Protecting Your Smart Home, and Why You Should Never Drop $5000 for a Toilet

September 27th, 2016 by Jennifer Lough

MVI Smart Home SecurityA research team at the University of Michigan would like Smart Homes to check their privilege (but not in the politically correct way). The team analyzed Samsung’s SmartThings platform in an extensive project and determined that about 55% of the applications available have too much access to devices, all applications have access to the whole device, and the applications are not particularly well secured. In short, the apps have too much privilege and should be secured. Unfortunately for the Smart Home user, this makes them susceptible to thermostat revenge, stalking, and strangers grousing at their children. Also, lightbulb sabotage exists. As does toilet hacking.

So, what to do if you wish to make your home super smart? Read the rest of this entry »

Micro Visions Announces Next Informational Event

September 21st, 2016 by Pamela Michael

breakfast-bytes-iconMicro Visions is pleased to announce that their next lunch and learn will actually be a breakfast event! We’ve got some important information to share regarding End User Security, and we’ll be serving it up with a side of bacon!

Security is the responsibility of everyone. In a world where one accidental click has the ability to jeopardize your entire network, relying on the IT manager alone to protect valuable corporate data is impossible. Your employees need to be trained to identify and avoid cyber attacks, practice safe data management behaviors, and thoroughly understand your security policy as well as the ramifications of non-compliance.

Educate your team on their role in organizational security, and give them the tools they need now!

Plan to join us for Breakfast Bytes: Wednesday, October 26th from 7:30-9 at our corporate offices located at 264 Leonard Street, NW.

Click here for additional information!

The Return of the Toxic Newts: BYOD Privacy Concerns in Social Media at Work

September 6th, 2016 by Jennifer Lough

Newts Micro Visions, Inc.A while back, I brought in my toxic newt buddies to illustrate the issues with BYOD in the office. Today, they have returned to address one of the stickier issues in device privacy and security policies. So, hands in the air. Who uses Facebook and Twitter at work? Now stop it. Here’s why.

Since the last time you heard about the newts, one of the grad students in the lab put toxic newts in with nontoxic. The plan is to see whether the nontoxic suddenly start leaking poisonous ooze. This is all well and good in the lab, but it’s not going to fly at work. Mixing Farmville with the daily grind is not, contrary to popular belief, a good plan. Actually, it’s going to make your company computer (because we’ve already established that BYOD is dangerous, so you’re not bringing your own devices) more susceptible to malware. That’s a bummer.

Yes, I know, everybody does it. That’s the problem. Those pesky hackers use it too, and if some smarty pants out there realizes your password is your birthday (which he can find on social media) or 1234, you’ve just given him one more entry point into your company’s systems.

Have a boss? You might be fired for using social media at work, even if you think you’re within the bounds of the policy. Familiarize yourself with that policy and tread carefully. If my professor discovered we were cross contaminating newts not involved in the experiment (supposing any of us had a death wish), we’d all be in the doghouse.

The toxic newts and I grant that there are several advantages to social media in the workplace, but we are still on the fence about whether those advantages outweigh the disadvantages (but it’s not looking good). To each employer his own policy. Should anyone desperately need to be social during the day, look over the cubicle and channel your inner Jim Halpert. There’s a Dwight or Pam out there somewhere.

Subscribe to our newsletter for tips and tech news delivered right to your inbox.