With the threat of cybercrime not likely to disappear any time soon, the need to have secure passwords has never been greater. In the years to come, it is likely that this will continue to be the case. So, if you are looking to prevent cybercriminals from gaining access to your online accounts, you’ll need to take the necessary precautions.
Thankfully, it is now easier than ever to manage your passwords – all thanks to the wide availability of password managers including Nordpass. By using a tool such as Nordpass, you’ll be able to take on board the insights provided by cybersecurity experts who continually express the need to have secure and unique passwords for each and every one of your accounts. Continue reading as we take a closer look at excellent password management in our complete guide.
Make use of a password manager
A common complaint among internet users is that they have such a large number of passwords to remember. Thankfully, this needn’t be an issue anymore as password managers have made this process incredibly simple. All that you need to do is remember one master password, and the password manager will do the rest.
You may be tempted to use a built-in password management tool such as one that is available via web browsers including Google Chrome or Firefox. But in the current day and age, you can never be too careful. So, it’s worth making use of a dedicated password manager, with one that uses solid encryption to protect your passwords undoubtedly being the best choice.
With plenty of password managers out there on the market, you’re certainly spoilt for choice in the current day and age. There are options that won’t cost you a penny to install and use, whereas others work using a subscription-based model. So, regardless of your requirements, there sure to be a suitable option for you.
Ensure that each one of your passwords is strong and unique
One thing that millions of people across the globe are guilty of is using the same passwords across their online accounts. In a world where cybercrime is rife, this is something that you should absolutely avoid. After all, if a hacker is able to guess a password to one of your accounts, this will mean that other online accounts using the same password will also become vulnerable.
What’s more, the 2019 Verizon Data Breach Investigations Report (DBIR) even discovered that more than 80% of data breaches were a direct result of using poor passwords. For that reason, it is highly recommended that you do not use easily guessable passwords such as your date of birth, or simple numerical sequences such as ‘123456’.
To give you more of an idea on how to generate a secure password, it is best to use a combination of letters, numbers, and special characters. If you do decide to use special characters, it’s worth spreading them out as much as possible as opposed to placing them at the beginning and/or end. The sweet spot in terms of characters is a range of between 12-15 as this makes guessing your password far more difficult for hackers.
Using a password manager will enable you to easily set strong and unique passwords for each of your accounts, many of which can be generated using the password manager itself. Once you’ve done this, it will no longer be an easy process to crack your password. Plus, making them unique ensures that hackers won’t be able to gain easy access to your other online accounts in any instance where a certain website or service you use becomes subject to a data breach.
Use two-factor authentication
Many websites and services now offer the ability to add an additional layer of protection during the logging in process. This is called two-factor authentication – a process which sends a unique code usually by SMS or email which you will need to enter online before you can login to an account of yours.
This is a great way to prevent any unauthorised access to your accounts, as you will be alerted immediately as to when an unrecognised device attempts to make a login. So, if this particular feature is offered on a website or service that you use, it’s well worth making use of it.
So, that concludes our complete guide to excellent password managing! By this point, it should be clear to you that effectively managing your passwords is the key to preventing any unauthorised access to your online accounts.
Therefore, if you haven’t already done so, you should definitely take the time out to give your online accounts a password overhaul and ensure that they are all unique and as strong as possible. When combined with a solid password manager and two-factor authentication, you will be in a far better position to keep any opportunist thieves at bay.
Does Buying a Chinese Smartphone Pose a Privacy Risk?
Chinese smartphones have garnered a pretty bad privacy reputation in the last few years, which stems from several issues, such as lack of consumers’ trust and the fact that global political events have not really been in China’s favor. Somewhere around the mid-2010s though, China’s global image changed a lot for the better, especially with their appearance in the smartphone industry and when it comes to advances in 4G and 5G technology.
The smartphone industry is one of the fastest growing sectors in the global technology industry. Particularly in the last decade, which gave us the smartphone revolution, global device sales have skyrocketed from just 100 million in 2007, to over 1.5 billion today. Smartphones are also the most popular way through which people access the internet, which makes this sector critical for tech companies.
14 years ago now, we experienced the launch of the first Apple iPhone in 2007, which would undoubtedly mark the beginning of a new Information Age. As the years went by, we have seen big players such as Samsung entering the market, as well as most recently Chinese companies like Huawei and Xiaomi eating up global market share with their very affordable smartphones. It isn’t just Huawei and Xiaomi, though, let’s not forget Oppo and Vivo too, who have held small but stable market share, even gaining popularity in the United States.
Apple never really took off in China like it did in the rest of the world, as the nation favoured national production and local brand loyalty, but Apple has always been in demand there. Outside of China though, Apple had absolutely dominated the smartphone market for a long time with the entire world anxiously awaiting their next press conference, and what their new iPhone would be like. The market dominance then switched hands between Apple and Samsung for a few years, with Samsung being dominant most of the time.
Now, however, the global smartphone market has changed. With so much competition on the horizon (Samsung, Xiaomi, Huawei), as well as Apple charging very lofty prices for their latest offerings (and having lost some of their charm along the way with radical design changes), Chinese players have adapted and grasped a firm hold on the market for the foreseeable future. Offering familiar minimalist design approaches that Apple is known for, as well as having totally revamped their marketing, Chinese smartphone brands are now a true contender to the established giants. Ultimately, the most important target market for Chinese smartphones is the US and EU markets.
There is a big problem there though, it looks like there are serious privacy issues that plague Chinese smartphones and their reputation. Let’s look into this below.
What Is The Problem With Chinese Smartphone Brands?
With news of Huawei being banned (Xiaomi is also blacklisted) from Western countries, their reputation is not in a good place. Today, there are many Chinese smartphone brands available, with Huawei and Xiaomi being the most recognizable internationally -the ones that have sold the most outside of China. Some of the other ‘budget’ brands are Honor and Realme, for example, which may not be known to most people. There are many more Chinese smartphone brands, but way too many to list.
With so much political tension between the US and China, what does this mean if you are planning to buy/already own a Chinese smartphone? Unfortunately, it is a fact that Chinese smartphones have experienced many privacy and security related issues with their devices, which fall into the categories;
- Pre-installed spyware
- Malware vulnerabilities
- Data theft
- Hardware ‘Backdoors’
- Weak encryption
Beyond pre-installed malicious software in Chinese smartphones, there are additional risks from installing very popular Chinese-made social media apps, such as;
Takeaways For Your General Smartphone Security
Having covered why there is so much negative buzz around Chinese smartphones and their privacy risks, let’s remember that a lot of it comes from the political tension between China and the US. There have been countless allegations of spying, hacking and data risks. Beyond this, there is a more important fact for the regular user. It is that Chinese phones are Android-based, which has a much larger user base and is as such more susceptible to attacks.
Let’s emphasize one thing; yes, that doesn’t mean that these devices are safe, but what is safe nowadays? Should this deter you, a regular citizen, from buying a Chinese smartphone? It is difficult to say what is considered ‘safe’ nowadays, and depends a lot on who you are and whether your data is so sensitive that governments will try to access your phone (for most people, this is not an issue).
However, for the privacy conscious individuals out there, there are some things you must implement for your safety and peace of mind, no matter what kind of device you use, or which country it comes from;
- Always use a trustworthy Virtual Private Network, or VPN
- Consider that iOS may be safer than Android overall
- Make sure that you have a strong password on your phone
- Ensure that you have multi-factor authentication at every juncture
- Do not share sensitive information online if possible
- Always keep your smartphone software up-to-date
- Never download unverified software, or access third-party app stores
Earth Observation Data Could Represent A Billion-Dollar Opportunity For Africa
Earth observation [EO] data provides a billion-dollar opportunity for economies on the African continent, one that could create jobs and build new resilience after COVID-19.
The newly released report Unlocking the Potential of Earth Observation to address Africa’s critical challenges lays out the multiple economic benefits from EO data. The report was written in collaboration with Digital Earth Africa, an initiative that is a world first in providing freely accessible data that maps the entire African continent.
This report marks the first known time the potential impact of EO for Africa has been quantified. According to estimates, EO could be worth up to $2 billion a year thanks to:
1. A strengthened EO industry. Improved use of EO data could lead to an extra $500 million in yearly EO sales along with new job opportunities and increased fiscal revenues.
2. Boosted agricultural productivity. Better data could potentially be worth an extra $900 million a year, thanks to water savings and productivity gains for farmers, not to mention reduced pesticide usage.
3. Better regulation of gold mining activity. Data allows countries to crack down on illegal mining, providing a potential savings of at least $900 million from reduced environmental damage and fiscal evasion.
The report shows the opportunity available in EO data to strengthen economies and reach sustainability goals. EO data can help governments make more informed decisions regarding water, agriculture, food security and urbanization. Advancing new collaborations between public and private efforts can incentivize data sharing to develop EO industries on the continent even further.
Dr Adam Lewis, Managing Director of the Digital Earth Program welcomes the findings of the report as the first of its kind to quantify the potential benefits of the program. “Through collaboration with key partners both within Africa and across the globe, we have made significant progress in turning this potential into a reality. Over the last 12 months the program has met a number of milestones in improving access to data and services within Africa. Working with Amazon Web Services as well as international space agencies and the private sector, we have been able to provide access to locally stored analysis-ready satellite data within Africa.” Adam said.
“We are proud to support Digital Earth Africa’s efforts to make Earth observation data more easily accessible to African nations,” said Ana Pinheiro Privette, Lead for Amazon Sustainability Data Initiative. “Through the Amazon Sustainability Data Initiative, Amazon is making available petabytes of Earth observation data, which provide valuable insights for communities to manage climate impacts including increased floods and droughts.”
Valuing the impact of EO is an emerging practice globally, with recent reports covering the Asia Pacific, Australia, the European Union and the UK, but this is the first such report for Africa. The report was developed following examination of the readiness of African countries to effectively and efficiently grow their geospatial capabilities, integrated with study of the potential economic benefit of EO data adoption on specific sustainable development focus areas.
Data-Driven Operations Are Key to Future of Manufacturing
In the near future, manufacturing companies will collaborate in hyperconnected value networks in which data-and-analytics applications drive productivity, new customer experiences and societal and environmental impact. A new white paper, Data Excellence: Transforming Manufacturing and Supply Systems, released today presents the challenges for manufacturers and provides the steps to overcome them.
According to the report, nearly three-quarters of 1,300 surveyed manufacturing executives consider advanced analytics to be critical for success and more important today than three years ago. However, only a few companies capture the full value that data and analytics can unlock to address manufacturers’ most pressing challenges. Less than 20% of surveyed participants prioritize advanced analytics to promote either short-term cost reductions or longer-term structural cost improvements. Only 39% have managed to scale data-driven use cases beyond the production process of a single product and thus achieve a clearly positive business case.
Surveyed manufacturers cited various challenges that impeded their efforts to further scale and implement data-and-analytics solutions within their plants and across networks:
- They struggle to prioritize the right value-adding use cases from a broad range of applications
- They have not put in place technological enablers, such as data security or advanced algorithms
- They lack critical organizational enablers, such as skills and capabilities and effective internal governance
This study by the World Economic Forum, in collaboration with the Boston Consulting Group (BCG), features insights from a unique community of 40+ manufacturing organizations and leading academics and public sector representatives, identifying six priorities to capture value from data and analytics in manufacturing:
- Define a data-to-value strategy and roadmap
- Incentivize internal and external ecosystem partners
- Build capabilities to capture and use data
- Implement an open platform to unlock data silos
- Enable connectivity for low-latency, high-bandwidth data flows
- Ensure data security and privacy
“These findings will help accelerate our journey to support companies in devising a path forward to reach the next level of data-based manufacturing excellence, build trust among manufacturing, suppliers and customers, and unlock new value through the development of new data-driven ecosystems,” said Francisco Betti, Head of Shaping the Future of Advanced Manufacturing and Production at the World Economic Forum.
“Manufacturing is on the verge of a data‑driven revolution,” said Daniel Küpper, Managing Director and Partner of BCG and a report co-author. “But many companies have become disillusioned because they lack the technological backbone required to effectively scale data-and-analytics applications. Establishing these prerequisites will be critical to success in the post-pandemic world.”
As a next step, the community is co-developing a Manufacturing Data Excellence Framework, which comprises value-adding applications as well as technological and organizational success factors. Companies will be able to leverage this framework to accelerate the development of globally connected manufacturing data ecosystems.
World Bank Helps Bangladesh Provide Education and Skills Training to Poor Children
The government of Bangladesh today signed a $6.5 million financing agreement with the World Bank to enable around 39,000 slum...
ADB, EIB Join Forces to Protect Oceans, Support the Blue Economy
The Asian Development Bank (ADB) and the European Investment Bank (EIB) today formed a new Clean and Sustainable Ocean Partnership...
GEN Z Creates Sustainable Fashion with Recycled Materials
“Sustainability is somewhat of a trend among the new generation. We care more about the planet as mass media pushes...
Rising Pak-Turk Cultural Diplomacy: “Dirilis Ertugrul”- The Prime Catalyst
Amid massive success of famous Turkish drama series Dirilis Ertugrul, also titled as Resurrection Ertugrul in English for Netflix, is...
Is Mike Pompeo the worst Secretary of State in history?
Trump may have a race for the worst presidential title, but Pompeo is in a class of his own. James...
Mozambique’s Crisis and its Humanitarian Aid
Escalating conflict and a deteriorating humanitarian situation in Cabo Delgado has left communities completely reliant on humanitarian assistance. According to...
Skills Development Vital to Enabling Transition to Industry 4.0 in Southeast Asia
Countries in Southeast Asia should consider developing industry transformation maps in key sectors to enable the transition to the fourth...
Russia3 days ago
Russia and Belarus: An increasingly difficult alliance
Middle East3 days ago
Saudi-Turkey Discourse: Is a Resolve Imminent?
Middle East2 days ago
An Enemy Among Us
Terrorism3 days ago
Hidden History – 1977 Terrorist Attacks in Moscow
Middle East3 days ago
Is Erdogan’s Obsession with Demirtas a Personal Vendetta or a Calculated Strategy?
South Asia2 days ago
Arnab Goswami’s whatsApp leaks show power of propaganda
Eastern Europe2 days ago
Thorny path towards peace and reconciliation in Karabakh
Reports3 days ago
The World Needs to Wake Up to Long-Term Risks