IT Technology Services New Orleans

Category

news

9 Tips To Be Productive When Working At Home

By | IT Blog, news | No Comments

Right now,  many companies are suggesting—even requiring—that more employees work from home. Working from home can be a lonely enterprise in this era of social distancing, but it doesn’t have to be. For those who are not used to working at home or who don’t have an organized work station, distractions can disrupt your productivity. After all, you’re in your personal space, not your usual professional environment. Laundry needs to be done, dishes washed and the house cleaned. Plus, maybe you want to see The View since you’re always at the office when it’s on, or there’s a good movie on Netflix you’ve been longing to watch. Your pooch needs to go for a walk or you want to snuggle with him. And your spouse keeps yelling questions from another room, causing you to keep losing your train of thought. Or on the flip side, maybe since being at home 24/7, you find yourself toiling overtime on the job long after you usually would have called it quits at the office. On top of it all, cabin fever could be sneaking up on you.

Productivity Tips For Working At Home

If you’re not used to working at home, it can take some getting used to new challenges that you might not have at the office. It’s important to have a defined schedule and stick to it. Avoid sleeping in or lingering over breakfast, and get to work just as if you’re driving across town to your office, although you might be walking into the next room. You might think blasting Lady Gaga’s latest hit is the most productive way for you to work. Or loud noises could be the worst thing for you to stay focused and get work done. Everybody is different. Some people work better in clutter while others can’t concentrate unless their workspace is tidy. Regardless of your personal style, here are some tips to facilitate adjusting to your new situation during the coronavirus outbreak:

  1. Confine your workspace to a specific area in your home so your job doesn’t intrude into the lives of other household members and you can concentrate. Have a space that you designate as your workstation instead of checking emails, voicemails or texting in front of the TV or spreading work out on the kitchen table. Make your space a stress-free zone of quiet and solitude where you can concentrate. If you don’t have a separate room, find an area with minimum traffic flow or a corner of a room off from the main area.
  2. Block the neighbor’s barking mutt, excess noise from household members or ambient traffic with noise-canceling headphones or earbuds. Studies show that a delicate blend of soft music combined with soothing nature sounds—such as waterfalls, raindrops, a rushing brook or ocean waves—activates the calming part of your brain, helps you concentrate and lowers heart rate and blood pressure
  3. Go to the same designated place on a regular basis so your mind doesn’t wander, you can focus and increase your productivity. Establish water-tight psychological boundaries so you’re not constantly reminded of temptations around you (there’s chocolate cake in the fridge) or unfinished personal tasks—such as doing laundry, vacuuming or organizing your spice rack—that otherwise could compromise your productivity. And complete these personal activities outside of work hours as you normally would.
  4. Set water-tight physical boundaries around your designated workspace that is off-limits for housemates. Treat it as if it’s five miles across town, and ask house members to consider it as such (e.g. no interruptions from another room when you’re engrossed in a project unless an emergency). If possible, only go to your designated space when you need to work. Stick to a regular schedule, and keep your workspace at arm’s-length after hours. Try to maintain the same hours you log in at the office so you don’t get swallowed up by the workload.
  5. After a reasonable day’s work, put away your electronic devices and work tools just as you would store carpentry tools after building shelves or baking ingredients after making a cake. Keeping work reminders out of sight keeps them out of mind and helps you relax and recharge your batteries.
  6. Discourage personal intrusions. If you’re a teacher or doctor, friends don’t just stop by the office to chat, hang-out or interrupt your work. But sometimes well-intended friends, family members and neighbors think working at home is different. Interruptions and drop-ins can cause you to lose your focus, procrastinate or get behind on a deadline. It’s important to prevent intrusions into your workspace by informing others that although the location of your job has changed, it is no different from any other profession requiring privacy and concentration. Notify others that during at-home work hours you’re unavailable and cannot be interrupted. And let them know the after-hours when you’re available to connect.
  7. Employ your video communications perhaps more than you normally would, now that you’re more isolated. Make sure you have your company’s telecommuting devices—such as Zoom—hooked up and ready to go so you can stay connected with team members or office mates and you’re available for video calls and teleconferencing. If you start to feel lonely, consider setting up a support group of friends and colleagues who are also working at home by satellite. Make plans to meet on a regular basis and share creative ways you’ve adjusted to the new situation.
  8. Avoid cabin fever. Now that you’re spending a disproportionate amount of time at home, get outside as much as possible with gardening or walking around the block. Mounting research shows that spending time in nature lowers stress, helps you relax and clears your mind. After work hours, enjoy other areas of your home: watching a good movie, reading a book, or cooking a fun meal. And lead as much of a full social life as possible such as having non-symptomatic friends over for dinner. The new normal is not to limit social devices but to take advantage of them. Use Facetime, Facebook or Skype with friends and family members so you feel connected to the people in your life that you care about.
  9. Keep your attitude in check. Above all, be creative and don’t let your confined circumstances dwarf your tranquility, happiness or productivity. Your greatest power is your perspective. It can victimize you or empower you. When you look for the upside in a downside situation and figure out what you can control and what you can’t, it’s easier to accept whatever is beyond your control. Your best ally is to find the opportunity in the difficulty during an uncontrollable situation instead of the difficulty in the opportunity. Take advantage of this restrictive time to clear the clutter out of your basement, pull weeds in the garden or get caught up on fun hobbies you’ve neglected for a while.

We Left the Internet Vulnerable to Hackers. Now We’re Paying the Price.

By | IT Blog, news, Security | No Comments

On the day (perhaps not long from now) when the entire internet crashes, no one will be able to say that we didn’t see it coming. The denial-of-service attack on the morning of Oct. 21—which shut down Twitter, Spotify, Netflix, and a dozen other websites—offers a preview, in miniature and against relatively trivial targets, of how the day of doom might unfold.
Fred Kaplan Fred Kaplan

Fred Kaplan is the author of Dark Territory: The Secret History of Cyber War.

In the attack, someone (identity as yet unknown) flooded Dyn DNS—a New Hampshire–based firm that operates as the internet’s switchboard—with so many online messages that its circuits overloaded, shutting down not only its own services but those of the other sites as well, at least for several hours.

The weapons amassed for this attack were, literally, toys—baby monitors, music servers, web cameras, and other home devices that connect to one another, automatically sending and receiving data through the internet. Hence the name of this emerging network—the Internet of Things. The saboteur had hacked into hundreds of thousands of these devices and infected them with malware, so that, at a designated moment, all them sent messages to the real target—in this case, Dyn DNS—and shut it down.

The malware was simple: a program called Mirai, which, in the words of an alert sent out by the Department of Homeland Security, “uses a short list of 62 common default usernames and passwords to scan for vulnerable devices.”
Get Slate in your inbox.

This is what few consumers have understood about the Internet of Things: All of these nifty devices are computers with, in some cases, quite powerful data processors. And, like all computers, their operating systems are preprogrammed with usernames and passwords. The default usernames and passwords tend to be obvious: 12345, username, password—more than covered by the 62 words on Mirai’s scan-list.

However, unlike most computers, the Internet of Things devices are on all the time, and there’s no user interface for even tech-savvy consumers to monitor the machines’ activities. As one Silicon Valley technologist (who requested anonymity because he works for a firm that makes some of these devices) put it, “My TiVo needs an internet link only to download TV guide metadata every fortnight, but as far as I know it’s also working overtime serving viruses or DNS attacks.”

The technologist went on: “Who’s to know what’s running on your interlinked Nest thermostat or your refrigerator? Borderline impossible. And all that stuff is interconnected to websites and accounts with credit cards and other attractive targets for hackers. Given the radical increase in traffic that these devices generate, it will get easier to hide malicious streams of network traffic in the noise.”

There are now about 10 billion IoT devices in the world. (The estimates range from 6.4 billion to 17.6 billion, depending how the term is defined.) Some estimate that, by 2020, the figure will climb to 50 billion. That’s a lot of bots that a hacker can enslave for an attack.

Back in 1996, Matt Devost, Brian Houghton, and Neal Pollard wrote an eerily prescient paper called “Information Terrorism: Can You Trust Your Toaster?” They foresaw an era when household appliances would all be wired to the internet. Life would be more convenient, time would be saved—and everything you own would be vulnerable to hacking.

Devost, who went on to run Red Team operations in NATO war games and is now managing director of Accenture Security, says that, if anything, he understated the threat. He saw the phenomenon—and people today continue to see the Internet of Things—as posing “microthreats”: hackers messing with our personal stuff, turning our lives upside down, possibly even killing us. See, for instance, the experiment, just last year, when a former National Security Agency employee named Charlie Miller hacked into the onboard networks of a Jeep Cherokee and commandeered its steering wheel, accelerator, brakes—everything in the vehicle.

But in their paper of 20 years ago, Devost and his co-authors did not foresee “macrothreats”: hackers aggregating “smart” devices to mess with society. “Imagine it’s one of those mid-August days,” Devost said, “100 degrees with roaming brown-outs. What if a hacker ordered the IoT devices in a few large commercial buildings to turn up their air conditioners to max level? He could do real damage to the power grid.” And even this scenario is minor compared to the sort of attack presaged in last week’s incident—a hacker enslaving hundreds of thousands (or even millions or billions) of IoT devices to launch a massive denial-of-services attack that shut down, say, a whole city’s power generators or some other facility in the nation’s critical infrastructure.

That phrase “critical infrastructure” came into vogue in the late 1990s—to refer to power grids, banking and finance, oil and gas, transportation, water, emergency services, and other sectors on which a modern society depends—when a presidentially appointed panel, known as the Marsh Commission, discovered that all of those sectors were vulnerable to hackers.

Over the previous decade, the private corporations controlling these sectors all started to realize the enormous savings involved in hooking up their control systems to this new thing called the internet. Money transfers, energy flows, train switches, dam controls—they could all be monitored and managed swiftly, automatically, efficiently. No one considered the possibility that bad guys could hack into those networks and route the money, energy, trains, or water for criminal or destructive purposes.

The dangers should have been clear even then. As far back as 1967, at the very dawn of the internet, when its military precursor known as the ARPANET was about to roll out, a man named Willis Ware—head of the Rand Corporation’s computer science department and member of the NSA’s scientific advisory board—wrote a paper warning of its implications. Once you put information on a network—once you make it accessible online from multiple, unsecure locations—you create inherent vulnerabilities, Ware concluded. You won’t be able to keep secrets anymore.

When I was researching my book Dark Territory: The Secret History of Cyber War, I asked Stephen Lukasik, the person running the ARPANET program at the Pentagon’s Advanced Research Projects Agency, whether he’d read Ware’s paper. Sure, Lukasik told me. He told me that he took the paper to his team members, who also read it and begged him not to saddle them with a security requirement. It would be like telling the Wright brothers that their first plane at Kitty Hawk had to fly 50 miles while carrying 20 passengers. Let’s do this step by step, they said. It had been hard enough to get the system to work. Besides, the Russians wouldn’t be able to build something like this for decades.

It did take decades—about three decades—but, by then, vast systems and networks had sprouted up in the United States and much of the world with no provision for security. This was the bitten apple in the digital Garden of Eden. The sin was built into the system from its conception.

Corrections could have been made, security provisions could have been built in, once the utilities started hooking up the nation’s critical infrastructure to the internet—or, if they’d known of the risks, they might have decided not to get wired in the first place. And now, with the Internet of Things, we’ve begun to extend the mistake into our homes, into the stuff of our everyday lives.

Some remedies have been taken even since this past Friday. The Chinese firm Hangzhou Xiongmai Technology Co., Ltd., which makes components for some of the surveillance cameras hacked in last week’s denial-of-service attack, announced that it was recalling products from the United States. Dahua Technology, another Chinese company, offered firmware updates on its websites for customers who had bought its cameras and video recorders. But these are small measures, not likely to have much effect even on these specific products, much less those made in the past several years or in the years to come.

In the late 1990s, when the utilities’ vulnerabilities first came to light, Richard Clarke, then the White House counterterrorism chief, proposed imposing mandatory cybersecurity requirements on all industries connected to critical infrastructure. The companies lobbied against his plan, as did President Bill Clinton’s economic advisers, who warned that the measures would cripple these companies’ competitiveness in the global market. Clarke also suggested putting the government and critical-infrastructure

industries on a parallel internet, which would be wired to certain agencies that could detect intrusions. This plan was leaked and denounced as “Orwellian.”

“If we could go back 30 years, we would probably do things differently,” Matt Devost reflected. We shouldn’t wait till it’s too late, he added, to put some limits on the Internet of Things. For instance, he suggested, the United States should impose regulations requiring all IoT devices to come with locks, so that consumers can’t activate them without first changing the default password—and maybe requiring the new password to be sufficiently long and complex to make it resist simple password-scanning malware, like Mirai.

When companies started putting power grids on the internet, the net itself was new and the art of hacking hadn’t spread. Maybe a few hundred people in the world knew how to exploit its vulnerabilities; now a few million do.

It’s important to understand that much more is at stake than a brief shutdown of Twitter. As Bruce Schneier, a prominent cybersecurity analyst, put it in a blog post that he published in September, a month before this recent attack, “Someone is learning how to take down the Internet.”

He noted that several attacks of precisely this sort—but smaller, the kind of incidents that specialists see but that elude mainstream notice—have been occurring in the past couple years. This probably isn’t the work of criminals or mischievous researchers; they wouldn’t be interested in the targets or capable of mounting attacks of such scope. Rather, Scheier wrote, the whole trend “feels like a nation’s military cyber-command trying to calibrate its weaponry in the case of cyberwar. It reminds me of the U.S.’s Cold War program of flying high-altitude planes over the Soviet Union to force their air-defense systems to turn on,” so the U.S. Air Force could map the capabilities of Soviet radars and figure out how to elude them.

Is that what’s happening now? Is some nation-state figuring out how many IoT devices it takes to shut down larger chunks of the internet, and thus our society, as a whole? It sounds like paranoid science fiction from the 1960s, but the writers of that stuff were trying to scan the future as an extension of what was happening at the time, and in this case, they might have been on target.