Wednesday, April 12, 2017

Small Business Cybersecurity: The People Connection


Data from 2015 shows that 20% of U.S. businesses hacked are small with less than 250 employees. 60% of those fail after the attack. For small and medium-sized businesses, the average cost of a data breach is $21,000.

In 2016 an accountant was hacked and financial information and social security numbers from accounts were stolen. By the time the breach was discovered, a false return had been filed with the IRS in my family's name.

Cyber criminals or hackers use stolen information to obtain money. Sometimes they use the data, but often it is sold to other criminals. With names and social security numbers, criminals can file fraudulent claims for tax refunds.

Hackers also steal bank account information, credit and debit card numbers and authentication details, personal information, medical records, trademark information, trade secrets and others. A list of names, phone numbers, and addresses can be used by IRS scammers. Those criminals make threats and convince people to wire money or mail debit cards.

Preventing business cybercrime requires several levels of defense. Employee internet habits are one layer of cybercrime security that should be addressed. Since downloads of software are one of the primary causes of virus attacks, employee internet policies need to be solid and well communicated.


Steps to prevent cybercrime caused by employee behavior:


Company policies

Robust and clear company policies need to be written, distributed, and updated regularly.
These policies would cover the following areas:
  • email and internet use
  • protecting confidential information
  • policy communication and updates

Security training

Periodic meetings should be held to discuss security issues and concerns. Use recent news reports and videos to highlight different security concerns. Be clear about new threats from cyber crime and security changes to address those threats. Employees should be educated to be alert to phishing emails and suspicious attachments or links. A cybersecurity manager should be named who can respond to employee questions in a timely manner. This person should also insure policies are written, updated, and communicated.

Control Access

Limit administrative and password access. Regularly change passwords and establish limiting access to levels of data where possible. When employees are terminated, immediate changes in network access should be made.


Protecting organizations from cybercrime is a complex issue. Employee internet behavior is one area that should be managed to keep business information secure.

A cybersecurity tip sheet for small businesses by the Department of Homeland Security can be found here.

This article originally appeared on my Web Technology blog which can be found here.

Advertising on this blog supports my writing. By clicking an ad, you are under no obligation to buy. If you see an advertisement of interest, please click.

Thursday, March 2, 2017

The Boomer Generation Spends More Time Viewing Content than Others

If you're in the business of preparing web content, it helps to know your audience. It may be surprising to learn that the generation known as baby boomers
spends more time consuming content than millennials or generation xers. The 2015 United States census reports a population of 74.9 million boomers.

Generations (Years vary slightly with source)




In some ways, boomers view web content the same as others. This means:


  • Facebook is the top platform for sharing content (64%)
  • Videos and images are shared more than other content
  • Article length of 300 words is most preferred
  • Most favorite content types are:
  1. Blog articles
  2. Images
  3. Comments
  4. Ebooks
  5. Reviews 

Web viewing habits unique to boomers are:


  • More content viewed between 9-11:59 a.m. 
  • Most common internet access through desktops and laptops
  • Top subjects viewed:
  1. Entertainment 19%
  2. World News    18%
  3. Politics            13% 
  4. Healthy Living  9%
  •  Least favorite content types are:
  1. Memes*
  2. Webinars
  3. Flipbooks
  4. Slideshares
  5. White papers

Keep the above viewing habits in mind when sharing information with the boomer demographic. As a boomer, most of the stats above track my habits. I consume more content during the day than at night. I use both a laptop and desktop computer for ease-of-use. I check social media on my iPad and post tweets with photos from my phone. I veer from the demographic by using Twitter more than Facebook. Healthy living, nature and business are my trending topics. What about you? Do the figures above track with your internet use? Please let me know with a comment below.

Boomer viewing habits were extracted from data presented by Red Website Design here. In Financial Facts about Boomer Power, I explore the financial power of the boomer demographic. Please click the italicized title to view.

*meme- humorous video, image, or text that is shared rapidly via internet

Advertising on this blog supports my writing. By clicking an ad, you are under no obligation to buy. If you see an advertisement of interest, please click.

Thursday, February 16, 2017

ASQ Raleigh Members Tour Caterpillar's Plant in Clayton, NC

ASQ Raleigh Members at Caterpillar Plant in Clayton NC



Last month, ASQ Raleigh members toured Caterpillar's Clayton plant where wheel loaders are assembled. The plant was an impressive example of forward-thinking and progressive manufacturing. Gone were the loud noises, gas fumes, and beeping forklifts one expects in a truck factory.

The shift hummed along quietly. Digital "scoreboards" hung from the ceiling with statistics on the day's progress towards manufacturing goals. Work stations were ergonomically arranged to the worker's height to avoid muscle strains. Because the truck body moves along the assembly line on an electric track there are little or no fumes in the building. Promotions for safety and quality were abundant in the tidy work areas. The line is paused for quality meetings where all employees attend.

Headsets dialed into our tour guide's voice allowed clear communication. I've attended tours where it was difficult to hear the guide over machinery.

The Clayton facility was re-purposed years ago from a circuit board manufacturing plant. In our throwaway society, it is commendable anytime manufacturing recycles a facility. This location also boasts test tracks and an engineering center.

ASQ Raleigh very much appreciates the time and energy extended by the visitor care team at Caterpillar.

Advertising on this blog supports my writing. By clicking an ad, you are under no obligation to buy. If you see an advertisement of interest, please click.