Apple Announcement Recap From October 18

Apple has made another announcement this year!
From it’s MacBook Pro line, to new AirPods, and finishing with new colors for its HomePod Mini!
We’re here to go over everything that Apple announced on 10/18.

MacBook Pro

The MacBook Pro has gotten it’s biggest update in years. Apple announced it’s new generation of computers: MacBook Pro 14- and 16-inch powered by it’s new M1 Pro and M1 Max chips. Apple says these new chips are much faster and may go further as to replace the “Pro” performance computers powered by Intel chips. They removed the touch bar, but they are bringing back the HDMI port, and SD card slot, and a MagSafe connector. It will have 3 Thunderbolt 4 ports and also a headphone jack.

The M1 Pro chip is said by Apple to be “scary fast.” It has up to 10-core CPU, up to 32GB of unified memory, up to 16-core GPU (Graphical Processing Unit), up to 200GB/s memory bandwidth, up to 20 streams of 4K ProRes video playback, and support for two external displays. Both the 14-inch and the 16-inch can support the M1 Pro chip.

Apple has said that the M1 Max chip is “scary fastest.” Being as fast as it is, it has 10-core CPU, up to 32-core GPU (Graphical Processing Unit), up to 400GB/s memory bandwidth, support for four external displays, and up to 7 streams of 8K ProRes video playback. Both the 14-inch and the 16-inch can support the M1 Max chip.

The 14-inch MacBook Pro has up to 17 hours of video playback and 11 hours of wireless web browsing. The 16-inch MacBook Pro has up to 21 hours of video playback and 14 hours of wireless web browsing. Both MacBook models are also 8TB of storage.

The MacBook Pro lines are less than 4 mm thin, has custom optical films and diffusers (7 films and diffusers mixed), and the cameras are 1080p HD! The cameras are double the resolution and uses a lens with a wider  aperture that lets in more light.

The 14-inch MacBook Pro has a 14.2″ Liquid Retina XDR display. The 16-inch MacBook Pro has a 16.2″ Liquid Retina XDR display.

Apple has even upgraded their keyboards on the new computers. Removing the Touch Bar allowed Apple to bring in a full-height function key row to the Macbook Pro. There are shortcuts now for Spotlight, Siri, Dictation, and Do Not Disturb. They also made Touch ID have a new, tactical ring that guides your finger for a fast, easy, secure way to unlock your Mac.

The Macbook Pro 14-inch model starts at $1,999.00 and the 16-inch starts at $2,499.00. 

AirPods (3rd generation)


Apple released it’s new line of AirPods that were redesigned to look similarly to the AirPod Pros. The AirPod 3rd generation has up to 6 hours of listening time with one charge and up to 30 hours of total listening time with this case.

Here are a few new features for the AirPods 3rd generation:

  • Spatial audio with dynamic head tracing.
  • Sweat and water resistant.
  • MagSafe, wireless, and Lightning charging.
  • Pitch-Perfect Control – You can press to play, pause, and skip through songs, or answer and end calls.

The AirPods 3rd generation is $179.00.

HomePod Mini

The new HomePod Mini‘s that were released in 2020 will now have different colors to add to the collection! The new colors are Blue, Yellow, and Orange.
All functions remain the same as far as the HomePod Mini is concerned.

The HomePod Mini’s still are $99.00. 

 

Amazon Announcement Recap: Devices

Amazon has made a huge announcement on 9/28 for their new products.
We’re here to give you a short recap on all their new devices they have shown us.

Home Robot – Astro

Amazon now created a home robot named Astro! Astro can help check in on your home and look for people/pets. It also can actively patrol your home as well, using Ring’s subscription service. Amazon’s David Limp stated that he sees Astro as a way to help give peace of mind for families, helping them interact and check in on older family members, for example.
Limp said, “It’s not just an Alexa on wheels, it has eyes on the screen and even cup holders, because why not.”
It is designed for “privacy at every turn” as Limp stated. You can turn on a “do not disturb” setting to minimize how much Astro moves day or night. Amazon also built the device to do as much computing in its body as possible, rather than relying on an internet connection.

Astro will be available for $1,000. You’ll need an invite to order one when they launch.

Ring Always Home Cam


Ring’s mission is to make neighborhoods safe. One way Amazon has made this possible is creating the Ring Always Home Cam.
This device will  fly around your home at a regular interval, or when it hears something. Privacy is built in, Ring said, by covering the camera when it’s docked for charging.

Amazon isn’t going to start full-on selling it immediately. Instead, it’s going to start with an invite-only beta. It’ll cost $250.

Amazon Glow: A Video Chat Device For Kids

Amazon Glow, projects computer images onto a table, where kids can interact with it. There’s an 8-inch LCD display so the kids can see their loved one as well. It allows video calls for kids more interactive!
The way it works is that there will be an app that the adult on the other end of the call can use to interact with books, draw, play puzzles and more. On the kid’s side, the Amazon Glow projects what the adult sees on their tablet onto the surface in front of it. It’s designed to be interactive and to keep the kid’s attention. Amazon has partnered with Disney, Mattel, Sesame Street and Nickelodeon for interactive books, puzzles and all sorts of other items.

Amazon said the $249 device will have a privacy shutter, and kids can only call people who’ve been preapproved by their parents.

Blink Products


Amazon’s Blink cameras is expanding its product offerings. The cheap stick-up cameras are expanding to include a video doorbell. Now you can buy a $49 video doorbell under the Blink brand that’s wired or wireless. The company’s also going to start offering a floodlight.

Smart Thermostat

Amazon announced a competitor to Google’s Nest. Amazon says it’s working hard to lower its carbon footprint and limit energy use by its own products, but it also wants to help you lower your own energy use. Amazon announced a certified smart energy thermostat powered by Alexa. It’ll work with most existing HVAC systems and is made in partnership with Honeywell.

Its new Smart Thermostat will cost $59.99, which is half the price of the average smart thermostat sold on Amazon, the company said.

Echo Show 15

Amazon released a new release of a tablet that they state “changes the way we think of tablets, creating a wall-mounted device designed to give us information and control over our smart homes.” the Echo Show 15 comes with a new widget-based interface that’s meant to offer people access to information like the weather, shopping lists, sticky notes and a shared family calendar. You can also see which smart devices are on or off through the Echo Show. It’ll also show you feeds from the Ring video doorbell overlaid on what you’re seeing.

The Echo Show 15 can be mounted in portrait or landscape mode. You can watch TV on it as well!

Amazon has also released new updates for Alexa, privacy promises, and updates on the Fire TV. 

**ALL IMAGES ARE FROM AMAZON. WE DO NOT TAKE RIGHTS TO ANY IMAGES SHOWS.***

Apple Announcement Overview

Apple has released it’s next batch of products!
Between the new iPhone 13, to the Apple Watch Series 7, and can’t forget the iPad Mini.
We’re here to review what Apple has in stored for us with these new products.

iPad/iPad Mini

One of Apple’s first product announcements was their release of the newest iPads. iPad and iPad mini! It’s powerful, easy to use, and versatile. Here are some of the new features for each.

iPad
Apple took the iPad to a whole new level. With the newest A13 Bionic Chip and new ultra wide camera, it’s sure to be the best iPad yet.

The A13 Bionic chip makes everything more responsive, from messaging to web browsing to using multiple apps at once. It also effortlessly powers advanced apps like Adobe Fresco and Procreate.
It’s up to 20% faster GPU gives the graphics performance that is needed. Perfect for playing immersive games and even more.

All-day battery life is always ready to work or play for as long as you need it. Apple has even broaden the iPad more with cellular connection.

One of the newest upgrade to the iPad is the 12MP Ultra Wide front camera. It brings a huge boost in image quality for even better selfies and group shots. The 8MP Wide camera on the back of iPad captures sharp, vivid images and video and the versatile back camera also lets you scan documents and experience immersive AR apps.


Adding onto the camera, Apple has now come up with Center Stage. Center Stage makes video calls more engaging by automatically adjusting to keep you centered in the frame. And it lets you create fun videos for posting to popular social apps.

More added features to the iPad are:

  • Accessibility features that support vision, hearing, mobility, and cognitive needs. Like sign language prominence in FaceTime, which can detect when a participant is using sign language and make the person prominent in a Group FaceTime call.
  • Fast Wi‑Fi lets you stay connected at home, work, school, or wherever you go with iPad.
  • Gigabit‑class LTE, you can connect even when you can’t access Wi‑Fi.
  • iPad OS smooth operating system.
  • Privacy built-in

iPad comes in 64GB and 256GB and starts from $329! Available to pre-order and is available in stores next week!

iPad Mini
One of the most exciting announcements from Apple was the comeback of the Apple iPad Mini! This new redesign was an eyecatcher during the Apple Announcement. The iPad mini has so much power in such a small size. With new all screen design, powerful A15 Bionic chip, superfast 5G network, and now available in 4 new beautiful colors, it’s sure to be on the top of things to purchase this year.

With it’s all screen design, it has an all-new enclosure features a new edge-to-edge screen, along with narrow borders and elegant rounded corners. The new 8.3-inch Liquid Retina display features True Tone, P3 wide color, and ultralow reflectivity, making text sharp and colors vivid, wherever you are.

Apple’s design of the iPad Mini also allows the Apple Pencil to to attach magnetically to the side of iPad mini, so it’s always with you and ready for all of your creative and spontaneous ideas.

With the new A15 Bionic chip, it makes the new iPad Mini just as powerful. It has the power to do everything. Use advanced apps, capture brilliant content, and bring your creative projects to life, anywhere. It delivers up to 40 percent faster CPU performance (6-core CPU) and, with the Apple Neural Engine, up to 2x faster machine learning. 80 percent faster graphics (5-core GPU) for your creative and gaming needs!

The iPad Mini also has all-day battery life, so it’s always ready for you when you need it.


Touch ID is also integrated into the top button for
fast, easy, and secure authentication.

The ultra-wide camera creates unlimited possibilities! It has a 12MP ultra wide front camera and also has Center Stage for more natural and engaging calls. The wide camera on the back of the iPad Mini features a 12MP sensor with Focus Pixels and a large aperture to capture sharp, vivid photos. With the A15 Bionic chip, it enables Smart HDR 3 to capture higher quality imagines. It also includes True Tone Flash to improve photos in low light.  You can also use True Tone Flash to scan documents and mark them up.

The iPad Mini comes in 4 new colors: Space Grey, Pink, Purple, and Starlight.

iPad Mini comes in 64GB and 256GB and starts from $499! Available to pre-order and is available in stores next week!

Apple Watch Series 7

Another great upgrade for Apple products is the Apple Watch Series 7.

The Series 7 seems to be only display upgrade. With a larger display, always-on Retina display, and it’s smooth edges, it’s a fresh look for anyone looking to purchase an Apple Watch. With this upgrade, it allow everything else to expand as well. Users will be able to see much more texts and buttons will be larger for it to be easier on the fingers.

It was explained that it is the most durable Apple Watch ever built. It is crack resistant, water resistant, and dust resistant. Just like the Series 6, there is no difference with that information. One thing they mentioned in the announcement is that the charging speed has increased by 33% and takes 8 minutes to provide 8 hours making it easier to sleep track.

One thing that’s exciting about the Series 7 is that the display is much larger now that it will now have a keyboard so you can type on the Apple Watch. Now users will be able to type their message or swipe through the keyboard to write out a message. Apple still kept the scribble feature for users who are used to it and will also be able to talk-to-text on the Apple Watch.

Apple Watch Series 7 will come in 5 colors: Green, Blue, (PRODUCT)RED, Starlight, and Midnight.

As far as this new product, it just seems like a bigger version of the Series 6 but with different colors and a few new features.
Apple Watch Series 7 will be available later this Fall.
It’ll start from $399.

iPhone 13, iPhone 13 Mini, & iPhone 13 Pro/Max

This one seemed to be the most disappointing during the announcements. Apple announced the iPhone 13, iPhone 13 mini, iPhone 13 Pro, and iPhone 13 Pro Max. It seemed to be filled with only updates on the battery, camera, and new finishes to complete the look.

One thing that all the new iPhones include now is Cinematic Mode. Cinematic Mode allows users to hold your finger on the subject to hold focus and it blurs everything in the background.
It follows that subjects face throughout the frame.

All new iPhones will have iOS 15 update available!

We’re going to go over all the new models and what upgrades Apple has done.

iPhone 13 & iPhone 13 Mini
The iPhone 13 has come out with a new look with the cameras to fit the new camera upgrades. With it’s diagonal look, it adds a fresh new look to the product while also upgrading the camera so it can support the Ultra Wide camera. The new Wide camera captures 47% more light for better photos and videos and the new sensor-shift optical image stabilization keeps shots steady. Both cameras have gotten a significant upgrade from the iPhone 12 with all new features and photographic styles that make every picture clear and bright. Apple has always done a great job with upgrading their camera with every new release of the iPhone.

The battery life has increased as well since the iPhone 12. The iPhone 13 has up to 2.5 hours more battery life and the and iPhone 13 Mini has up to 11.5 hours more battery life.


The iPhone 13 and iPhone 13 mini comes in 5 finishes: Pink, Blue, Midnight, Starlight, and (PRODUCT)RED.

The iPhone 13 is a 6.1-inch display and the iPhone 13 mini has a 5.4-inch display. Keeping it’s smooth-edged design from the iPhone 12 and ceramic shield front, Apple has kept the build (exterior) of the iPhone the same.
The iPhone 13 and the iPhone 13 mini come in 128GB, 256GB, and 512GB.
iPhone 13 starts from $799.
iPhone 13 mini starts from $699.
All before trade-in.
Available September 24.

iPhone 13 Pro & iPhone 13 Pro Max

The main thing Apple focused on with the Pro lines is the dramatic camera upgrade they have done to the phone. With its redesigned lens and powerful auto-focus system, the new Ultra Wide camera can focus at just 2 cm. It makes the smallest item seem amazing! Ultra Wide gets a wider aperture, a faster sensor, and all-new autofocus. And Telephoto now has Night mode. iPhone 13 pro models were made for low light.
The wide camera captures up to 92% more light for better pictures and videos. Night mode is now on every camera too. It also captures sharper pictures and videos in any lighting. The new Telephoto camera features a 77 mm focal length and 3x optical zoom, which is great for classic portraits or shooting clearer photos and videos from far away.

Here is a better look at what each camera does.
image: Apple

iPhone Pro and iPhone Pro Max also come in 1TB of storage! Huge upgrade on storage for the iPhone lines.

Other new features include:

  • Super Retina XDR display with ProMotion that can refresh from 10 to 120 times per second.
  • Up to 25% brighter outdoors.
  • A15 Bionic Chip
  • Surgical-grade stainless steel
  • Ceramic Shield that’s tougher than any smartphone glass.
  • 2.5 more hours of battery life on iPhone 13 Pro Max and 1.5 more battery life on iPhone 13 Pro


iPhone 13 Pro and iPhone 13 Pro Max comes in 4 finishes: Sierra Blue, Silver, Gold, and Graphite.

iPhone 13 Pro and Pro Max come with 128GB, 256GB, 512GB, and 1TB of storage.
iPhone 13 Pro is 6.1″ and iPhone 13 Pro Max is 6.4″ display.
iPhone 13 Pro starts from $999 and iPhone 13 Pro Max starts from $1099 all before trade-in.
Available September 24.

Anthony Mongeluzo spoke about the Apple Announcement on Fox 29 News!
Click here to view.

All images are from Apple Inc and we do not take rights for any images shown. 

Cyber Security – Back To School Edition

Back to school is here and we start to see more children using technology for their assignments/homework.
We also see parents posting pictures of their children with back to school chalkboards.
We’re here to remind that anything can be used as personal data to hack into your information!

Back To School Pictures

September is that time where users can sign in to social media platforms and see those adorable back to school pictures that parents post. Posting pictures of the chalkboards with the child’s school, favorite things, grade, etc. Seems harmless, right? Not for hackers it isn’t. Malicious attacks can happen to your personal accounts just by posting a picture on social media.
Based off of this picture, hackers can see what your child’s name is, school, and sometimes favorite color. Based off of this, sometimes it can trace back to your password hints. Try to keep all personal information sacred and not posting the detailed chalkboards on social media.

Keep it personal to family/friends and try to keep it simple for social media. Be very mindful of what you post on social media. Don’t post any personal information that you don’t want someone using for a cyber attack.

DON’T!

DO!

Homework On Personal Computer

Now that the school year is starting, so will all the homework assignments that children will have to complete through different websites. One thing can lead to another and they can click on a link that can lead to a malicious attack happening. Be cautious on what your child is doing online! Clicking bad links can lead to your personal information on your PC to be accessed.

Clicking on a suspicious link is dangerous:
Information is sent.
Malicious software can be launched.
Your location can be determined.

If you don’t completely trust the site, don’t let it install or launch anything on it. Always make sure you have your firewall activated and monitor your child while using websites to make sure they don’t accidentally click on a link that would cause an attack.

Make sure you also familiarize yourself with all the websites your child needs to complete their assignments. If you’re able to navigate yourself through the website, you can help your child just steer towards where they need to go. This will help ensure that no extra links are being clicked on within the website so there won’t be any risks of malicious attacks.

Password Protection

Assignments being scheduled online and children having to login to specific website, this is a cause for them to have access to passwords. With passwords being such a big secret, children might not understand how important it is to protect data as much as we do. Creating a password can get tricky, but do not make it the same password as all your personal information!

A few tips on password protection:
 Do not use easy-to-guess passwords.
 “Complex passwords” are nice, “Cognitive Passwords” are better.
 Do not use the same password iterations.
 Never use the same password for all of your accounts.
 Do not use the same password at work that you use at home. Keep work and home separate.
 Do not give child password on paper. Could lose it and get into the wrong hands.
 Do not store passwords on documents online!

Make Use Of Parental Controls & Privacy Settings

Parental controls and privacy settings help you keep your child safe from cyberbullying and online predators by allowing you to establish boundaries around which sites your child can access, the amount of information they can share online, and the amount of time they can spend online outside of school. Don’t just configure the settings; explain the importance of them to your children. This is a great opportunity to shift into a larger discussion of online safety.

Make Sure Software & Devices Are Up-To-Date

Having updated software and devices allows important security settings to remain active within your device. Don’t keep pushing it off! That extra added protection will allow your children to have no issues and continue to stay secured.

Beware Of Phishing Scams

Monitoring your children’s school emails are important when it comes to cyber security.  Clicking on suspicious links and replying back to suspicious emails can lead to malicious attacks and causing personal data to be accessed. Talk to your child about the importance of emails and not clicking links they see unless approved by someone.

Avoid all suspicious emails!

Start off the school year right with these important tips to keeping your information safe!

Cyber Security – What Is It and Examples of Cyber Threats

Technology and data is the core of most organizations.
But what is cyber security and have you put the effort into effective cyber security?
We’re here to explain what it is and cyber security practices for effectively defending against hazards in the digital world with the help of Mike at Cybir!

Cybir is a continued core focus on a full suite of in-house cyber security, digital forensic and data recovery expertise, honed for litigation support, eDiscovery and expert witness services.

What Is Cyber Security?

Cyber security (as stated by Merriam-Webster ), is the measures taken to protect a computer or computer system against unauthorized access or attack.
Any organization that uses modern technology must face with the risk of cyber threats. Taking steps to address this risk is crucial for the operational security of businesses. Data breaches and cyber-attacks against businesses have the potential to cause huge financial and reputational damage. It could not only affect the business, but also the employees.

Examples of Cyber Threats

Malware
Malware, shorthand for “malicious software,” is an application that’s intended to cause damage to systems, steal data, gain unauthorized access to networks, or otherwise wreak havoc. This is the most common type of cyber threat. 

There are a number of malicious software variants, including:

  • Viruses – Attaches themselves to clean files, replicate, and spread to other files. They may delete files, force reboots, join machines to a botnet, or enable remote backdoor access to infected systems.
  • Worms – Similar to viruses, but without the need for a host file. Worms infect systems directly and reside in memory, where they self-replicate and spread to other systems on the network.
  • Backdoor – Used by attackers to secure remote access to infected systems, or to obtain unauthorized access to privileged information.
  • Trojans – Disguises themselves as a legitimate application, or simply hide within one. They discretely open backdoors to give attackers easy access to infected systems, often enabling the loading of other malware.

Ransomware
Ransomware is a type of malicious software that infects a computer and restricts users’ access to it until a ransom is paid to unlock it. Ransomware attacks often rely on social engineering techniques such as phishing, tricking users into downloading a dropper that retrieves and installs the payload. Once on the system, ransomware finds all files of a specific type locally and across the network, encrypting and often stealing them. The original files, recovery points, and backups are then deleted to prevent users from restoring the system on their own. Ransomware usually changes the file extension and adds a “help” file, explaining how victims can pay to recover their data.

Mike at Cybir also mentions data exfiltration. He states, “Ransomware is evolving where threat actors are also stealing data and saying, ‘ok great your backups worked and you restored, but you are still going to want to pay us if you do not want us to leak your data to the internet or dark web.'”

He states for protection, “For ransomware and malware traditional AV is no longer effective. Traditional AV basically has a definitions file where when it is running a scan it looks at the current file and compares it to its list of known good / bad files and then makes a decision about what happens to it from there. If it does not know anything about the file it likely skips right over it and allows it to pass. EDR/MDR/XDR SentinelOne provides best in class NextGen Antivirus, device control, firewall control and threat hunting capabilities.”

Cybir offers endpoint protection, detection, and response in conjunction to SentinelOne that provides best in class NextGen Antivirus, device control, firewall control and threat hunting capabilities.

Phishing
Phishing is a common attack technique that manipulates people into taking unsafe actions or divulging sensitive information. In typical phishing campaigns, attacks will use different types of communication – email, instant messages, SMS, and websites – to impersonate a trustworthy person or organization that they are familiar with and using that identity to trick users into clicking on malicious links, downloading malware-laden attachments, or disclosing sensitive personal information.

Mike at Cybir states, “This often leads to ransomware or a business email compromise type of attack.”

One way to stay protected from phishing attacks is training and education. Mike at Cybir states, “The keys are constant user training and education as well as a solution like ironscales that is going to profile an email and add banners/details to give the user a heads up.”

There are two types of phishing attacks – phishing which is wide-ranged and spear phishing which is targeting a specific individual/company.

Spear phishing requires a lot of research for the attacker, but these cyber threats are generally tailored to their target based on insider knowledge or information available on the web and/or through social media. They use reputable names within the company to attack someone who they think will fall for it. It requires extra effort to spear phish, but they are more likely to succeed.

PCS offers a variety of phishing training products to help you and your company stay protected and aware of what to look for when it comes to phishing attacks. 

Knowing the different malicious attacks out there, there are ways to monitor and keep protected again malicious attacks.

Cybir offers Security Operations Center As A Service (SOCAAS) with these key features –

For more information about cyber security and ways to stay protected, contact PCS today!

Cyber Insurance – How Important Is It?

Cyber attacks have increased throughout the years, but within the past year, more people are becoming aware of how important it is. Many are turning to cyber insurance as a means of protection against some of the effects of an incident,
but what is cyber insurance and how does it work?
We’re here to go over what you need to know with the help of Hardenbergh Insurance Group.

Hardenbergh Insurance states, “For many years now, there has been awareness that companies should be accountable for the safeguarding of the personally identifiable information of their customers.  One particular law that helped to raise awareness was the Health Insurance Portability and Accountability Act (HIPPA) of 1996.  The vast majority of states have amended their state laws to address how companies and state agencies must respond to a security breach that results the compromise or potential compromise of personally identifiable information.  Most state laws dictate that in the event of a breach, not only must the organization notify the affected individuals, but also the specific state agency.”

Businesses such as health care providers, banks, law firms, accountants, hotels, retail stores, schools, public entities, charitable organizations, mortgage brokers, insurance agents, and other professional service providers, restaurants and any other business that maintains records of personally identifiable information all have a cyber liability exposure.

Today, the vast majority of businesses rely on their computer systems to run their business and to service their customers.  The inability to operate their computer system due to a cyber attack can cause severe financial damage to the organization.

What Is Cyber Insurance?

Cyber insurance, also known as cyber-liability insurance, is an insurance policy that helps protect organizations from the fallout from cyberattacks and hacking threats. Having cyber insurance protect against losses that are related to computer- or network-based incident.

Any business with an online component or one that sends or stores electronic data might benefit from cyber insurance.

What Does Cyber Insurance Cover

Key first party insuring agreements include the following:

  • Cyber Extortion – Costs to investigate, negotiate and settle threats made against the insured related to intentional computer attacks
  • Privacy Breach Response – Expenses for breach response services such as notification, credit monitoring and identity/credit repair
  • Business Interruption – Loss of income due to interruptions in business caused by breaches of an organizations network
  • Crisis Management – Expense of retaining a public relations firm to help mitigate damage to the organizations reputation and brand image caused by a cyber attack

Key third party insuring agreements include the following:

  • Technology Errors & Omissions – Error or omission in the performance of technology services resulting in third-party loss.
  • Privacy Liability – Failure to protect private or confidential information.
  • Security Liability – Failure of network and information security to prevent the transmission of computer viruses.
  • Media/Content Liability – Libel, slander, and other forms of disparagement, etc. with respect to the display of materials as well as infringement of a copyright by your website content.
  • Regulatory Actions – Regulatory actions brought by state or federal agencies to enforce privacy regulations.

Not all cyber liability insurance policies are the same.  Coverages can and will vary depending on the carrier and the insuring agreements purchased.  When evaluating which cyber liability policy is appropriate for your organization, it is important to evaluate both the first party insuring agreements and third party insuring agreements being offered.

When evaluating cyber liability alternatives for your business, it is crucial to be sure that the policy you select to protect your business contains the appropriate insuring agreements.  The Risk Management professionals at Hardenbergh Insurance Group can work with you to evaluate your exposure and to ensure that the appropriate coverage is in place to protect your business.

Most businesses are requiring clients to get cyber insurance. 

Cyber Risk Management Techniques That Can Be Implemented To Protect Your Organization From Cyber Attacks Said By Hardenbergh Insurance Group:

Unannounced Apple Features For iOS 15!

Apple announced iOS 15 back in June at WWDC, but lacked to mention an important feature that can help us all when it comes to traveling and even other cool features Apple didn’t go into.

Redesign of Maps App

The redesign of the Maps app was mentioned, but it was not put into detail what would be happening other than a nice refresh. One cool thing that is happening with the Maps app is that now it will factor in weather conditions! BGR.com goes into detail about how the Maps app will be able to let you know the weather conditions, such as a flash flood warning, into it’s suggested route.
Not clear how many weather events the app will be capable of alerting Apple users about. It’s a smart addition either way and can help travelers stay warned or find other paths if there is a weather alert in that area.


Here is an example of what to expect when you are using Maps on iOS 15.

Drag-and-Drop Across Apps

The iPad has had it’s ability to drag-and-drop documents, texts or pictures between apps. Now, iPhone has it’s turn!  If you are going back and forth between Messages and Photos to share pictures from an event with coworkers, you can now drag-and-drop the from the Photos app to the Messages app.

To test out the new feature:
Open the Photos app and view your recent photos.
Don’t tap on a picture to open it full screen, instead place a finger on the photo and start to drag your finger across the screen.
Don’t lift your finger when the thumbnail starts to float over the rest of the photos, then switch back to the messages app.
You’ll see a green circle with a + sign in it show up on the thumbnail indicating that you can lift your finger and the photo will be placed in the text field, ready for you to send.

Real Time Snow or Rain Alerts From The iPhone Weather App

Now the Weather app is making it’s comeback. Apple now is having the Weather app alert when snow/rain is getting close to you! It will alert you on your phone a few minutes before it starts and then it will alert when the rain/snow is almost finished.
Once you’re running iOS 15, you can turn on the new precipitation alerts by opening the Weather app, then tapping the three-line icon in the bottom-right corner of the screen.
Next, tap the circle icon with the three dots in the top-right corner of the screen followed by Notifications.
Slide the switch next to My Location to the On position and then tap Done. If you have more cities added to the Weather app, you can also turn on alerts for each one.

We will keep you updated on more features about iOS 15 as more details unfold!

Cyber Security Practices We Should All Do- Staying Protected

Cyber security is one of the most talked about subjects in the technology field.
Having your business data secured is crucial, but there are ways to stay protected.
We’re here to help you keep your data protected with these security practices we should all do to ensure cyber security!

Changing Passwords/Password Strength

Password safety cannot be stressed enough! Changing your passwords every 60-90 days will allow your information to stay protected. With that, your cyber security will continue to increase.

Not only will changing your password help, but also make sure it is STRONG. Adding symbols, numbers, and making sure the length is 8 or more characters will help keep the password strong. In the example presented above, pa$$word1a has a stronger password strength than password1 (please don’t use example above for your next password).

Webroot has given some greats tips for creating a new password. Using a phrase and incorporate shortcut codes and acronyms will keep the password strong while being able to remember your favorite phrase or saying. Some examples are 2BorNot2B_ThatIsThe? (To be or not to be, that is the question) or ABT2_uz_AMZ! (About to use Amazon).  Unique passwords are harder to break through than weak and simple passwords (please do not use any examples given above).

When selecting a password, do not use any personal information! Using personal information can lead to hackers knowing the answers to your security questions.

Examples of personal information to not use:
Your name
Age
Date of birth
Child’s name
Pet’s name
Favorite color/song

Don’t Use The Same Password For Everything!

Using the same password for multiple logins will cause a bigger issue than you may think. Having the same password for your banking, company sites, or even for your email will allow hackers to get into multiple accounts rather than just the one they got into.

Having different passwords will increase your cyber security to allow your data to be protected. It seems hard at first, but having that variety will allow not only your companies information to stay safe, but your own personal data will continue to stay protected.

Using A Password Manager

A password manager is program that allows users to store, generate, and manage their passwords for local applications and online services. It assists in generating and retrieving complicated passwords, storing the passwords in an encrypted database or calculating them on demand.

Having this will alleviate having to write your passwords down on a piece of paper.  Writing your passwords on paper or even putting them on a Word/Google document will create an easier passage for hackers to get into your information.

Updating Your Antivirus

Your antivirus is used to prevent, scan, detect and delete viruses from a computer. But what happens when you don’t update your antivirus?
There are always new viruses developing and keeping your computer clear from them are important. When you don’t update your antivirus, it won’t protect against the newest threats, leading it to believe that it is nothing to worry about. You might not be as protected from cyber security risks as you might think. Even worse, your device could be at risk of the latest threats that your security product is not yet aware of.  Making sure you are updated on the latest software could relieve all stress in not knowing whether or not you are protected from any threats. This will continue to add that extra layer of cyber security you need.

Installing Multi-Factor Authentication

Multi-Factor Authentication is a security technology that requires multiple methods of authentication from independent categories of credentials to verify a user’s identity for a login or other transaction. Having that extra layer of protection will allow your data to be protected while making it difficult for any malicious attacks to happen.

Once you login, you will get a prompt on your phone asking if it is you with the name and address that is trying to login to your account.  When you see the pop-up, you have to click accept or deny.  After you accept that it is you, you will be let in! This is just another layer of cyber security that will help protect your data. DENY any user that is not you logging in!

Phishing Training

Keeping up with your phishing training is IMPORTANT! Malicious attacks are happening within your emails. Clicking on one bad link could lead to a data breach. Knowing how to identify a phishing scam could not only impact your company data, but also your personal information. Phishing training allows you to see simulations of different ways a threat email can come through for you to identify.

Identifying an email could seem harder than you think. Hackers have been able to make it so users think the email is coming from someone reputable within your company. We have broken down the ways to identify phishing emails in our post “Phishing Emails – Ways To Detect and Prevent Attacks,” but having an added layer of security by taking phishing training will decrease your chances of malicious attacks.

For more information or need help getting set up, contact PCS!

Microsoft Issues URGENT Security Warning … Update Your PC Immediately!

Microsoft is urging Windows users to immediately install an update.
Security researchers found a serious vulnerability in the operating system.
We’re here to help you better understand what is going on and how to update your system!

PrintNightmare

The PrintNightmare flaw is a major security risk for enterprises, where print spoolers are used on Windows machines. Microsoft considered it serious enough to rush out a patch last week. The researchers announced in late May that they found vulnerabilities in Print Spooler, which allows multiple users to access a printer. They published a proof-of-concept online by mistake and subsequently deleted it, but sadly not before it was published elsewhere online.

Microsoft warned that hackers could exploit the vulnerability and be able to install programs, view and delete data or even create new user accounts with full user rights.

Who Is Affected?

Anyone using Windows 10 and earlier are affected! Microsoft urges that everyone using Windows should update their systems IMMEDIATELY.

How To Update Your Windows PC

Updating is simple and fast!

  1. Select the Start button
  2. Select Settings
  3. Update & security
  4. Windows Update

This will help update your computer to the most recent Windows update.  Below is a picture example on how to update your PC.

Microsoft also released a patch for Windows 11. Its newest operating system, due out soon, is currently available to beta testers.

For help on updating your system, contact PCS!