Category Archives: Technology

Overcoming Leadership Challenges – Part 2 : Current Times

Second part. Read the first part here.

There are several successful leaders from recent times that practiced Hannibal-like leadership style; A.P. Giannini is one of them – the man who created the largest bank in the United States, the Bank of America. Like Hannibal, Giannini started working at an early age and taught himself the ropes of the business. He believed in the unconventional ways of running banks such as lending loans to immigrants when no one else did. In addition, he was also very innovative and quickly adapted to situations. For example, when fires began to spread to cities from the destructive earthquake many banks saved their deposits in steel vaults for protection. However, anticipating the damage fire would have on steel, Giannini knew it would take weeks before they will be able to open the vault. So unlike other bankers, Giannini decided to remove the gold and securities from his vaults before and was immediately able to lend loans to thousands of people who suffered from the earthquake. In addition, while other banks were struggling to open their vaults, Giannini learned the importance of having a geographical presence of banks. This resulted in purchases of small banks in different states and made Bank of American the first bank to cross state lines. Lastly, like Hannibal, Giannini was not in it for the money; each year he only paid himself $50,000 and toward the end of his career when he was awarded $1.5 million bonus, he donated it to University of California.

Throughout his lifetime, Hannibal had to make numerous difficult decisions in times of crisis and motivated soldiers to continue their support while together achieving that common goal. Likewise, Lee Iacocca is an inspiring individual who saved the desperate Chrysler Corporation. Before joining Chrysler in 1978, Iacocca was president at Ford Motor Company and developed popular models like Mustang. However, the CEO of Ford did not like Iacocca and despite all of Iacocca’s accomplishments for the company, he refused to make him the CEO; shortly after which Iacocca was let-go from Ford.

At the same time, Chrysler was facing a tremendous amount of challenges and was quickly reaching complete shutdown. Iacocca accepted Chrysler’s offer for the CEO position and agreed to not take any compensation unless the company got back up on its feet. Iacocca understood the severity of the situation, however, like Hannibal was driven to destroy Rome, Iacocca ultimately wanted to prove Ford wrong for letting him go. To bring the company around, Iacocca had to persuade the federal government to lend loans to Chrysler arguing that the country could not afford for such a huge domestic auto manufacturers to fail. The Congress agreed to loan Chrysler $1.5 billion with the condition that it will pay back the government $2 billion on its own.
To bring change to the organization Iacocca had to make tough decisions; he had to persuade and gain the trust of workers to accept layoffs and cut wages to save the company. Iacocca decided to discontinue production of less popular models and introduced a new line of models, same which were rejected at Ford and ultimately became Chrysler’s most profitable lineup. Lastly, Iacocca went public to improve companies reputation and was featured in a commercial with the slogan of The pride is back.
In the end, Chrysler regained its reputation and profits while paying back the government much in advance. This was all made possible because of Iacocca’s Hannibal-like leadership style where he was driven by his mission and made others believe in his mission too.
In conclusion, Hannibal was a leader whose sole motivator was his mission and not personal gain of wealth; which I think played a major role in his success. He was a sharp thinker and was able to effectively bring unconventional ideas to life. In today’s competitive business world, this “translates into doing what has never been done before in industries where giants like Rome already exist.”

Moreover, I personally liked the comparison of Hannibal and Iacocca. The reason beginning is that in the recent recession the American auto industry faced a similar situation where they had to convince the government that they were “too big to fail”. Despite the scrutiny from the public, the auto industry was awarded bailout money. And fortunately, like before they came back stronger and began paying back to the government. In addition, Chrysler used the same come-back approach as they did in the 1980s where it introduced new innovative models like the all-electric Volt and the Imported from Detroit slogan.

I think the example of Chrysler beautifully shows that despite the changing times the successful leadership styles are the same. Like Hannibal, current leaders need to demonstrate an “irresistible will, intense focus, and a disciplined approach” in order to be successful and lead.

Tagged

LAYERED SECURITY FOR HOME USER – PART 2

This is the second part of my layered security for home users topic. Please read the part 1 first to get the full background.

Recently my father purchased a new laptop for both personal and work use. And like many parents, he is decent when it comes to technology; he is able to perform many of the basic computer functions such as email, YouTube, Skype, social media and online searches. But when it comes to security, like many others he simply relies on the anti-virus software. I usually install the anti-virus software and configure schedule scans for him but this time he was away and had his computer setup from the store he purchased it from. The store tech support installed the Norton 360 Suite. Now, even though I have my preferences when it comes to different anti-virus software vendors but when it comes to layered security it does not matter.

My father used his new laptop for roughly two months before he had me look at it. At first glance the system looked fine; the Norton 360 was not complaining about anything and the system performance was also fine. But when I opened the browsers (IE & Chrome) it was hard to locate the address bar – because the browser windows were covered with numerous advertising toolbars. Also, both browsers had a different homepage and default search engines had changed as well. At this point, I knew that some clean up was needed.

I started with my go-to-software: Malwarebytes. I used it to perform a full sweep of the system and after 3hrs it came back with more than 200 findings. And when I looked at the scan logs I found something interesting. Beside a hand-full of malicious executables, everything else was categorized as PUPs -Potentially Unwanted Program: “is a piece of software that is also downloaded when a user downloads a specific program or application.”

Now I have a previous experience responding to malicious activity generated by PUPs. Usually, this was done through an IDS alert when one of these PUPs beacon out. But in this case, my father’s system did not generate any IDS alerts; maybe because it had only been on the network for less than 3hrs. Regardless, I decided to remove all of the findings and then confirmed their removal by doing a subsequent scan.

And this is where the fun part begins. What do you do when you have cleaned up an infected system? Well, it’s time to place few protective measures. Most tech support personals perform this step by simply selling and installing a different anti-virus software. But this measure fails immediately because they do not take the time to understand how the system got infected in the first place and how the user uses his/her system.

In my father’s case, the system got infected due to his careless behavior while surfing online; this usually happens when he is searching. He has a hard time differentiating between legitimate links versus advertisements. And because of this, he tends to click on popups. Now, in a perfect world, you would do some security knowledge transfer and hope for a change in the behavior. However, this is not that easy so we have to complement this with something else. This is what has worked in my case: ad blocker.

I installed the AdBlock browser extension for both IE and Chrome on my father’s computer. This was in compliment to activating browsers built-in pop-up blocking functionality. The Adblock “blocks banners, pop-ups and video ads – even on Facebook and YouTube” – which is perfect for someone who surfaces the web most of the time.

However, in addition to ad-blocker, I also installed the DoNotTrackMe extension. The reason for this was because even though Adblock does a great job in blocking popups and other online advertisements but there is only so much that it can do due to today’s smart-advertisements. It is no surprise that online advertisement these days is very targeted – your online browsing behavior is tracked and based on this behavior you are presented with advertisements. This makes it extremely difficult to differentiate between legitimate search results versus advertisements.

During the time that I monitored my father’s machine (~3 weeks) with both of these extensions enabled, I noticed a significant decrease in the number of malware and PUPs installed on the system. In fact, during this time I ran 4 Malwarebytes scans and it came back with between 5-8 findings. Interesting enough, by the end of my monitoring the Adblock extension had blocked 6,370 ads and DoNotTrackMe blocked 4,269 trackers.

In conclusion, layered security has proven to be effective in our enterprises and now its time that we take this idea and implement it in our home systems. The free browser extension solution that I present here is by no means complete or elaborate, however, in my test above it has proven to be effective in blocking drive-by downloads (at a basic level) at a $0 cost!

Tagged , ,

Zotero Review

Browser extension: Zotero

The most difficult part of the research process is keeping track of all of your sources. The traditional methods have been that you print all the pages that you visit, or copy and paste the text from the web sources into a Word document. However, the problem with those methods is not only are they troublesome but also the chance of misplacing them is greater. Moreover, when you are done with your paper and you have to create a citation for each of your sources one-by-one is not only time consuming but also increases factor of human error.

Zotero is a free Mozilla Firefox add-on which makes it easy to organize your sources and searches. It does that by saving the snapshot of the pages and saving the links. The best feature of the add-on is that it automatically creates the citation for your saved sources in both APA and MLA format. In addition, since it is fully compatible with both Microsoft Office and Open Office; you can directory copy your citation into that software.

Another great feature that I like is that you are able to sync your files with Zotero’s online server. This provides not only sense of security that your files are backed up, but also if you log-in from an alternative computer you can still view all your saved sources. In addition, Zotero allows you to share your source with other people. For that, all you have to do is create a new group, place the files that you want to share and sync. You can send an invitation to your group to as many people as you want and they can all view and make changes to your document. This makes group collaboration much easier.

Personally, I’ve been just introduced to Zotero and I love all the user-friendly features that it has to offer. Whenever I am surfing the internet and I come across an article of news that I could use later I simply open Zotero add-on and save a snapshot. In addition, Zotero’s highlight feature comes very convenient t as well. It allows me to highlight text right from the snapshot so that when I come back to that article I know exactly why I saved it in the original place.

Zotero is still an underdevelopment project. It has a dedicated link on its homepage which allows enthusiastic individuals to contribute their new ideas or making improvements. For a new user, they have great support page which comprehensively explains all the great features of Zotero.

The only thing that I am on the lookout for is Zotero coming onto different browser platforms. Currently, it is only supported by Mozilla Firefox but that holds a certain disadvantage against it. In addition, I have noticed in occasional events that the sync features take longer than usual. This could be due to their storage or the format that they are using.

Overall, I think Zotero is a great free tool for everyone who wants to efficiently save time and sources. I most favorite feature of Zotero is highlight and share. I am sure that the few glitches that Zotero currently has will soon disappear.

Tagged

Layered Security For Home User – Part 1

Most who work in information security are familiar with the term layered security (also known as layered defense) which in a nutshell mean that you employ multiple solutions/components to protect your assets. This idea has been pushed at the enterprise level for years and has been significantly effective at deterring attacks. And with the latest advancements in the end-point-monitoring (EPM) solutions, enterprises now have the capability to both monitor and control what happens on all of the workstations in the environment.

But if you move away from enterprise security to securing the average home user, most users tend to rely solely on the anti-virus solutions. Now, I am not going to get into the debate over how effective or ineffective anti-virus solutions are – but if you are interested in reading rants over this topic feel free to do so. However, what I will say is that just having anti-virus software (especially now) definitely does not meet the layered security concept.

So, how do we get layered security for home computers? Well, the market is not shy from a variety of different solutions that will promise to compliment your existing anti-virus while providing you the benefit of added security. And in my opinion, some of these products can actually be beneficial such as malware, spyware, and email protection but most of these features are already built-in to latest anti-virus solutions – you may just not know it. So, the question still stands, how do we get layered security for home computers? Well, let me answer this by explaining a recent event where I had the opportunity to test a theory first hand…

Continue with part 2

Tagged , ,
Advertisements