 price range with fancy GPU's,local storage and other things, but at 150 bucks, it could be wellworth it for you. It lets you do the regular word processing.

[01:24:02] Just think of what you can do with Google docs,spreadsheets. Again, Google docs, spreadsheets, all of those typesof things are built into it. You can. Cruz the web, obviously usingGoogle Chrome on your Chromebook. And send and receive email, whichis what most people do. That's really kind of all, most people doat home.

[01:24:26] So consider that as well. I also like iPad. They arequite safe again, but they tend to be more expensive and they cando pretty much everything. And now with Android support built rightinto Google Chromebooks, you can even run Android apps. So thereyou go. Keep safe and be safe out there. Right. Have a hack freelife.

[01:24:52] Make sure you get my newsletter. Craigpeterson.com/subscribe. Craig peterson.com/subscribe.

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity: Did Your Computer Have "Intel Inside"? It Won't For long! (2024)
Top Articles
philadelphia health/wellness services "ts" - craigslist
South Philly Wellness | womens health | 224 Moore Street unit 1, Philadelphia, PA 19148, USA
Randolf Spellshine
Ink Free News Kosciusko County
Restored Republic June 6 2023
Clothes Mentor Overland Park Photos
Sofia Pinkman
Wyze Thermostat vs Nest: Detailed Comparison
Spanish Speaking Daycare Near Me
Craigslist Pets Longview Tx
Nala Ahegao
Steven Batash Md Pc Photos
Ups Store Fax Cost
Fifi's Boyfriend Crossword Clue
Unlock the Fun: A Beginner's Guide to Playing TBG95 Unblocked Games at School and Beyond
What Is Flipping Straights Ted Lasso
Strange World Showtimes Near Cmx Downtown At The Gardens 16
211475039
Stolen Touches Neva Altaj Read Online Free
Overton Funeral Home Waterloo Iowa
Battlenet We Couldn't Verify Your Account With That Information
Skip The Games Lawton Oklahoma
Best Chinese Rome Ny
Ashley Kolfa*ge Leaked
Watch Psychological Movies Online for FREE | 123Movies
Starter Blocked Freightliner Cascadia
Standard Specification for Annealed or Cold-Worked Austenitic Stainless Steel Sheet, Strip, Plate, and Flat Bar
Jail Roster Independence Ks
Ok Google Zillow
Pcc Skilled Nursing Login
Does Dollar General Have Humidifiers
Sweeterthanolives
Operation Fortune Showtimes Near Century Rio 24
How To Get Coins In Path Of Titans
Jan Markell Net Worth
Alaska State Troopers Dispatch
Herbalism Guide Tbc
First Republic Corporate Online
Teamnet O'reilly Login
Ice Hockey Dboard
Espn Expert Picks Week 2
Swissport Timecard
Beacon Schneider La Porte
Paychex Mobile Apps - Easy Access to Payroll, HR, & Other Services
Ups First And Nees
Cnas Breadth Requirements
Tax Guidelines for Uber Eats Delivery Partners
5613192063
Craigslist Farm And Garden Atlanta Georgia
Exceptions to the 5-year term for naturalisation in the Netherlands
2045 Union Ave SE, Grand Rapids, MI 49507 | Estately 🧡 | MLS# 24048395
Horoskopi Koha
Latest Posts
Article information

Author: Reed Wilderman

Last Updated:

Views: 5889

Rating: 4.1 / 5 (52 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Reed Wilderman

Birthday: 1992-06-14

Address: 998 Estell Village, Lake Oscarberg, SD 48713-6877

Phone: +21813267449721

Job: Technology Engineer

Hobby: Swimming, Do it yourself, Beekeeping, Lapidary, Cosplaying, Hiking, Graffiti

Introduction: My name is Reed Wilderman, I am a faithful, bright, lucky, adventurous, lively, rich, vast person who loves writing and wants to share my knowledge and understanding with you.