Economy, Management, Systems Russell Mickler Economy, Management, Systems Russell Mickler

Friction

Friction is the measure of error rate and lost time associated with human interactions in a business process. Here's why you should you be tackling friction in your small business ... and why it matters to you as an individual.

Replacing labor is only part of the problem. Think about how technology improves customer service and satisfaction.

Replacing labor is only part of the problem. Think about how technology improves customer service and satisfaction.

This is an image of a woman enjoying one of 7,000 McDonalds kiosks in their European stores.

McDonalds installed the kiosks to reduce friction.

Friction are human touch-points in your business process.

It's any time that labor must intervene to get something done.

Labor:

  • Is inherently unreliable. They may or may not show up for work; may require sick or family leave; may require more training to do the work with higher quality.
     
  • Is inherently error-prone. Humans make mistakes. Especially in repetition. 
     
  • Is inherently slow. People can only work so fast. They are limited by their limbs, mind, focus, and attention. 
     
  • Is inherently costly. Add up the opportunity cost of slow, error-prone, and unreliable to determine a basis for their expense, and, a for a return on technology investment.

Thus, technology investment is used by businesses to reduce friction, reduce human interaction, and either contain the cost of growth, or, lower costs to an organization. 

If your company isn't investing in technology to reduce friction, your competitors are, every day building themselves the capability to work faster, smarter, and less expensively than you.  

US Corporations have experienced the most profitable years on record recently because of their fervor in attacking friction. They're driven by the profit motive. Businesses will never stop investing in technology to lower labor's influence in their processes.

So you must ask yourself two questions:

1. In what ways are you investing in technology today to reduce friction and remain competitive?

2. In what ways am I redundant as labor - do I create friction - and thus at risk at losing my job?

R

Read More
Russell Mickler Russell Mickler

10 Things You Can Do to Enhance Your Privacy and Security Online

identity_theft.jpg

Safeguarding your Personal Private Information (PPI) and thwarting identity thieves is your responsibility; nobody else is going to do it for you. And if you aren't taking reasonable precautions, you're likely to become a victim. Here's a couple of practical tips for safeguarding your PPI from wrong-doers.

Get a Secure Physical Mailbox.

Take a look at your mailbox. You know: that little tin drop box used to house your most confidential PPI ever? If you can't lock it, why are you using it? Remedy that. Get a secure mailbox at The UPS Store or your local postal service. Addendum: make all of your critical utility and consumer banking payments electronically and reduce the need for physical mail entirely. The less PPI that transfers in the actual mail, the better.

Get a Dedicated Credit Card.

Set up a credit/debit account with your financial institution that's exclusively used for all of your online purchases. It should be a unique account and separate from all of your other assets. Run online purchases through this account. Kill the card and account at any time without any real consequence to your actual banking accounts.

Use Complex Passwords.

A complex password is a password that's at least 10 characters long, mixed-case, with meta-characters like punctuation in it. Example: G0lfc0urs3! - read as "Golfcourse". Why? It takes a typical microcomputer 5 minutes to hack a simple password and over 500 years to crack the variability of a complex password. The time it takes to hack a complex password is an effective deterrent. Yeah, it's tough to remember, and that's the point. Convenience is the enemy of security. Don't make it convenient for somebody to hack you.

Don't Use the Same Password Everywhere.

Okay, sure, using multiple passwords can be a pain, but - hey, didn't I just say this? - convenience is the enemy of security. If somebody hacks one account and it's easy to guess the credential to other accounts. That kind of behavior only makes you more vulnerable.

Ditch Facebook ... or Constrain It.

Facebook is a huge repository of consumer PPI and it's only becoming more sophisticated at revealing private details about your life to others. Those details make it easier to case (or investigate) who you are and what you do online. Leaving Facebook, though, may not be entirely an option, so your next best approach would be to constrain what Facebook shares about you. Check out Facebook's Privacy Settings and seriously limit what Facebook shares about you. 

Ditch Microsoft Windows ... or Constrain It.

The Microsoft Windows operating system is less secure than Mac O/S or Linux; security experts recommend avoiding using the product. Still, chances are, your behaviors are already changing and you're using more secure operating systems found on your phones (iOS and Android) for transferring critical PPI, and that's probably a good thing and a strategy for containing your risk. If you can't abandon Windows, at least curtail your banking and utility payments on the platform in favor of paying by mobile apps. The less PPI you share on Windows, all the better.

Use Google's Chrome Browser. On Every Device. Optimize it's Privacy. Install HTTPS Everywhere.

Google Chrome is a browser designed around better Internet security. It's faster and more secure than Windows Internet Explorer and Mozilla's Firefox. Chrome is free and available for all platforms: PC, Mac, iOS, and Android. Install Chrome and optimize it's privacy features. Then, install HTTPS Everywhere: a free tool built in to Chrome that forces a secure connection to the places you go on the Internet.

Invest in Teathering.

Teathering refers to using your cell phone as a data hotspot. Carrier plans that include teathering are really inexpensive these days and are considered a standard feature. Instead of using public wifi access points (which can be designed as a honeypot to have unsuspecting users connect to it and expose PPI), you'd want to teather your laptop or tablet computers against your mobile device. Your cell carrier is ultimately more secure than any random wifi hotspot you might find in the field. It'll help keep the information you transfer confidential and private. 

Reduce Your Attack Profile.

Be conscious of where you share your personal private information; who you give your business card and personal information to. Question why somebody wants a critical identifier like a driver's license or a Social Security Number and even consider not doing business with these people. Limit your applications for credit and your banking products to a single provider. Don't sign up for everything you see online and delete online accounts that are no longer in use. Shred any physical documents instead of throwing them into the mail. Sit down with your spouse or partner and discuss strategies for limiting each other's exposure.  Be conscious and take specific actions to reduce how someone could acquire your PPI and exploit a vulnerability.

Be Conscious of Social Engineering.

Imagine being in a checkout lane at the supermarket. You have somebody behind you looking at their phone. Meanwhile, you remove your credit card and swipe it, then, enter a PIN code, into a reader device in plain sight. All the while, the guy behind you on the phone is recording your activities, capturing your card data and PIN on video. Your assumption of privacy got the best of you. Be aware of your surroundings and of those who may be using electronic devices around you. Take immediate action to protect yourself.

R

 

Read More
Info System Security Russell Mickler Info System Security Russell Mickler

Remove GPS Data from iPhone Pictures

image.jpg

The iPhone, like many modern cell phones, can take pictures. When those pictures are taken, information about the location of where the picture was taken is embedded into the photo. This is called metadata, and specifically it's referred to as a geotag.

Geotags are an interesting feature in that they can be pulled up on a map, then, sequenced in time to replay where you were when the photo was taken, even down to the very accurate location of a room within a household.

Very clever and fun. Until you start thinking about children using iPhones - their privacy and security become compromised in that it lays out a predictable pattern of their whereabouts.

Photos (along with the metadata) are uploaded conveniently into social media networks and distributed to whomever in uncontrolled ways. 

This date is also used by professional computer forensics technicians (hey, like me!) to identify potential evidence in the court of law. 

Further, if someone wanted to "case" another (a term used in hacking meaning we collect personal private information about individuals in order to break into their accounts), geotagging provides a unique and easy exploit. Imagine a stalker determining the predictable locations and timing to harm a victim?

So ... You may be curious on how to turn off geotagging on your iPhone or iPad.

1. Go to Settings.

2. Privacy. 

3. Location Services. 

4. Camera Setting and flip to OFF position. 

Doing this will prevent the device from storing geo-tag metadata in future photographs.  The photos you've already taken and uploaded probably already have the geotag information in them and it cannot be removed, other than deleting the photo, or, Using an app like deGeo (you can find it in the iTunes App Store).

It's not perfect, but it is one step you can take to control the distribution of your whereabouts, and the whereabouts, safety, and privacy of your children. 

R

 

Read More