• Captain Albert F. Ames Mansion // 1874
    buildingsofnewengland.com
    Located next door to the William H. Glover House on Talbot Avenue in Rockland, Maine, this equally impressive Second Empire style Victorian residence stands as one of the finest in town. The abode was built in 1874 for Captain Albert Franklin Ames (1831-1887) by the architectural firm of Kimball & Coombs of Maine. Albert F. Ames was a sea captain and merchant who would later own many ships to distribute his manufacturing of lime casks which were sold and transported all down the east coast to build American cities. The stately home would later be the subject of one of artist Edward Hoppers paintings in Rockland, titled, Talbot House after a later owner.
    0 Commentaires ·0 Parts ·83 Vue
  • William H. Glover House // 1873
    buildingsofnewengland.com
    William Hurd Glover (1834-1910) was a prominent lumber dealer and builder in Rockland, Maine, and would built this house as his residence on Talbot Avenue. Mr. Glover hired architect Charles F. Douglas, to furnish the plans for the Second Empire style mansion. While covered in vinyl siding, the handsome residence features a slate mansard roof, central tower, delicate projecting portico over the entrance, and decorative window hoods and brackets. The house is one of the best examples of the style in Maine, even with the later siding.
    0 Commentaires ·0 Parts ·81 Vue
  • Quirky Facades of Japans Love Hotels Feature in Franois Prosts Vibrant Portraits
    www.thisiscolossal.com
    All images courtesy of Franois Prost, shared with permissionQuirky Facades of Japans Love Hotels Feature in Franois Prosts Vibrant PortraitsDecember 16, 2024Kate MothesLove hotels are a unique and deeply ingrained part of Japanese culture, says photographer Franois Prost. These venues have a very talkative quality visuallytheyre expressive in their design, reflecting aspects of local culture, values, and even fantasies.During a trip to Japan in 2023, when Prost was exhibiting an earlier series of works called Gentlemens Club at a gallery in Tokyo, he embarked on a road trip from the capital city to Shikoku Island in the southeast of the country. With the gallerys urging, he undertook a new project while visiting, documenting the facades of love hotelsalso sometimes called boutique or fashion hotelsthat offer rooms at cheap rates for brief stays.Prost, who is based in Lyon, France, approaches his subjects as features of the landscape that characterize a specific vernacular and highlight quirky or taboo facets of local culture. Gentlemans Club, for example, documented American strip clubs along a southerly route from Miami to Los Angeles in 2019. He has also sought out Ivorian, French, and Spanish nightclubs in series like After Party and discoteca.I choose specific types of venues in each countrythose with distinct, often kitschy or roadside architectureand photograph them across the region with a consistent framing style, Prost says. Im drawn to the aesthetic of these places, and how their facades reveal something about the people who inhabit or frequent them.His latest series, Love Hotel, captures the unmissably colorful designs of roadside lodging, ranging from ships and castles to flowers and a pink whale. The venues aim to evoke a sense of romance, escape, and fantasy, yet they also need to feel safe and invitingnot tacky or sordid, Prost says. Its why some of these places have an almost Disney-like aesthetic, playful yet carefully curated. Estimates of how many love hotels dot Japan range from 10,000 to 40,000.Prost has launched a new book for the series on Kickstarter that highlights the creativity and occasional hilarity of these infamous destinations. I hope viewers are struck by the incredible attention to detail and devotion to design that defines these spaces in Japan, Prost says.You can support the book on Kickstarter until January 10, and stay updated by following Prost on Instagram. Explore all of his projects, including more books, on his website.Next article
    0 Commentaires ·0 Parts ·79 Vue
  • Paper Christmas Trees by Maho Motoyama Take Holiday Boxes to a New Level
    www.thisiscolossal.com
    From single sheets of green paper, Los Angeles-based designer Maho Motoyama devises a veritable forest of Christmas tree-shaped boxes. Ranging from a few basic folds to elaborate, multifaceted constructions, each evergreen has a personality of its own based on its tiers and twists. Every one, of course, is topped with a bright yellow star.Motoyama has built a following for his intricate box-folding templates, creating tiny, hollow structures in a wide range of geometric shapes. Through painstaking precision and a puzzle-like approach to creating unique pieces, form takes precedence over function. Find tutorials on YouTube, detailed templates on X, and more fun shapes on Instagram.Do stories and artists like this matter to you? Become a Colossal Member today and support independent arts publishing for as little as $7 per month. The article Paper Christmas Trees by Maho Motoyama Take Holiday Boxes to a New Level appeared first on Colossal.
    0 Commentaires ·0 Parts ·78 Vue
  • 6 sneaky scams that could ruin your holiday season
    www.foxnews.com
    Published December 16, 2024 10:00am EST close CEO reveals top tips for avoiding scams this holiday giving season Avoid scammers and know who are donating to this giving season. Mary Hagen, a professional fundraiser and CEO of Colossal, is sharing her top three tips for supporting charitable organizations this holiday. The holiday season is a time filled with joy, festivities and cherished moments with family and friends. However, amidst the hustle and bustle of shopping, cooking and celebrating, it's easy to overlook a lurking danger: scams. Scammers thrive during this busy time, preying on our excitement and stress to trick us into revealing personal information or losing money. We're going to discuss six sneaky scams that could ruin your holiday spirit and provide you with essential tips on how to protect yourself from these deceptive tactics. Scam alert illustration (Kurt "CyberGuy" Knutsson)1) Package delivery scamWith the holiday season in full swing, the end-of-year sales have begun, and you probably have already started your holiday shopping and are expecting packages coming via different types of delivery services like FedEx, UPS or USPS. So, if you receive a text that mentions a package delivery, you may be likely to easily fall for a scam. I was expecting a package recently and received this text out of the blue (see image). Fake package delivery scam text (Kurt "CyberGuy" Knutsson)Even though the text says the sender is not in my contact list and that it may be junk, I almost clicked the link because I was so focused on the fact that there may have been a typo in my delivery address. But once I looked a little closer, there were a few red flags in this text message that tipped me off to it being a scam.First, the link does not lead you to usps.com. It's a fake link that scammers hope you won't notice.Notice it is uspsts.top and notusps.com. This is a common scam going around called typosquatting wherein a scammer uses a domain that looks close to a real website. Next, the text says "pls," which is lingo for "please" that you likely wouldn't see in correspondence from the USPS. Scammers often make typos or use poor grammar when communicating, so always double-check.Scammers are sending emails, texts and even occasionally there could be a phone call that is regarding an issue with package delivery. It may be something like this text I received that has a link where they'll end up asking for information, or you may be asked to pay a "shipping fee" to get your package.Be sure to always have strongantivirus software running on your devices to prevent any disasters from happening if you were to click on a malicious link.See my expert review of the best antivirus protection for your Windows, Mac, Android and iOS devices.How to avoid package delivery scamsIf you are expecting a package, and you're wondering if you've received real information or not about it, the best way to check is to go to the original confirmation you received about shipping. You most likely received an email regarding your package, and if you go to that email to get your order number, you should be able to look up the status of your order directly on any website. A woman shopping on her laptop (Kurt "CyberGuy" Knutsson)2) Charity scamsSadly, charity scams aren't new, but they are way more prevalent during the holiday season since scammers are hoping you're feeling more generous during this time of year. Sometimes, scammers may create fake names of organizations to get you to donate money, or they may reach out to you via phone/email/text posing as someone working for a legitimate charity. Social media has also become a popular place for charities to market themselves and reach more eyes in hopes of donations, so scammers may try to pose as fake charities. These schemes will try to appeal to your emotions during this season, so be sure to check where you donate your money so you don't fall for a scam.How to avoid charity scamsNever give your money to anyone immediately who approaches you or reaches out on behalf of any organization without doing your own independent research. Either do a little googling or check with a family member to see if it's real, and if it is, you should be able to donate to an official website or an official address. You can always mention this to anyone who asks you to donate somewhere. Don't fall into the pressure of donating right then and there. Also, always double-check the name of an organization. Sometimes (especially online), scammers will alter the name of a known organization slightly to trick you into donating.3)Social media gift exchange scamTheBetter Business Bureau is warning about a gift exchange scam with a new twist, which has been occurring during recent holiday seasons. It's an online version of the popular "Secret Santa" gift exchange. However, the BBB says these social media-driven gift exchanges are actually pyramid schemes, and you will most likely be disappointed if you participate.In the past few years, variations of the gift exchange have popped up, with someone asking you to select a random person and send them a gift to pay it forward. Another asks you to exchange bottles of wine with someone else, and while it seems fun and light-hearted, you don't know who is on the receiving end.How to avoid social media gift exchange scamsIt may sound nice to send a holiday gift to a stranger in turn for receiving multiple gifts yourself, but you're never going to receive many (if any) gifts at all.Don't participate in gift exchanges with anyone you don't know, or you won't be able to guarantee you'll actually be gifting someone who isn't a scammer.4) Gift card scamsGift card scams are another popular method that has been rising in popularity recently, but it's especially important to watch out for the possibilities, since you may be purchasing gift cards for friends or family for the holidays. Scammers often steal gift cards and use the information before they make it look like they didn't. They have a number of methods for tricking you using gift cards, so if you can send an online one (so that you can ensure you've purchased it on a legitimate, official website), that would be a much safer alternative.How to avoid gift card scamsIf you're getting anyone a gift card and buying it in person, be sure to check that the package hasn't been tampered with. Double-check that nothing on the packaging looks suspicious since scammers will try to make it seem like the package was sealed, but they will already have used the gift card, so you're essentially buying a useless piece of plastic. Illustration of a gift card (Kurt "CyberGuy" Knutsson)5) Home Depot email confirmation scamScammers are capitalizing on the festive spirit with a deceptive email campaign targeting people at this time of year.This scam involves a deceptive email that appears to be from Home Depot with such wording as "Confirmation needed: please confirm receipt." The email body typically contains enticing text like "Congratulations! The Home Depot - You are our winner!" along with a customer number and a blue circle that says, "Check if you won." Who couldn't use a little extra cheer or perhaps a holiday prize from Home Depot this season?The problem is this is a scam, and the goal of this scam is to lure you into clicking on an embedded link, which can lead to various malicious outcomes. These include phishing for personal and financial information, installing malware on your device, redirecting to a fake website that resembles Home Depot's or prompting you to pay a "delivery fee" for a non-existent prize.How to avoid Home Depot email scamsTo protect yourself from this and similar scams, scrutinize the sender's email address for any discrepancies. Hover over links without clicking to reveal their true destination. Be wary of unexpected "winnings" or requests for confirmation. If you receive an email that raises suspicion, contact Home Depot directly through their official website or customer service number to verify its legitimacy. Finally, remember that legitimate companies will not ask you to confirm sensitive information via email or require you to click on links to claim prizes. Fake Home Depot winning email (Kurt "CyberGuy" Knutsson)6) Fake online shopping sites scamOne of the most common scams during the holiday season is the fake online shopping site scam. Scammers create websites that look like legitimate online stores but are actually designed to steal your personal and financial information. They may offer products at very low prices or claim to have limited-time deals or exclusive items. They may also send youphishing emails or text messages with links to these fake sites. A woman shopping on her laptop (Kurt "CyberGuy" Knutsson)Some signs of a fake online shopping site are:The website address does not match the name of the store or brand.The website has poor design and/or spelling and grammar errors.The website does not have a secure connection(https) or a padlock icon in the address bar.The website asks for too much personal information, such as your Social Security number or bank account details.The website does not have a clear return policy, contact information or customer reviews.How to avoid falling victim to this scamBy following a few simple precautions, you can significantly reduce your risk of falling prey to online scams and ensure a safer shopping experience.1) Shop only from trusted and reputable online stores that you know and have used before.2) Check the website address carefully and look for any red flags.3) Do some research on the online store before making a purchase. Read customer reviews, look for ratings or search for complaints online.4) Use a credit card or a secure payment service like PayPal when shopping online. Do not use debit cards, wire transfers or gift cards.5) Keep track of your online purchases and monitor your bank statements for any unauthorized charges.6) Use strong antivirus protection software. An effective antivirus software is a must-have. The best way to protect yourself from clicking on any malicious links on fake websites or in phishing emails and text messages is to haveantivirus protection installed and actively running on all your devices.Its the best to help stop and alert you of any malware in your system and ultimately protect you from being hacked.See my expert review of the best antivirus protection for your Windows, Mac, Android and iOS devices.7) Use a personal data removal service. Scammers can obtain your information from various online sources, including data brokers, people search sites and public records. Using a data removal service can help reduce your digital footprint, making it harder for scammers to access your personal information. This proactive step can be crucial in preventing identity theft and minimizing the chances of falling victim to scams during the busy holiday season.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.I've been scammed! What to do next?Below are some next steps if you find you or your loved one is a victim of identity theft.1) If you can regain control of your accounts, change your passwords and inform the account provider2) Look through bank statements and checking account transactions to see where outlier activity started3)Use an identity theft protection service:Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.One of the best parts of using some services is that they might include identity theft insurance ofup to $1 million to cover losses and legal fees and a white-glove fraud resolution team where aU.S.-based case manager helps you recover any losses.See my tips and best picks on how to protect yourself from identity theft.4)Report any breaches to official government agencies like the Federal Communications Commission.5) Get the professional advice of a lawyerBefore speaking to law enforcement, especially when you are dealing with criminal identity theftIf being a victim of criminal identity theft leaves you unable to secure employment or housing6)Alert all three major credit bureaus and possibly place a fraud alert on your credit report.7) Run your own background check or request a copy of one if that is how you discovered your information has been used by a criminal.If you are a victim of identity theft, the most important thing to do is to take immediate action to mitigate the damage and prevent further harm.Kurt's key takeawaysAs we dive into the holiday season, lets keep our guard up against those sneaky scams that could spoil our celebrations. Remember to stay vigilant while shopping online or responding to unexpected messages. A little caution can go a long way in ensuring that your holidays remain joyful and stress-free. So, enjoy the festivities, cherish the moments with loved ones, and keep these tips in mind to outsmart the scammers.What are some of your personal experiences with holiday scams, and how did you protect yourself from them? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Commentaires ·0 Parts ·83 Vue
  • How to factory reset your Android
    www.foxnews.com
    close 'CyberGuy': How to factory reset your Android Tech expert Kurt Knutsson reveals how to securely back up and factory reset your Android to protect your privacy and data. Want to know how to factory reset your Android phone? Before handing over your old device, it's important to remove all traces of your personal information. This not only protects your privacy but also ensures the new owner receives a device in its original state, free from any of your custom settings or data. I've got you covered with a step-by-step guide to help you through the process, ensuring you don't miss a thing. Let's walk through it together. If you want to factory reset your iPhone, we'll take you through thesteps here. Android phone (Kurt "CyberGuy" Knutsson)How to back up your AndroidBefore we dive in, remember this golden rule: back up your data. A factory reset wipes everything clean, so let's make sure your precious memories and important files are safe and sound.Settings may vary depending on your Android phones manufacturer.Open theSettings appon your Android phoneTap onGoogleSelectManage backupToggle on where it saysBack up now Steps to back up your Android phone (Kurt "CyberGuy" Knutsson)Pro tip: You should charge your device to at least 70% before starting; you don't want your phone dying mid-reset.How to factory reset your AndroidAll right, let's get down to business. Here's how to factory reset your Android:Settings may vary depending on your Android phones manufacturer.From your Android's home screen, find and tap the Settings appScroll down and tapAdditional Settings (on some devices, this might be System orGeneral Management)TapBackup and Reset (or Reset on some models)Select Erase All Data (orFactory data reset)Scroll down and tapReset again to confirmYou may then be asked to enter yourcurrent PIN.You'll see a warning that this willdelete all your personal information and downloaded apps will be erased and can't be recovered.TapErase Data orDelete all to begin the process Steps to factory reset your Android phone (Kurt "CyberGuy" Knutsson)Your phone will restart and begin the reset, which might take a few minutes. Once it's done, you'll see the initial setup screen, just like when your phone was brand new. Also, after a factory reset, you may need to sign in with the Google account previously linked to the device for security purposes.How to factory reset your Android using Recovery ModeOK, lets say you want to factory reset your Android, but your phone is unresponsive, or you cannot access the settings. You can use "Recovery Mode."Settings may vary depending on your Android phones manufacturer.Start bypowering off your device completelyThen enter recovery mode by pressing and holding the volume up, home andpower buttons simultaneously (or justvolume up and power for some models) until you see the Android logo. Steps to factory reset your Android using Recovery Mode (Kurt "CyberGuy" Knutsson)Use thevolume buttons to scroll to Wipe Data or Perform a factory reset, then press thepower button to select it.Confirm the reset by selecting Yesdelete all user data, then confirm with thepower button.After the reset is complete, selectReboot system now. Steps to factory reset your Android using Recovery Mode (Kurt "CyberGuy" Knutsson)There you have it. By following these steps, you can successfully perform a factory reset on any Android device, ensuring a fresh start or preparing it for a new user. Once your device is clean, check out "Best ways to get rid of your old phone or tablet" for various options like trading it in for credit, donating to charity or recycling through certified e-waste programs.Kurt's key takeawaysFactory resetting your Android prepares your device for a new user or just starting fresh. Remember, it's a drastic measure that erases everything, so always back up your data first. Whether you're troubleshooting, starting fresh or passing your device on, now you've got the knowledge to do it right.Have you faced any challenges with data security, and how did you overcome them? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Commentaires ·0 Parts ·78 Vue
  • Private vs public AI: Which should your business use in 2025?
    www.computerweekly.com
    Imagine a Christmas where your business predicts market trends before they happen, streamlines operations effortlessly, and secures sensitive data with elf-like precision. This isn't a far-off dream it's the reality of artificial intelligence (AI) today. But AI is not a one size fits all solution there are different types of AI to consider, and steps to take to lay the groundwork for successful AI adoption. In fact, the AI industry value is projected to increase by over 13 times over the next six years due to the ever increasing advancements in this space. Two of these variations are private and public AI both with their own set of capabilities and drawbacks.As a business leader, you face a festive decision: should you harness the power of private AI, or leverage the vast resources of public AI? Public AI operates on hyperscale cloud-based platforms and tends to be accessible to multiple users and businesses. These platforms leverage vast amounts of data from various sources, providing powerful, general-purpose AI capabilities. However, this accessibility comes with trade-offs in terms of security and data privacy.Private AI, on the other hand, is tailored and confined to a specific organisation. It offers bespoke solutions, retrained to meet the unique needs of a business while ensuring data remains secure within the organisations cloud or private infrastructure. This approach mitigates the risks associated with public AI, such as unauthorised data sharing and security breaches.Security: One of the key advantages of private AI is enhanced security. By operating with a dedicated model and within a private environment, businesses can protect sensitive information and ensure compliance with data privacy regulations. This is particularly crucial for sectors handling confidential data, such as healthcare, fintech, and government agencies.Performance: Private AI can deliver a more tailored performance, customised to specific business requirements. With dedicated hardware, businesses can optimise AI workloads for speed and efficiency, leading to more accurate and timely insights.Control and customisation: Private AI offers greater control over the AI environment. Businesses can customise their AI models to align with their strategic goals and operational needs. This level of control is invaluable for developing bespoke solutions that drive competitive advantage this also provides a wider choice of customised models that can be deployed.These benefits might look tempting to business leaders, but its also important to consider the downsides.Costs: Implementing and maintaining private AI infrastructure can be expensive. The costs associated with dedicated hardware, specialised talent, and ongoing maintenance can be a significant barrier for smaller organisations.Complexity: Managing private AI requires a deep understanding of both AI technologies and the specific business context. This complexity can make it challenging to deploy and scale AI solutions effectively without the right technology partner.Scalability: While private AI offers tailored solutions, it may lack the scalability of public AI platforms. Businesses need to carefully plan their AI strategy to ensure they can scale their AI initiatives as needed without compromising performance or security.In 2024, we have seen significant advancements in AI infrastructure, making software more accessible and flexible, though hardware costs remain high. The trend towards making private AI more consumable for smaller players is expected to continue into 2025. Large organisations will continue to lead in adopting private AI, but we anticipate a shift towards more experimental and flexible AI environments, enabling businesses to develop and refine their AI capabilities internally.The introduction of regulatory frameworks like the General AI Bill will also shape the future of AI deployment. Businesses must ensure their AI models are trained on unbiased data and adhere to ethical standards, avoiding issues like AI hallucinations and misinformation.The 12 Days of AIOn the First day of AI, we explore how AI is being used in marketing, the benefits and key use cases, as well as concerns and how marketerscan best take advantage of the technology.On the Second Day of AI, we look at the importance of truly understanding what AI isto enable true organisational transformation.On the Third Day of AI, we explore some of the key trends to keep an eye on, and prepare for,in 2025.On the Fourth Day of AI, we discuss the value of adopting AI responsibly, and outlines how businesses can build responsible adoptioninto their plans.On the Fifth Day of AI, we explore how AI is reshaping HR boosting productivity, addressing concerns,and preparing organisations for the future.On the Sixth Day of AI, we explore how leveraging AI and cloud can enhance business performance and sharetips for successful implementation.On the Seventh Day of AI, we explore the double-edged sword of AI in cybersecurity and how businesses can protect themselvesagainst the cyber grinches.On the Eighth Day of AI, we explore the key considerations and strategic frameworks essential for extractingmaximum value from AI projects.On the Ninth Day of AI, we explore the critical role data plays in AI implementation and the key steps business leaders must take to prepare their datafor a successful AI future.On the Tenth Day of AI, we explore the evolving role of AI in managed services and what to expect in 2025.Adopting a hybrid AI approach, which combines the strengths of both private and public AI is an increasingly attractive proposition for business leaders. Using both ways of implementing AI can be a more accessible way to leverage certain private AI capabilities, while keeping costs and time investments to a minimum by supplementing with public AI. But adopting a hybrid approach to AI is not just a technology choice but a strategic business decision, and business leaders need to consider the following steps:Evaluate your AI needs: Assess the specific requirements of your business and determine where AI can add the most value. Identify the types of data you need to protect and the AI capabilities you require.Find the right partner: Collaborate with partners who understand the AI stack and can provide the necessary expertise and support. Look for partners with a proven track record in AI implementation and security.Focus on security and ethics: Ensure your AI solutions adhere to stringent security protocols and ethical guidelines. Implement secondary AI layers for fact-checking and to prevent AI-generated misinformation/hallucinations.Plan for scalability: Develop a roadmap for scaling your AI initiatives. Consider how you will manage and grow your AI infrastructure as your business needs evolve.By carefully considering these factors, businesses can effectively leverage AI technologies, harnessing the power of both private and public AI to drive innovation, enhance performance, and maintain a competitive edge. A hybrid approach to AI is not merely a Christmas toy; it is a strategic imperative for businesses aiming to thrive in the AI-driven future.Chris Folkerd is director of core infrastructure at ANS, a digital transformation provider and Microsofts UK Services Partner of the Year 2024. Headquartered in Manchester, it offers public and private cloud, security, business applications, low code, and data services to thousands of customers, from enterprise to SMB and public sector organisations.
    0 Commentaires ·0 Parts ·74 Vue
  • Top 10 business applications stories of 2024
    www.computerweekly.com
    Blue Planet Studio - stock.adobeNewsTop 10 business applications stories of 2024Business applications are now AI-enabled, but it is not easy to deploy these products successfully to improve business metrics ByCliff Saran,Managing EditorPublished: 16 Dec 2024 17:50 There is no denying the impact artificial intelligence (AI) in particular, generative AI (GenAI) is having on business applications. In many ways, the intensity of industry excitement over AI suggests the technology is at the peak of the Gartner hype cycle, which means businesses are about to realise how complex doing AI well really is.The challenge for many is finding use cases that can deliver a fast return on investment and scale beyond a pilot roll-out cost-effectively. This is particularly relevant when deploying applications that use large language models (LLMs) as costs can quickly escalate.From what Computer Weekly is seeing, there appears to be a shift in business away from public LLMs to small language models and AI models that can be tuned and run on-premise.A key message coming from industry experts with regards to training AI using internal data sources is that the data needs to be of high quality. Enterprise data is often spread across multiple applications and there is generally no single version of the truth. Trying to consolidate data into one store can be a challenge as applications are owned by different areas of the business and a single data architecture may not seem like a high priority.AI is often linked to enterprise resource planning (ERP) providers strategies to migrate customers onto their cloud services. This can be a challenge for many organisations, which tend to run heavily customised versions of an ERP system. Migrating these customisations is extremely costly, even when the project goal is not to customise the software. For instance, when Birmingham City Council began a migration from an SAP ERP system it had been running for years, the project to move to Oracle cost the council millions more than had been budgeted for. The migration also needed manual steps, which prevented the council from completing its annual financial report, leaving a gaping hole in its budget.One of the issues IT leaders face during a multi-year ERP upgrade project is that the software acquired at the start of the project may not be what is needed a year or so later. IT leaders have always needed to deal with shelfware. Sometimes, software providers offer tempting discounts on product bundles. However, while the purchase price may be tempting, ongoing software maintenance can quickly erode these savings.Third-party support providers can offer a way to reduce these ongoing costs and help IT departments keep older enterprise software platforms running for longer. In effect, the third party software support provider has access to any of the patches and support documentation a customer has downloaded, before they switch over. After switching, subsequent patches and support are no longer available from the software provider. However, given that many of the products that move to third-party support have been run for several years, entirely new issues that require code changes are unlikely.Here are Computer Weeklys top 10 business applications articles this year.control of SaaS costsThe ease with which someone with a corporate credit card can buy a software-as-a-service (SaaS) product can lead to runaway costs and data leakage risks.VMware cost increases after Broadcom ends discountsUK non-profit London Grid for Learning and Belgian university KU Leuven are just two of the academic organisations facing huge licensing cost increases after Broadcom scraps VMware academic discount scheme.failed Birmingham Oracle implementationBirmingham City Councils Oracle system the biggest of its kind in Europe went live in April 2022, resulting in a catastrophic IT failure.GenAI in actionMany organisations are testing out uses for generative AI, but how are they getting on? We speak to five early adopters to find out the lessons learned so far.long-term SAP Rise strategyIndependent UK and Ireland SAP User Group chair describes upgrade as a marathon, not a sprint, but says SAP Rise is also inevitable.AI readiness: What is it, and is your business ready?Artificial intelligence readiness encompasses all the elements, processes and steps needed to prepare an organisation to implement AI systems.AI assurance platform for enterprisesThe platform is designed to drive demand for the UKs artificial intelligence assurance sector and help build greater trust in the technology by helping businesses identify and mitigate a range of AI-related risks.AI platform for business transformationWe report on how a deal between ServiceNow and Rimini Street may offer IT leaders an alternative route to enterprise AI.customer experienceThe flag carrier of the Philippines discusses how its digital transformation journey has improved customer experience and streamlined internal processes.Open source is not a trust issue, its an innovation issueBusinesses are seeing greater value from open source software, such as greater levels of productivity and reduced operational costs.In The Current Issue:CIO interview: Steve OConnor, Aston MartinNCSC boss calls for sustained vigilance in an aggressive worldDownload Current IssueMicrosoft Copilot: A Year of Learning Write side up - by Freeform DynamicsPrint Industry Trends, 2025 Quocirca InsightsView All Blogs
    0 Commentaires ·0 Parts ·58 Vue
  • This powerful firewall delivers enterprise-level security at a home office price
    www.zdnet.com
    Jason Perlow/ZDNETZDNET's key takeawaysThe Firewalla Gold Pro is available now for $889.It offers enterprise-level security with high performance, advanced features like deep packet inspection and multi-WAN support, and user-friendly configuration.It's larger and more expensive than basic consumer firewalls, requires an external access point for Wi-Fi monitoring, and may require advanced configuration knowledge for some features.In 2022,I upgraded to the fastest residential broadband available-- 2 Gbps fiber. As we approach the end of 2024, internet service providers (ISPs) are pushing the limits, offering speeds up to a staggering 10,000 Mbps (10 Gbps). Fiber internet remains the gold standard for speed and reliability in the US, with top providers offering ultra-fast plans:AT&T:Up to 5,000 MbpsGoogle Fiber:Up to 8,000 MbpsXfinity:Up to 10,000 Mbps details View at Firewalla Such high speeds are crucial if you work with large data volumes, like video editors, 3D modelers, and organizations using Generative AI that need fast data transfer at the edge of their networks. Many of these users also require fast, reliable VPN connections. While a computer can initiate aVPN, it consumes significant processing power, affecting performance. A dedicated device for continuous site-to-site VPN connections ensures encrypted data is processed efficiently, maintaining near-wired speeds. Standard broadband gateway devices from ISPs usually include simple NAT routers with basic rules but lack advanced packet processing, VPN management, and threat detection. For users with high-speed broadband, a dedicated hardware firewall is essential. Traditional high-speed firewalls from SMB and enterprise vendors are often prohibitively expensive, designed for large sites, requiring extensive networking knowledge, and costly ongoing updates and management subscriptions. Also: How to secure your home and office network: The best DNS blockers and firewallsEnter Firewalla, a company founded by former Cisco engineers. Firewalla aims to make unified threat management accessible for small and home offices and remote professionals. Its products offer high-speed firewall solutions that are both user-friendly and cost-effective. Having extensively used and recommended Firewalla products, I was eager to review the company's latest offering -- theFirewalla Gold Pro. I had high expectations, but this new device still managed to impress. Here's an overview of the current Firewalla product line to help you choose the best model for your needs. FeaturePurple SEPurpleGold SEGold PlusGold ProEthernet Interfaces500 Mbps1 Gbps2 x 2.5 Gbps and 2 x 1 Gbps4 x 2.5 Gbps2 x 10 Gbps and 2 x 2.5 GbpsDeep Packet Inspection500 Mbps1 Gbps2 Gbps5 Gbps10 GbpsVPN SupportBuilt-in VPN server and clientBuilt-in VPN server and clientBuilt-in VPN server and clientBuilt-in VPN server and client2 Gbps WireGuard, Built-in VPN server and clientVPN Speed220 Mbps WireGuard, 60 Mbps OpenVPN500 Mbps WireGuard, 120 Mbps OpenVPN350 Mbps WireGuard, 100 Mbps OpenVPN500 Mbps WireGuard, 120 Mbps OpenVPN2 Gbps WireGuard, 500 Mbps OpenVPNProtection from CyberattacksYesYesYesYesYesNetwork InsightsYesYesYesYesYesData SafeguardingYesYesYesYesYesDynamic Content FilteringYesYesYesYesYesMonitor & Control Internet UsageYesYesYesYesYesAd BlockingYesYesYesYesYesNetwork SegmentationYesYesYesYesYesSmart QueueAdvancedAdvancedAdvancedAdvancedAdvancedMulti-WANNoNoYesYesYesNo Monthly FeesYesYesYesYesYesTargeted End CustomerHome users with basic needsHome users and small businessesSMB and advanced home usersPower users and SMBSMB and advanced power usersPrice$229$359$449$589Under $900SummaryCost-effective entry-level security with essential features and 500 Mbps speedsIdeal for those needing robust protection and 1 Gbps speeds without enterprise complexityStrong performance for demanding setups with advanced features like Multi-WANHigh-performance model with advanced features like Multi-WAN, ideal for demanding usersTop-tier model for maximum performance and securityThe Firewalla Gold Pro is the company's largest and heaviest product, built with solid metal for durability and enterprise-grade quality. Weighing 38.5 oz (1,090 g) and measuring 8.54 x 6.5 x 1.69 inches (21.7 x 16.5 x 4.3 cm), it meets the robust standards of SMB-level network equipment. Despite its size, the Gold Pro operates efficiently and silently with a 110V AC power brick, drawing up to 33W.While it functions well in typical residential and small office setups, it's best to connect the Firewalla Gold Pro to a pure sine wave UPS to protect against power fluctuations. The unit is fan-cooled but should be placed in a well-ventilated area, as the aluminum case can reach up to 140F when fully loaded, especially in warmer environments. An optional rackmount enclosure is available to integrate the Gold Pro into a standard datacenter-style rack.The Firewalla Gold Pro includes two 10 Gbps ports (one typically used for WAN but configurable) and two 2.5 Gbps ports. I recommend supplementing it with an additional 10 Gbps or 5 Gbps switch for optimal performance.In my setup:The 10 Gbps WAN connection is linked to a 5 Gbps Ethernet port on my AT&T BGW320 fiber gateway.Another 10Gbps port connects to a 16-port 10 Gbps switch, linking servers, Wi-Fi 6E access points, a 5 Gbps high-speed desktop switch in my office, and storage.This configuration maximizes the Firewalla Gold Pro's performance and ensures optimal connectivity across my network. Installation Network statistics in the Firewalla Gold Pro app for iOS (iPad) Jason Perlow/ZDNETThanks to the iOS and Android smartphone apps, setting up the Firewalla Gold Pro is straightforward. The setup and configuration procedure uses Bluetooth, which is provided if Ethernet connectivity is disrupted or the device needs to be managed or reconfigured out of band.When the app prompts you during initial setup, scan the QR code on the bottom of the device to pair it with the app. If you're an existing Firewalla user, you can "clone" your current configuration, preserving all settings, including rules, device groupings, segmentation, and ISP configurations. In my case, selecting "Replace Device" made the process seamless.New users must choose between "Router Mode" and "Transparent Bridge Mode":Router Mode: Firewalla functions as the primary router, managing all network traffic with full functionality.Transparent Bridge Mode:I recommend Router Mode because Transparent Bridge Mode disables key Layer 3 (IP layer) services like VPN Client, Policy-Based Routing, Smart Queue, Site-to-Site VPN, and Device Monitoring. If you opt for Router Mode, the setup may vary slightly depending on your ISP. Firewalla provides detailed documentation for various ISPs.For example, as an AT&T Fiber user, I needed to configure my gateway forIP Passthrough, allowing Firewalla to manage the network. This involved logging into the gateway, navigating to the Firewall menu, selecting "IP Passthrough," choosing "DHCPS-fixed," and selecting the Firewalla device from a dropdown list. Once configured, all traffic is routed through Firewalla, bypassing the gateway's router functions.Also:How to change the DNS settings on your Windows PC - and why you'd want toOne limitation is that Firewalla cannot monitor the built-in Wi-Fi of a residential gateway. Even in IP Passthrough mode, devices connected directly to the gateway's Wi-Fi bypass Firewalla's protection. To avoid this, dedicate a Wi-Fi access point behind Firewalla for all wireless connections. For smaller households or offices, a consumer-grade Wi-Fi router or mesh node in "bridge" mode (not NAT) also works well -- I previously used a three-node Eero Pro 6 mesh setup with Firewalla Gold, which worked flawlessly. The key is to avoid a double-NAT scenario. Firewalla should handle primary NAT, create your IP scope and segments, and act as your DHCP server.Firewalla Gold's Pro's performance Firewalla Gold Pro performance on 2Gbps AT&T Fiber connection in the Firewalla app for iOS (iPad) Jason Perlow/ZDNETOnce configured in Router Mode or Transparent Bridge Mode, the Firewalla Gold Pro intercepts all traffic at the deep packet inspection level. Thanks to its powerful Intel 12th-generation processor and 8GB of RAM, this process occurs without any performance loss.Also:Firewalla launches Purple: Its must-have network security deviceIn our tests on a 2 Gbps AT&T Fiber service, the fastest available to us, we successfully pushed the broadband connection to its 2 Gbps limit. Internal tests achieved Ethernet link speeds of 10 Gbps, with data transferring at that rate.Significantly, we pushed WireGuard connections beyond 1 Gbps to a metropolitan-connected Linux host in a test cloud region, limited only by the target system's broadband capacity. Live throughput of monitored devices on the Firewalla Gold Pro, in the Firewalla app for iOS (iPad) Jason Perlow/ZDNETThe smartphone app provides a detailed view of historical WAN and WiFi performance and live throughput for every device on the network. The system also runs periodic tests to verify whether your provider delivers the advertised speeds. Network protection overview Blocked flows as viewed through Firewalla MSP Jason Perlow/ZDNETI've found that Firewalla's security intelligence system, both on the device and in the cloud, is incredibly robust. The company tracks over 129 million security objects, including IP/domain histories and other critical data, and enables the device to effectively safeguard your network, constantly adapting to new threats as they emerge.When it comes to protection, Firewalla's approach is comprehensive. All data packets are meticulously filtered through multiple layers, including Block Lists, Ad Block Lists, and Static and Dynamic Block Lists, alongside IDS/IPS (Intrusion Detection/Prevention) and the Behavior Module. This multi-layered strategy gives you a continuous sense of security, knowing that known and emerging threats are being addressed.One feature I particularly appreciate is the pre-configured Target Lists that come with each Firewalla device, like OISD and Log4j attackers, which automatically block malicious websites and IPs. Additionally, the ability to create custom target lists means I can tailor the protection to fit my specific needs, making the experience even more personalized.Also: Firewalla hands-on: Easy to set up with plenty of features to help protect your home networkFirewalla also makes it easy to manage devices on the network. It automatically detects all devices and groups them by function (e.g., "Computers," "IoT"), which simplifies applying rules across multiple devices. This is especially handy for devices with MAC randomization, like iPhones using private Wi-Fi addresses. Disabling this feature has improved visibility and made it easier to apply rules.The IDS/IPS system is another critical layer of defense in my network. It detects and blocks unauthorized access attempts, like SSH intrusions or known exploits such as Heartbleed, which should give any network security professional at an SMB peace of mind. Firewalla device management view (iPad) Jason Perlow/ZDNETFinally, the Behavior Module stands out as a vigilant guardian. It monitors network traffic for unusual patterns, such as a typically low-traffic device suddenly sending large amounts of data. When this happens, the module sends an alert, allowing you to address potential threats before they escalate.It's this kind of proactive monitoring that has really reinforced my trust in Firewalla.Configuration and management Security dashboard in Firewalla MSP Jason Perlow/ZDNETOne of the things I appreciate about Firewalla products is how user-friendly they are, especially for a small office and home office setup like mine. The initial configuration through the Firewalla smartphone app is straightforward, and for most tasks, it's all I need. For more detailed management, the my.firewalla.com website provides a handy dashboard for viewing flows, configuring rules, and monitoring network activity.In April 2023, Firewalla introduced the Managed Security Portal (MSP) subscription service, which offers even greater functionality. While the MSP service has various plans, the Free plan with 24-hour flow storage for a home office is probably sufficient. It covers basic network management well and offers enough visibility into network activity for my needs. More advanced home users and small businesses who require more extended visibility into their flow data might want to go with the 30-day flow plan, which is only $39 per year.Also: Upgrading my network to 2.5Gbps with the fastest small business and residential firewall: Firewalla Gold PlusFor organizations with multiple Firewalla devices and branches, Firewalla's MSP also offers different seat options depending on how much detail you need to monitor your devices. The No Flows Seat works fine for basic monitoring, but there are options for more in-depth analysis if you need it. MSP also provides VPN Mesh capabilities to link your branch networks over the internet using encrypted tunnels with WireGuard.Even though MSP adds many new features, I still find that certain configurations, like VPN settings and live network monitoring, are best handled through the smartphone app. It's a good balance between ease of use and advanced features.ZDNET's buying adviceTheFirewalla Gold Prois an exceptional choice if you need powerful, high-performance network protection without the complexity and cost typically associated with enterprise-grade firewalls. With its robust build quality, advanced features like deep packet inspection, and seamless configuration through an intuitive app, the Gold Pro delivers enterprise-level security and performance in a package accessible to small offices, home offices, and power users.Whether you're pushing the limits of your fiber connection, managing extensive VPNs, or securing a complex home network, the Firewalla Gold Pro excels in every category. The recent introduction of the MSP service adds even more flexibility and control, making it easier than ever to manage your network.For anyone looking to future-proof their network with a versatile and user-friendly firewall solution, the Firewalla Gold Pro is a top contender, offering unparalleled value and performance.Featured reviews
    0 Commentaires ·0 Parts ·52 Vue
  • The best security keys of 2024: Expert tested
    www.zdnet.com
    Since data breaches are now a daily problem, traditional username and password combinations are nowhere near enough to protect online accounts.Many online service providers now enforce alternative ways to secure accounts. Two-factor and multi-factor authentication (2FA/MFA) methods have become widely adopted alongside passwordless authentication methods in the enterprise. Another option is to verify yourself using a physical security key. Even if a cybercriminal has obtained your username and password or compromised your mobile device, they won't be able to access your data without the key. Security keys are affordable and user-friendly, prevent phishing attacks, and are significantly more secure than SMS-based two-factor authentication. What is the best security key right now? ZDNET's favorite security key is the Yubico YubiKey 5 NFC. It offers excellent security and convenience, making it a worthwhile investment for anyone looking to safeguard their online accounts. This key is compatible with a vast array of protocols and can be configured to provide easy authentication on mobile.ZDNET has tested many security keys throughout the years and frequently tracks market developments and changes. Many of us use security keys ourselves and lean upon our personal experience, customer feedback, and extensive research to shape our recommendations. Below, you will find our top picks for security keys in 2024. Sort by All Best security keys of 2024 Show less View now at Amazon The YubiKey 5 NFC combines useful USB-A connectivity with the versatility of wireless NFC, enabling broad compatibility with a wide range of devices.It is FIDO-certified, which allows it to work with Google Chrome and any FIDO-compliant application on Windows, macOS, or Linux. In addition, its NFC capability makes it compatible with iOS and Android mobile devices, giving you the option to authenticate quickly via your smartphone or tablet. Overall, this makes the YubiKey 5 NFC an excellent option for consumers and businesses alike.The YubiKey USB authenticator has multi-protocol support, including FIDO2, FIDO U2F, Yubico OTP, OATH-TOTP, OATH-HOTP, smart card (PIV), OpenPGP, and challenge-response capabilities, providing solid hardware-based authentication. Considering it is dust, water, and tamper-proof, this key is a great all-rounder for your security needs.Each key costs $50. Customer feedback indicates that this popular key is an excellent option, although you will need some rudimentary technological knowledge to use it effectively.Yubico YubiKey 5 NFC features:USB-A and NFC compatibility |Compact design | No battery required | Water, dust, and tamper-resistant | FIDO certified | Multi-protocol support | Compatible with iOS and Android mobile devices through NFC Pros Broad versatility NFC makes it compatible with both iPhone and Android devices Cons Expensive, especially if you need two Technical knowledge may be required The YubiKey 5 NFC combines useful USB-A connectivity with the versatility of wireless NFC, enabling broad compatibility with a wide range of devices.It is FIDO-certified, which allows it to work with Google Chrome and any FIDO-compliant application on Windows, macOS, or Linux. In addition, its NFC capability makes it compatible with iOS and Android mobile devices, giving you the option to authenticate quickly via your smartphone or tablet. Overall, this makes the YubiKey 5 NFC an excellent option for consumers and businesses alike.The YubiKey USB authenticator has multi-protocol support, including FIDO2, FIDO U2F, Yubico OTP, OATH-TOTP, OATH-HOTP, smart card (PIV), OpenPGP, and challenge-response capabilities, providing solid hardware-based authentication. Considering it is dust, water, and tamper-proof, this key is a great all-rounder for your security needs.Each key costs $50. Customer feedback indicates that this popular key is an excellent option, although you will need some rudimentary technological knowledge to use it effectively.Yubico YubiKey 5 NFC features:USB-A and NFC compatibility |Compact design | No battery required | Water, dust, and tamper-resistant | FIDO certified | Multi-protocol support | Compatible with iOS and Android mobile devices through NFC Read More Show Expert Take Show less Show less View now at Amazon The FIDO2 is a USB-A key that functions with the latest Chrome browser and operating systems such as Windows, macOS, or Linux. This option also has backward compatibility with online services complying with U2F protocols.FIDO2 provides passwordless authentication using the FIDO and HOTP protocols. You'll find the most compatibility with desktop and PC applications as there are marginally more restrictions with iOS and Android functionality. What makes this key stand out, however, is how easy it is to setup, making it a great option for first-time security key users.The key is designed with a 360-degree rotating metal cover, shielding the USB connector when not in use. It is also made from durable aluminum alloy to safeguard it against drops, bumps, and scratches.Overall, this security key is reasonably priced at $25. However, it does not have advanced features such as a fingerprint reader, and you will want to buy more than one. Despite this, customers like its sleek and discreet design and find it easy to set up and use.Thetis Fido U2F Security Key features:Tough and durable alloy shell |360-degree design with rotating aluminum alloy cover | Looks like a USB flash drive | Backward-compatible with U2F protocol | Compatible with latest Chrome browser on Windows, macOS, and Linux Pros Great price Discreet design Sturdy Cons No NFC so no support for iPhone and Android Doesn't support macOS logins The FIDO2 is a USB-A key that functions with the latest Chrome browser and operating systems such as Windows, macOS, or Linux. This option also has backward compatibility with online services complying with U2F protocols.FIDO2 provides passwordless authentication using the FIDO and HOTP protocols. You'll find the most compatibility with desktop and PC applications as there are marginally more restrictions with iOS and Android functionality. What makes this key stand out, however, is how easy it is to setup, making it a great option for first-time security key users.The key is designed with a 360-degree rotating metal cover, shielding the USB connector when not in use. It is also made from durable aluminum alloy to safeguard it against drops, bumps, and scratches.Overall, this security key is reasonably priced at $25. However, it does not have advanced features such as a fingerprint reader, and you will want to buy more than one. Despite this, customers like its sleek and discreet design and find it easy to set up and use.Thetis Fido U2F Security Key features:Tough and durable alloy shell |360-degree design with rotating aluminum alloy cover | Looks like a USB flash drive | Backward-compatible with U2F protocol | Compatible with latest Chrome browser on Windows, macOS, and Linux Read More Show Expert Take Show less Show less View now at Amazon The Yubico YubiKey 5 Nano is a discreet, tiny security key that provides the features you need to lock your devices and services while you're on the road. The key supports PCs and other devices via USB-A and is compatible with the Yubico Authenticator app. However, keep in mind that there is no USB-C support.This security key is compatible with various password managers, including 1Password, Keeper, and LastPass Premium, IAM platforms, cloud storage apps, and social media accounts. The Yubico YubiKey 5 Nano will likely work if an application is FIDO-certified.It is also tamper, dust, and water-resistant. Customer feedback shows that users find the key works well across multiple platforms and consider it straightforward to set up and use.Priced at $60, this is slightly more expensive than many on the market, but if you're looking for one of the smallest, portable, and most discreet keys on the market, this could be the right option for you.Yubico YubiKey 5 Nanofeatures:FIDO, FIDO2 certified |Multi-protocol| Supports USB-A | Protects against phishing and cyber attacks | IP68 rated | 1GB memory Pros Water and dust resistant Easy setup FIDO certified Small form factor Cons Expensive No NFC compatibility The Yubico YubiKey 5 Nano is a discreet, tiny security key that provides the features you need to lock your devices and services while you're on the road. The key supports PCs and other devices via USB-A and is compatible with the Yubico Authenticator app. However, keep in mind that there is no USB-C support.This security key is compatible with various password managers, including 1Password, Keeper, and LastPass Premium, IAM platforms, cloud storage apps, and social media accounts. The Yubico YubiKey 5 Nano will likely work if an application is FIDO-certified.It is also tamper, dust, and water-resistant. Customer feedback shows that users find the key works well across multiple platforms and consider it straightforward to set up and use.Priced at $60, this is slightly more expensive than many on the market, but if you're looking for one of the smallest, portable, and most discreet keys on the market, this could be the right option for you.Yubico YubiKey 5 Nanofeatures:FIDO, FIDO2 certified |Multi-protocol| Supports USB-A | Protects against phishing and cyber attacks | IP68 rated | 1GB memory Read More Show Expert Take Show less Show less View now at Amazon An alternative Yubico security key is the $29 C NFC model. The USB-C key is best suited for small businesses that want to implement physical 2FA procedures without spending a fortune.The key is compatible with Android, Windows 10, and iOS devices, as well as services such as AWS, Okta, Google accounts, Apple iCloud, Microsoft, Salesforce, and Cloudflare.These "tap and go" models do not support the Yubico Authenticator app. Instead, they have been designed for affordability and rapid security checks via USB-C, NFC, and FIDO protocols (a 5 series model is best suited if you want more extensive features).The company also offers a Yubico subscription to businesses that want to provide their teams with keys, so this could be the best solution for businesses that need to provide their teams with physical security keys. Customers say the key 'just works', but customer support could be improved.Yubico Security Key C NFC features:FIDO certified, FIDO2/U2F compatible| USB-C | NFC connectivity | No battery required | Suitable for Android, Windows 10, iOS devices and apps | Defends against phishing and account takeovers Pros Slim, lightweight design IP68 rated Subscription alternatives available Cons Only supports FIDO protocols An alternative Yubico security key is the $29 C NFC model. The USB-C key is best suited for small businesses that want to implement physical 2FA procedures without spending a fortune.The key is compatible with Android, Windows 10, and iOS devices, as well as services such as AWS, Okta, Google accounts, Apple iCloud, Microsoft, Salesforce, and Cloudflare.These "tap and go" models do not support the Yubico Authenticator app. Instead, they have been designed for affordability and rapid security checks via USB-C, NFC, and FIDO protocols (a 5 series model is best suited if you want more extensive features).The company also offers a Yubico subscription to businesses that want to provide their teams with keys, so this could be the best solution for businesses that need to provide their teams with physical security keys. Customers say the key 'just works', but customer support could be improved.Yubico Security Key C NFC features:FIDO certified, FIDO2/U2F compatible| USB-C | NFC connectivity | No battery required | Suitable for Android, Windows 10, iOS devices and apps | Defends against phishing and account takeovers Read More Show Expert Take Show less Show less View now at Amazon The Kensington Verimark Fingerprint Key utilizes advanced biometric technology, offering excellent performance, 360-degree readability, and anti-spoofing protection.With Microsoft's built-in Windows Hello login feature, you can log into your Windows computer using your fingerprint. Users can store up to 10 fingerprints, allowing multiple individuals to access the same computer without remembering different usernames or passwords.The Kensington Verimark Fingerprint Key is FIDO U2F certified, meaning your fingerprint can be used as a second-factor authentication to secure cloud-based accounts such as Google, Dropbox, GitHub, and Facebook.You may need to download additional drivers from Kensington's website for different Windows operating systems, and some users report recognition problems. However, it is still a top choice -- especially as the key is available for only $19.Kensington Verimark Fingerprint Key features:Built-in biometrics for added security | Compatible with Windows Hello login feature | Compact and unobtrusive design | Stores up to 10 different fingerprints | FIDO U2F certified for cloud-based account security Pros Compact and unobtrusive Built-in fingerprint reader Affordable Cons USB-A only No support for macOS and ChromeOS May need to download additional drivers The Kensington Verimark Fingerprint Key utilizes advanced biometric technology, offering excellent performance, 360-degree readability, and anti-spoofing protection.With Microsoft's built-in Windows Hello login feature, you can log into your Windows computer using your fingerprint. Users can store up to 10 fingerprints, allowing multiple individuals to access the same computer without remembering different usernames or passwords.The Kensington Verimark Fingerprint Key is FIDO U2F certified, meaning your fingerprint can be used as a second-factor authentication to secure cloud-based accounts such as Google, Dropbox, GitHub, and Facebook.You may need to download additional drivers from Kensington's website for different Windows operating systems, and some users report recognition problems. However, it is still a top choice -- especially as the key is available for only $19.Kensington Verimark Fingerprint Key features:Built-in biometrics for added security | Compatible with Windows Hello login feature | Compact and unobtrusive design | Stores up to 10 different fingerprints | FIDO U2F certified for cloud-based account security Read More Show Expert Take Show less Show less View now at Google The Google Titan security key line, which supports up to 250 passkeys, is an affordable way to bolster your online security. The $30 key is USB-C-compatible and a USB-C to USB-A adapter is included for legacy devices.This stylish option is based on FIDO standards, and it can connect most Android and iOS devices, as well as most devices able to run Google Chrome. If you're looking for a key suitable for most platforms, including Google services, this key is for you -- and as a bonus, it is reasonably priced.Titan security keys are compatible with Google's Advanced Protection Program, a scheme you may be required to join if you are considered at higher risk of cyberattacks -- including phishing and email-based attacks -- than the average consumer. Compatibility requirements are listed here. Setup is easy, but we've found that, on occasion, you may end up in verification loops when you try to register a new device with your key.Google Titan security key features:FIDO-certified security key |USB-A/NFC, USB-C/NFC |USB-C to USB-A adapter | Supports 250 passkeys | Multi-platform | Works with Google's Advanced Protection Program Pros High security standards USB-C adapter included Affordable Cons No biometrics The Google Titan security key line, which supports up to 250 passkeys, is an affordable way to bolster your online security. The $30 key is USB-C-compatible and a USB-C to USB-A adapter is included for legacy devices.This stylish option is based on FIDO standards, and it can connect most Android and iOS devices, as well as most devices able to run Google Chrome. If you're looking for a key suitable for most platforms, including Google services, this key is for you -- and as a bonus, it is reasonably priced.Titan security keys are compatible with Google's Advanced Protection Program, a scheme you may be required to join if you are considered at higher risk of cyberattacks -- including phishing and email-based attacks -- than the average consumer. Compatibility requirements are listed here. Setup is easy, but we've found that, on occasion, you may end up in verification loops when you try to register a new device with your key.Google Titan security key features:FIDO-certified security key |USB-A/NFC, USB-C/NFC |USB-C to USB-A adapter | Supports 250 passkeys | Multi-platform | Works with Google's Advanced Protection Program Read More Show Expert Take Show less What is the best security key? As testers of security keys over the years, we recommend the Yubico YubiKey 5 NFC as the best security key available on the market today. It offers unbeatable security and convenience, making it a worthwhile investment for anyone looking to safeguard their online accounts. However, if this one doesn't suit you, the key features of our other favorites are listed below.Security keyPriceConnector typeNFC supportBluetooth supportWaterproofingSupported servicesCompatible devicesYubico YubiKey 5 NFC$50USB-A and NFCYesYesWater- and dust-resistantGoogle Chrome, FIDO-compliant appsWindows, macOS, Linux, iOS, AndroidThetis Fido U2F Security Key$25USB-ANoNoN/AU2F servicesWindows, macOS, LinuxYubico YubiKey 5 Nano$60USB-ANoNoIP68 water- and dust-resistantU2F and FIDO2 servicesWindows, macOS, LinuxYubico Security Key C NFC$29USB-C and NFCYesYesIP68 water- and dust-resistantFIDO-enabled servicesWindows, Android, iOSKensington Verimark Fingerprint Key$19USB-ANoNoN/AGoogle, Dropbox, GitHub, Facebook, and moreWindowsGoogle Titan security key$30USB-C, NFC, and BluetoothYesYesNo official IP ratingFIDO, Google Chrome services, various appsWindows, macOS, Android, Google Chome compatible devicesNote: Prices and compatibility information may vary based on location and specific devices. This table is based on the information provided in the given descriptions and is subject to change. Show more What's the right security key for you? Choose this security keyIf you wantYubico YubiKey 5 NFCThe best security key out there with broad versatility and compatibility. This FIDO-certified key is an excellent all-rounder with multi-platform compatibility.Thetis Fido U2F Security KeyA cheap, no-frills, tough USB-A security key suitable for beginners. It has a rather stylish design but does lack advanced features.Yubico YubiKey 5 NanoA high-quality, extremely small security key. This key is a great option if you want a security solution you can take with you on your travels thanks to its tiny form factor.Yubico Security Key C NFCThe best value key for small business, considering its compatibility with services including AWS, Okta, Google accounts, Apple iCloud, Microsoft, and Cloudflare.Kensington Verimark Fingerprint KeyA simple USB-A security key with built-in biometrics. This key is discreet, compact, and user-friendly, although it has limited compatibility.Google Titan security keyAn affordable, multi-platform key suitable for Chrome and Google services, Android, and iOS apps . Users can store up to 250 passkeys. Show more Factors to consider when choosing a security key Security keys are an investment in time and money and so it is best to select the right one for you before you connect one to your online accounts, especially as rolling back this decision can be a lengthy process. While you're deciding what security key is right for you, consider the following factors:Service compatibility: Ensure that the key you're interested in is compatible with your primary services, such as your email provider or business tools and platforms.One, or two?: We recommend that you purchase a key and a backup. You can often buy two packs of security keys, but in some cases, you may have to spend more. A backup key that you can store in a safe place is crucial to ensuring you aren't accidentally locked out of your accounts.Security standards: Security keys should adhere to modern security standards, including FIDO2. Check that your choice meets these standards to ensure you receive the best protection possible.Connectivity: Hardware-based security keys use different forms of connectivity, so you should consider what type works best for you, whether USB-based, Bluetooth, or NFC.Hardware: You might need hardware that complies with particular standards or has specific ports for connecting to your devices, so check on your key's specifications before purchase.Environment: If you plan to keep a security key with your house or car key, for example, opt for a model that is resistant to dust, water, and shocks. This may be especially important if you often travel. Price: Choose a security key that matches your budget, keeping in mind you will need to buy two if you want a backup key. Show more How did we choose these security keys? Extensive research has been conducted on every security key that is listed here across a wide range of devices and services. In some cases, this includes testing the keys on different operating systems, web browsers, and services to ensure they work smoothly and efficiently.It was also important to analyze the feedback left by other users who have purchased and used these keys over time. This has helped to determine the long-term reliability of each key and to identify any potential compatibility issues that users might encounter.Our main criteria for selecting these security keys are:Ease of use: There is often a learning curve associated with adopting a new security mechanism or gadget. We wanted to ensure that the next security key you buy is as close to seamless as possible, with easy setup and reasonable compatibility with devices and online services.Durability: As a physical device securing the keys to your digital kingdom, the products we recommend mustn't easily break. After all, they should be reliable enough to be a long-term security measure.Form factors: We include different form factors, such as standard key designs and nano options.Security features: Naturally, the security features of a security key are paramount. We considered each device's support for different authentication protocols alongside security measures, including passwordless authentication and biometrics.Platform, mobile compatibility: We like to see security keys that are compatible with multiple platforms, including the most popular operating systems. It's always a bonus if NFC and mobile support are available.Price point: The cost of your next security key is an important factor to consider. As they are physical, we recommend that you pick up two, just in case one ends up lost. As a result, we wanted to ensure this was affordable. Show more Security key FAQs What are security keys and how do they work? A security key is a physical device that generates a unique code used with a password to authenticate your identity when logging into a website or application. It uses public-key cryptography and is more secure than traditional 2FA methods. You usually plug your key into a trusted device to authenticate yourself. Show more What does FIDO mean? The FIDO Alliance consortium has developed open standards for authentication protocols. The authentication standard is based on public key cryptography.Devices that are FIDO certified allow users to quickly sign into their accounts using physical keys or biometric passkeys and have also achieved FIDO protection and security standards. Show more Why are security keys better than SMS-based 2FA? SMS is open to SIM hijacking, while a physical key cannot be copied or the data intercepted. Think about it this way: 2FA verification codes sent via SMS messaging may be intercepted if your smartphone has been infected with malware, including spyware, but unless an attacker has your physical security key in their hand, they cannot grab the code required to access your account. Show more How many security keys do I need? We recommend purchasing at least two -- one that you use day-to-day and one to keep as a backup. For example, you can keep one in your home office or attached to a keychain if you're on the road, while one is stashed safely away to cover you if you lose your primary key. Show more Can security keys be hacked? Security keys are one of the best authentication methods on the market today and they have very little exploitable attack surface, making them difficult to 'hack' in any way. While there are cases of keys being cloned for academic purposes, as security keys are not constantly connected to the Internet, you don't have to worry about the most common attack vectors having any impact on them. Just keep your key in a safe place. Show more How do security keys prevent phishing? In layman's terms, security keys use encryption and security tokens that only work on genuine websites rather than fake phishing domains. Public and private keys work together to authenticate a user session, but the private key is held on the physical device, reducing the attack surface. Show more Can I use a security key for multiple accounts? Yes, absolutely. Although, the number of accounts can vary depending on the security key you choose. The key's compatibility with different protocols and online services may also determine what accounts you can protect by using one device. Show more What happens if I lose my security key? The answer to this question depends on the provider and the account registered with your key. If you don't have a backup authentication method, such as an authenticator app, try removing the key from your account and registering a new one. If you are locked out, you may also have to contact relevant IT teams or fill out a request, such as the one provided by Google for free Gmail accounts. Show more Are there alternative security keys worth considering? Here are alternatives on the market that could be worth investigating if none of our top recommendations appeal to you. It's not possible to showcase every single worthy security key product on the market, so other options we like the look of are below: Show more Further ZDNET Tech Coverage Smartphones Smartwatches Tablets Laptops TVs Other Tech Resources ZDNET Recommends
    0 Commentaires ·0 Parts ·65 Vue