Tag Archives: Lifestyle

Planning Your Digital Legacy

Over the last few years, as I have seen family and friends lose loved ones, I am constantly reminded of the importance of our digital legacy.

Just this past year, a friend and former colleague passed away. I, like so many, was shocked and saddened. He was healthy and vibrant until the day he died of a heart attack while out cycling.

I first learned of his death online – where family and friends announced his passing on a Facebook page. What soon followed was a vast outpouring of friends gathering to remember, mourn and celebrate him, and to console his family and each other.

That Facebook page remains to this day, months later, with occasional new posts that continue in remembrance and celebration of his life.

I don’t know if my friend left a directive about his digital assets, but I do think he would be pleased by the tributes and what has become a living online memorial.

While that approach was absolutely the right one for him as a tech industry figure, it may not be for everyone. We don’t always know what our loved ones would want if and when the time comes. Or we might not know how to secure and remove their assets per their wishes.

“Boomers will be one of the first to leave behind a vast and varied digital footprint”.

Our generation (the Boomers) will be one of the first to leave behind a vast and varied digital footprint – including social media accounts, emails, tweets, images, videos and more. But most of us have yet to consider just what it is we are leaving behind, and what we want others to do with it?

To me, it is like any form of estate planning. It’s something we know we should do, but most of us put off– unless forced to deal with it. Except that it’s not exactly the same, because to date there are few of us who have even thought about our digital legacy, let alone planned for it.

In new research we at AVG have just conducted with those 50-plus (aka Boomers and Seniors), 83% of nearly 5,000 people we polled in nine different countries, have yet to consider their digital legacy.

Among our research findings:

  • Even the among the respondents who were familiar with the concept of digital legacy (12%), had never thought about it
  • Only 3% could say they actually have taken steps to prepare their family ahead of time
  • Yet, when the concept was explained to all, 1 in 4 admitted concerns about having a digital legacy.

 

This corroborates findings of other earlier independent surveys, which I wrote about in my column first exploring this topic last spring.

Clearly, further education is needed to help people make plans for their online lives – after they are no longer with us.

Even when all relevant paperwork is in place and documented, the task of managing a digital estate of a deceased relative can be a difficult and emotional task.

Here are three suggestions I have on digital legacy planning:

  • Make a will and add a digital codicil, which is a simple document that amends your will, to include your digital assets.
  • Make a list of your digital assets, passcodes and avatars, if you have them.
  • Share information and help educate your family and friends about the need for digital estate planning.

 

Because AVG is committed to helping people deal with the security and privacy of data, devices and people, this is a topic where we feel we can contribute.

We have developed an eBook Dealing with Digital Death that offers a starting point for tackling the issue.

 

 

It offers considerations, recommendations, resources and guidance – from how to tackle the sensitive issues around what to do with social media profiles and blogs to creating memorials and practical information on digital estate planning and how to delete retail accounts. I hope you’ll find it useful.

A Time to Celebrate Diversity  

Today we celebrate Martin Luther King Jr. day in the U.S., a day to remember the great Civil Rights champion. I think it’s also a day for us in the tech industry to celebrate diversity and reflect on it.

There was a significant development in tech diversity earlier this month.  Intel CEO Brian Krzanich pledged in his CES keynote address to invest $300 million over the next five years to improve the diversity of the company’s workforce. The investment will be used to attract more women and minorities for engineering and computer science positions, actively support and retain those new employees, and fund programs to support more positive diversity within the larger technology and gaming industries.

And, at least in my mind, equally importantly, as part of its effort, Intel is attempting to achieve “full representation” of women and under-represented minorities within the company by 2020, including in senior leadership positions.

“It’s not good enough to say we value diversity and then under-represent women and minorities,” Krzanich stated in his address. “Intel wants to lead by example.”

This was really refreshing and good news to hear from one of technology’s leading companies, and I applaud it.

The move follows a breakthrough last year when top tech companies released their workforce make-ups for the first time.  Facebook, Google, Twitter, Apple, Instagram were among the companies to report.

The numbers show that women represent no more than 30 percent of the workforce in many of the top companies. (Full disclosure: This is true for AVG as well.) Another snapshot provided in the latest (ISC)2 workforce study, published in spring 2013, shows that as a whole, the information security sector trails significantly with only 10% of its professionals female.

That is just the tip of the iceberg when it comes to the overall representation of minorities. This chart from the Guardian newspaper created by Information is Beautiful provides a view of gender and racial diversity make-up of the tech and social media industry.

Guardian Technology Diversity

 

Since last year’s report, a number of companies have begun to step up and invest in diversity, as we’ve previously written. In June, Google announced a program to get more women into tech with a $50 million fund to encourage girls to take up computer science in college and other grants and programs.  Its “Made with Code” campaign is in partnership with Girls Who Code, a nonprofit organization that runs summer coding schools for girls, and The Clinton Foundation, whose No Ceilings project aims to promote full participation by girls and women in all aspects of society.  You can read about it here.

More recently, the Hour of Code, while not aimed specifically at women and minorities, was another excellent step in promoting overall interest in computer science during Computer Science Education Week. They reported more than 10 million girls tried computer since in that one week – more than the total of the last 70 years! You can learn more at code.org.

While there is more work to be done to move diversity forward, these are good starts for our industry.

I am looking forward to contributing to the effort to help close the diversity gap in the tech industry and encourage women in technology careers as a speaker at the 2015 SXSW Interactive program with a Core Conversation on “Boardroom or Baby? The Choices Women have in Tech” on March 14th.  If you’re planning to attend the conference in Austin, Texas, please put 3:30-4:30 p.m. on your calendar to join the conversation. I’m sure it will be lively!

See Judith Bitterli at SXSW 2015

 

Title image courtesy of the bbc

Is It Safe To Give Out your CVV Code?

If you’re a regular online shopper like me, you’re sure to be familiar with your credit card security code – otherwise known as the card verification value (or CVV).

If not, you can find the 3-4 digit code on the back of your VISA/MasterCard (the final 3 digits of the number printed on the signature strip) or on the front of your Amex card (the separate 4 digit code above the card number).

 

The intended purpose of the CVV is to provide added security when making purchases over the internet – it helps to verify that you’re in possession of the card, as the code shouldn’t be known to anyone other than you as the card holder. So it’s essentially a way of counteracting credit card fraud.

 

Is it safe to give out your CVV?

For online shopping, the answer is generally yes – it’s just simply a good idea to stick with well-known, reputable companies that you trust. You’ll find that most online retailers nowadays do require a CVV for purchases, which is encouraging because it means that they’re actively trying to prevent fraudulent transactions occurring on their site.

You may also be asked for your credit card security code when processing a payment over the telephone. As with online transactions, it’s usually safe to do this – you just need to be sure that no one overhears the details you give out (so avoid public places when doing this).

On the other hand, when purchasing an item or service in person, you should never provide the details of your CVV. In fact, there’s no need for the retailer or service provider to request this – it doesn’t show up when the card is scanned normally and they have other ways of verifying that you’re the authorised card holder (signature or another form of identification) should they need to.

Handing over your CVV for purchases completed offline serves no purpose other than providing someone with the opportunity to steal the information. Because if they were to do this, they’d have everything they need to go ahead and make a bunch of fraudulent online transactions – on you!  

Tips for staying safe

To avoid any issues with security or credit card fraud, there are a few things you can do:

  • Only transact with reputable websites that you trust. And when you do, follow our 10 golden rules for safe online shopping.
  • Install internet security software on your PC, tablet and/or smartphone. Doing this will help you steer clear of malware and phishing messages that could lead you to fake websites designed to steal your personal details.
  • Always keep a close eye on your bank statement to identify any charges that haven’t been authorised.   
  • Never read out the full details of your credit card in a public place, or write them down anywhere for someone else to find.
  • Avoid making payments over the phone with a credit card, unless you make the call directly and obtain the number from a trusted source. Scammers have been known to cold call victims and convince them that money is owed immediately for a problem that doesn’t exist!
  • Don’t provide your CVV when processing a payment in person. It should never be required and if someone tells you otherwise, it’s a reason to be highly suspicious!   

Have you had any dramas when using your credit cards online? Share your story with us below.

The arrival of toy drones

Drones have landed – as one of the hottest gifts over this past holiday season and one of the biggest hits at the 2015 Consumer Electronics Show this past week.

Unmanned aircraft systems (UAS), as they are also known, are like model airplanes on steroids. They can hover, fly and often come equipped with cameras. They can belong to you or anyone else for under $100 dollars.

The cheap availability and growing capabilities of drones means that there are privacy and safety issues at stake.

We’ve already seen drones experience near misses with aircraft at major airports while unmanned flying cameras are an obvious threat to privacy.

It’s clear that drones are going to be around for a while and that legislation is needed to set reasonable and responsible limitations for recreational drone use.

However, regulation is still very much up in the air, if you’ll pardon the pun.

 

Who is taking action on drones?

The U.S. Federal Aviation Administration has issued a list of do’s and don’ts for flying safety regarding model aircraft for recreational use. These mostly focus on keeping them away from flying aircraft, airports and within sight line of the user. (See guidelines here.)

National Parks Service has banned drones from all National Parks, worried that the noise and proximity to wildlife would disturb nesting, migratory, and reproductive habits. The NPS also noted visitor safety was an issue.

Drone industry officials announced that they are teaming up with the government and model aircraft hobbyists to launch a safety campaign, which includes a website (www.knowbeforeyoufly.com) that includes safety tips and FAA regulations.

In the U.K, the Civilian Air Authority has already set protocols, mostly involving flying over congested areas and airspace, and the European Aviation Safety Agency is developing EU-wide safety standards which reportedly will be as high as those for manned aircraft.

Commercial use of drones has become a thorny subject and there is pending legislation in U.S. Congress that might even require commercial drone operators to have pilot licenses.

With all this legislation in the works, it’s clear there’s a lot more to this year’s hot toy story than first meets the eye. And you can bet there’s going to be a lot more to come…

Title image courtesy of firstsing

How to make a strong password in 3 easy steps

The truth is that the most important aspect of a password is actually length: a relatively simple but longer password is harder to crack than a really convoluted short one.

With that in mind, we put together a really simple method for you to create a strong password, and not go insane trying to remember it.

Password Infographic

 

Little systems like these can help you create strong passwords easily. Updating them can be simple if you add a simple letter or number to change over time.

If you still find this too complicated, you can always use a password manager like RoboForm.
With a password manager, you’ll only need to remember a single master password: it will create new random passwords and remember them for you every time you need them.

The Privacy Fear Factor: How Tech Is Failing To Serve the 50+

As Ann Karpf, the British journalist and sociologist reported in her January 4, 2015 New York Times Op-Ed piece on “The Liberation of Growing Old”: “Ageism has been described as prejudice against one’s future self. It tells us that age is our defining characteristic and that, as midnight strikes on a milestone birthday, we will become nothing but old — emptied of our passions, abilities and experience, infused instead with frailty and decline.”

Well said. But sadly, this is a construct that, while wrong, pretty much rings true when we look at how tech companies market to Boomers and Seniors – aka, those aged 50+ — at present.

Indeed, two in five Boomers and Seniors think tech companies patronize them according to our survey of 50+ as part of our most recent edition of the AVG Digital Diaries consumer research series.

However, the majority of 50+ that we surveyed do NOT consider themselves novice users. Most of us consider ourselves “average” tech users (76%); 10% think of ourselves as experts –and only 16% describe themselves as novice.

Digital Diaries Boomers

 

Earlier this week, I highlighted these findings at the Lifelong Tech Summit as part of the 2015 Consumer Electronics Show in Las Vegas.

I was honored and delighted to address the assemblage on the topic because I believe the tech industry in general overlooks – if not neglects – the 50+ consumer segment.

Equally important, my talk on “The Privacy Fear Factor,” focused on what the tech industry needs to do to better serve the needs of the 50+ market – around the issues of data protection and online privacy. This has become an everyday issue and question of fundamental human rights for all of us at any age.

This is especially true for those 50+. We fiercely believe at AVG that regardless of age, people need to know that they don’t have to give up their privacy every time they go online.

But the nagging question remains: why are Boomers and Seniors being undervalued and/or patronized by our industry when they represent a $3 trillion opportunity (U.S. dollars in disposable income).

“why are Boomers and Seniors so undervalued when they represent a $3 trillion opportunity?”.

A basic tenet of marketing is that you have to first understand a market’s dynamics before you can address a market.  And therein lays the heart of the issue.

In my view, the industry needs an attitude adjustment regarding the 50+ market. And I look forward to continuing dialogue on this topic – and in addressing this important demographic.

I’ll close with more of Karpf ‘s eloquent take on aging:

“How to enable the growing numbers of old people to live comfortable, meaningful lives is a fundamental issue of equality, with benefits for all. If we make the world better for old people, we make it better for everyone, from stroller pushers to wheelchair-users.”

AVG’s Top Blogs of 2014

2014 was a big year for the security industry and a busy one for AVG. There were high profile security breaches, some incredible new apps for our smartphones and huge game releases that pushed the performance of our devices to the limit.

 

Threats:

Heartbleed was arguably the most significant security story of the year after a crucial vulnerability was found in Open SSL, the technology used to encrypt data online. Potentially, OpenSSL estimate that as many as 66% of all websites were vulnerable.

Our blog post on how to stay safe from Heartbleed was our most popular post of the year and a follow up post later in June showing that many websites were still vulnerable comes in at number two.

One of the year’s most prevalent malware breakouts, known as GameOver Zeus was also amongst our top stories. GameOver Zeus picked up a lot of media coverage as experts gave a two week countdown until a massive suspected cyber-attack would be unleashed.

 

Mobile:

AVG had a big year for mobile with exclusive deals to protect Sony Xperia devices and we even created custom apps specifically designed for the Amazon Fire Phone’s ‘Dynamic Perspective’.

We also sealed the acquisition of Location Labs which has brought powerful security and device management features to millions of people.

In November, we release our first ever Android App Performance Report which detailed the secret ways that the apps we use can affect our smartphones. How much space they take up, how much battery they use and how much data they send.

 

Gaming:

Gaming also enjoyed a big year in 2014 with the release of many big name titles including Watch Dogs, where you play a hacker in a beautifully rendered open world. Our performance expert Sandro Villinger’s Ultimate Watch Dogs performance guide for the PC was our third most popular post this year.

Sandro also created a simple nine step guide to maximizing PC gaming performance which helped users of all abilities squeeze the most out their machines whether top of the range or 3 years old!

If you are a gamer, check out Sandro’s Ultimate performance guide to

Gaming looks set to have another big year in 2015, keep an eye out for Sandro’s GTA 5 performance review coming soon!

 

2014 was a great year at AVG and we’re looking forward to bringing you more big stories in 2015.

Happy New Year!

Three resolutions that will change tech in 2015

As we come to the end of 2014, it is time to reflect on the developments of the last 12 months and also look ahead at what improvements we can make in the year to come.

Personally, there were three major issues in technology that caught my eye in 2014 and they form the basis for my New Year’s Resolutions for 2015.

 

Cybersecurity and privacy

2014 was a watershed year for cybersecurity and privacy issues. With security breaches impacting many of our most trusted brands, retailers and banks (Sony, Target, Home Depot, JP Morgan Chase to name a few).

The good news is people are now more aware of online privacy. The bad news is that these attacks look to remain an issue for the foreseeable future.

In 2015, each of us has a responsibility to be the best digital citizens we can be, and do our part to protect ourselves, our privacy, our data and devices online. I’m getting involved through AVG’s Smart User Mission which aims to educate the next generation of connected people as they come online around the globe.

Photo Courtesy of Barbara Kinney, Clinton Global Initiative

 

As businesses, we have an ongoing responsibility to our customers to ensure their data is protected. That means upping our game in the increasingly changing and challenging cyber security environment.

 

Diversity in the tech industry

This important issue finally gained a much-deserved attention in 2014. Over the past year, we’ve seen Silicon Valley’s first major reporting on diversity in the workforce, after some high profile prodding by civil rights champion Rev. Jesse Jackson. Among others, a book released by Stanford scholar Vivek Wadhwa on Innovating Women and Babson College’s report on VC funding for women entrepreneurs drew further attention to the disparity issues women face in tech.

While the diversity numbers are not pretty, the good news is tackling the diversity issue in technology has gained momentum and has resulted in some positive actions; among them the Diversity 2.0 Summit and The National Venture Capital Association has taken steps to increase opportunities for women and minorities.

I am looking forward to doing my part, and I am delighted to have been selected as a speaker at the 2015 SXSW Interactive program with a Core Conversation on “Boardroom or Baby” on March 14th.

Video

SXSW Talk – Boardroom or baby?

We’ve made good progress but, without doubt, there is much more to be done. I believe that in 2015 we should all make an effort to support diversity in technology. It can only bring benefits to everyone involved.

 

 

Boomers and technology

It’s hard to believe, but the last of the Baby Boomer generation (1946-1964) turned 50 this month. Last fall, the PBS series The Boomer List chronicled an amazing list of 50 people who represent the iconic generation and the impact they have had culture and our lives from arts and entertainment to science and technology, including Apple co-founder Steve Wozniak (below).

Though Boomers helped invent the digital age – and we get little credit for it – we are often viewed as neophytes and often marketed to by tech companies as novices (if, in fact, at all).

Image courtesy of technmarketing.com

 

My final resolution for 2015 is to do what I can to change the way that the technology talks to the older generations. I’ll start by sharing new AVG research along with my thoughts on the tech industry’s need to adapt to new and different needs of this audience during my talk on “The Fear Factor” at the 2015 International Consumer Electronics Show’s Lifelong Tech Summit on January 6 in Las Vegas. If you are attending CES, please come check it out.

 

Here’s to a very happy, healthy, fulfilling and safe 2015 for us all. Look forward to seeing you in the New Year!

How technology will change the way we behave in 2015

As 2014 comes to an end, it is time to look ahead to 2015. This year though, rather than give my predictions about emerging technology, my mind is drawn to our behavior and the changing the way we actually interact with technology.

There are three areas in which I foresee the most change during 2015 thanks to increased public interest and acceptance:

 

We will start using privacy based solutions

The discussion about privacy; my right to be me and own my data has been gaining momentum in the last five years. We are rapidly losing control over our personal data and identities in today’s fast moving digital world. The advertising world collects ever more data to try and predict our needs based on who we are and our behavior. 2014 has shown us that our online identity isn’t safe from advertisers, hackers or even governments.

So the problem of who controls my identity becomes more and more interesting to the actual owners – each and every one of us. . Laws around how to keep and secure data, and restrictions about sharing it are on the way through movements like the Right to Be Forgotten.

In the passing year we have seen lots of solutions focusing on sharing using “Privacy by design” to be the key feature, apps like Snapchat , Whisper, Secret, Tinder, Tumblr, the Silent circle messaging and their Blackphone. These applications are chat, photo sharing and social media where the privacy and trust is built in.

So the market demand for privacy oriented solutions is there and the technology has existed for several years. The missing key ingredient that will drive it into the mass market is how business can make money from privacy. In the next year I expect to see more and more monetization concepts to make money from solutions that provide anonymity and privacy. The market demand is there and the technology is there…

 

 

We will fall in love with electronics (again)

Since the 90’s, the idea of a connected smart home has excited millions. The idea of an electric light that will turn on when you step in the room and you can close with a clap is not new. But it is only in the last year that the idea of Internet of Things has really started to be feasible.

The good news is that electronics are back and so is software. After all it is through software that we interact with devices and makes them seem exciting and new. Over the last 15 years we have tried to create value in software by adopting various business models. From the Freemium model, giving limited functionality and then charge when features are added through the models that monetize through Google Ads and search up to the SaaS models where it is not the software you pay for but a service that comes with it…

In 2014, we saw Fitbit emerge as a leading wearable device, and a big part of this is software that makes it seem very personal to every one of us. It was the same with the GoPRo camera – transferring a simple camera into high end extreme sports filming equipment. In 2015 I expect many devices will evolve to become connected and take on new roles in our digital world. Software will be an important factor in deciding which devices are successful, it’s through software that devices become personal and relatable.

 

 

We will search less and discover more

Since the beginning of the internet, search has taken a cardinal place in our interaction with data. First Yahoo and then Google made sure our homepage is a search page.

Microsoft went on and translated this behavior into the application on the PC, and now we have a search box almost in everything and everywhere…

With Adwords technology Google cracked the way to monetize search behavior. The search term that the user enters translated to ads that the user wants at that moment.

Smartphones arrived and quickly become a main vector for search, both of the Internet and of ever growing app stores. Importantly they also heralded the arrival voice recognition technologies and of voice search. But as technology advances there is a quest to predict the search. To analyze requests and behavior so that the information we seek is already there waiting for us. We can see it in action with programs like Google Now that collects information about you from a range of sources and tries to predict what you need, whether it’s directions to work, your flight times that day or what the weather will be like.

But in less obvious move, many successful mobile apps have removed the search field and actually providing people with suggestions or things to discover as a way increasing engagement as well as servicing and increasing the value of apps and services.

There are many examples of this discovery mechanic in online news where services like Outbrain and Tabula offer more content to people who read news, and monetize through pay-per-click

Other examples of discovery replacing search are popular apps like Instagram, Flipboard and Facebook where people are encouraged to roam and discover news, pictures or friends.

Perhaps the best example of this is Tinder where rather than searching for match, the app makes constant suggestions that the user accepts or rejects

 

I think in 2015 we will see this trend getting stronger and more apps and services will increase the promotion of content to their customers as a way to keep them interested in using the application or service.

 

Celebrating Hour of Code Week

Spearheaded by nonprofit www.hourofcode.com, during the past year, Hour of Code has reached tens of millions of students in 180+ countries. As of last count, there were 77,221 Hour of Code events around the world.

Anybody can host an Hour of Code anytime, but a grassroots campaign goal is for tens of millions of students to try an Hour of Code event during this week – December 8-14, 2014— the first anniversary of the event during Computer Science Education Week.

Facebook’s Mark Zuckerberg supports the program, recently donating $1 million on Indiegogo to Code.org’s Hour of Code crowd-funding campaign.  And this Friday, December 12, Apple retail stores across the planet will host one-hour coding workshops, for free, to anyone who wants to sign up and participate. These will offer an introduction to computer science, designed to demystify code and help inspire students to learn the basics of it. Apple will also host developers and engineers for special events and discussions in many cities around the world.

Code Week’s effort encourages minorities (this includes women) to open up the possibilities for both technology and for people. It’s truly a win-win.

Hour of Code

But somehow in our tech-obsessed world, there remains a real stigma about coding – a genuine perception that it is difficult or challenging or too, well, nerdish. The stereotypes regarding coding are tiresome and so last millennium!   This is in many ways limiting and unfortunate as coding is an incredible skill for people of all races, creeds, and genders.

Increasingly, technology affects every aspect of our lives, from the cars we drive to food we eat to the clothes we wear and the medicine we take. You can be a consumer, or a creator (or, ideally, both). Everyone should have the chance to have a say in creating the technology of the future.

Making education available matters, if we’re truly serious about creating equal opportunity on our increasingly connected planet. If you have a son, daughter, or grandkids, I encourage you to get them excited about and take part in Hour of Code.

Lets broaden the tech tent by inviting everyone in, and celebrate the Hour of Code. I’d love to go along with them and stretch my mental synapses a bit!

That’s truly impressive. One-hour tutorials are available in over 30 languages. As the organization says, “”No experience needed. Ages 4 to 104.”