Your computer stops working. All your remote working has taken its toll on a personal laptop you never indented to use this extensively. You panic because you can’t go into the office, and there’s nothing your remotely-working IT person can do when your machine can’t turn on.
April marks a new phase of global work-from-home migration, as businesspeople are now tasked with powering through crisis anxieties to keep the economy moving. It is the spirit of those who make the extra effort to help their clients in times like these who should be applauded — millions of insurance, property, financial, health care, law, and accounting professionals and their firms along with business and government workers of all kinds, everywhere.
More banking clients self-install RSign using RPost’s E-Sign & E-Security (Free) Work-from-Home Readiness Program to quickly, freely and easily e-sign Payroll Protection Program and other Loan applications. Industry organizations across sectors have joined RPost’s coalition to make their small business clients aware of these e-sign and e-security tools and how to access them free with RPost’s crisis software donation program (see who has joined).
In today’s financial circles, there is quite a bit of buzz around “blockchain” technology and its myriad of possible future applications. Is blockchain here to stay or is it just hype?
While Title IV of The Jobs Act (Reg A+), the amended and expanded securities regulation, changed in mid-2015, organizations have been slow to change their processes until there was a clear understanding of how to use these new funding tools and stay in compliance.
Just a decade ago, self-driving cars were relegated to science fiction and the dreams of a handful of technologists.
Today, self-driving cars are already on the roads. Uber is using them to pick up passengers in Pittsburgh. Self-driving features are built into the latest models of Mercedes, BMW, and of course, Tesla – although these cars still require a human driver to be attentive and ready to assume manual control at any moment.
Does your news feed closely resemble the plot of a Russian spy novel? It certainly might if you’ve been following the recent drama and mudslinging between the Democrats, the Russian government, the FBI, and the CIA, following the public release of private DNC emails. And that’s before the warnings of an “October Surprise” promised by WikiLeaks founder Julian Assange. Assange is threatening to release more confidential emails before the November election. Who needs fiction?
…and does it change the result?
Who is responsible for the recent Democratic National Committee (“DNC”) hack and resulting emails published on WikiLeaks? Russian hackers are suspected and the FBI is investigating, but Russia adamantly denies involvement. The hackers could be from the same group who stole DNC’s oppositional research about Republican Presidential nominee Donald Trump in mid-June. Perhaps, the perpetrator is simply a DNC employee or subcontractor disenchanted with circumstances that many are now describing as a DNC conspiracy to favor and support its predetermined nominee in the presidential primary – Hillary Clinton – while impeding other candidates such as Bernie Sanders. Whether an angry Bernie Sanders supporter or a foreign government preferring Trump is to blame, the lesson here is once again that if your emails (sent in plain text) contain something of value, they will eventually be exposed.
If you see grown men and women staring at their phones as they walk into police stations, churches or the backyards of strangers, you could be witness to the latest video gaming phenomenon to take the world by storm.
Many companies are continually struggling to protect customer data from hackers, thieves and other cybersecurity threats. Some firms have begun using biometric data in place of passwords. For example, many banks now allow customers to use fingerprint or iris identification to access bank accounts from mobile devices. This includes Bank of America, JP Morgan Chase and Wells Fargo. Google and other technology firms are working to combine biometric information to further strengthen security using information such as eye scans, fingerprints, face shape, voice recognition and even body movement. The prevailing idea is that although a single biometric indicator would not be secure enough by itself, a combination of many such indicators could “result in something more than 10 times as secure as a fingerprint.” And an ancillary promise is that biometric-based security would afford the ultimate in convenience to end users, who would no longer face the challenge of remembering convoluted passwords of their own creation.