Subject:::CIA, NSA and the IoT: What We Learned - TMCnet's TechToday
If you have trouble viewing this email, click here to view online.
TMCnet's TechToday eNewsletter
 
 

CIA, NSA and the IoT: What We Learned


Although the recent release of WikiLeaks documents credits the CIA as developing and co-opting an arsenal of technology targeting a wide range of IoT devices, the result remains the same. Consumer and business devices including Smart TVs, Apple and Android phones, routers, and other everyday devices are actively used to eavesdrop on voice and data communication.

Why You Need to Know: Using a connected device to collect information is nothing new, but the widespread activities reported by Wikileaks are on an unprecedented scale. It is also one of the first times we've recognized that IoT devices are targeted. Let's look at WHY and HOW these IoT devices were targeted.


 

IBM's Cloud/Data/AI Trinity Vision

If you want to know what the future of IT looks like, it's always good to look to IBM. The company pioneered and championed PCs, the Internet, open source software, Linux, APIs and AI, while shedding commodity products such as building PCs and producing chips.

Why You Need to Know: Today, the company is leaning hard into cloud with a data -centric vision different from Amazon, Google and Microsoft.
 
 

Hardhat Connect System Provides Connectivity, Improves Worker Safety

When we think of wearables, we often think of smartwatches and other similar accessories. However, certain industries—like forestry, power and utilities, construction and others require wearable equipment that's a bit more durable. In fact, it can be argued that these dangerous jobs require wearables much more than other industries, because it can be harmful to employees if they lose touch with supervisors and coworkers.

Why You Need to Know: Hardhat Wearables, a division of Priologic Software Inc., has launched a localized collaboration platform for teams working in these industries.
 
 

Environment Monitoring is Essential to Offering Business Continuity for MSPs

Business continuity plans are a key service many MSPs help develop and implement for their clients. Security, redundancy, and the ability to prevent downtime by being proactively alerted to issues are all at the top of client concerns, and clients rely on MSPs to help keep their businesses up and running as much as possible.

Why You Need to Know: What too many businesses don't realize is that nearly 30 percent of all downtime they'll experience is due to environment factors. Data loss, intrusion, and hard drive failure are all top of mind, however, environment factors are just as likely to impact them, and environment monitoring usually isn't part of their business continuity plan.
 
 

When Harry is Not Sally: Managing Number Changes and Mobile Identity

With so much hinging on mobile customer engagement, it is important for companies to get that contact right. But, what happens when a personalized communication meant for Sally instead goes to Harry?

Why You Need to Know: What businesses are discovering is that these misidentification moments are surprisingly common. An estimated 45 million American phone numbers change each year. Often these changes happen without notification.
 
 

 
This email was distributed by: Technology Marketing Corporation, 35 Nutmeg Drive Suite 340, Trumbull, Connecticut 06611 As a valued reader or attendee of TMC's publications and events, you will occasionally receive carefully-screened offers and free product information via email. If you no longer wish to receive this type of email, please go to http://www.tmcnet.com/enews/subs.aspx?eml=[[email]] to adjust your preferences.