<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>scott, Author at Colocation America</title>
	<atom:link href="https://www.colocationamerica.com/blog/author/scott/feed" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Dedicated Servers and Colocation Services &#124; Colocation America</description>
	<lastBuildDate>Mon, 08 May 2023 17:27:40 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Top 5 Challenges for Data Professionals in 2019</title>
		<link>https://www.colocationamerica.com/blog/5-challenges-for-data-professionals</link>
					<comments>https://www.colocationamerica.com/blog/5-challenges-for-data-professionals#respond</comments>
		
		<dc:creator><![CDATA[scott]]></dc:creator>
		<pubDate>Thu, 28 Feb 2019 17:39:24 +0000</pubDate>
				<category><![CDATA[Data Center News]]></category>
		<guid isPermaLink="false">https://www.colocationamerica.com/?p=19599</guid>

					<description><![CDATA[<p>Over the last few decades, the role of data professional has become much more attractive and widely known. The job may be difficult to understand for a layman, but data professionals provide services like data conversion and migration, database and<span class="excerpt-hellip"> […]</span></p>
<p>The post <a href="https://www.colocationamerica.com/blog/5-challenges-for-data-professionals">Top 5 Challenges for Data Professionals in 2019</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Over the last few decades, the role of data professional has become much more attractive and widely known. The job may be difficult to understand for a layman, but data professionals provide services like data conversion and migration, database and data warehousing and implementation, business intelligence solutions and customized software solutions. </span></p>
<p><span style="font-weight: 400;">But, like any other professional, <a href="https://www.colocationamerica.com/blog/dba-experts-growing-your-company">a data expert</a> will encounter some challenges. Some challenges will be brought up by the data itself and others will come from working with others, whether in your own organization or from another institution. </span></p>
<p><center><iframe src="https://www.youtube.com/embed/DR6qQWwUx1c" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></center><span style="font-weight: 400;">Below are the top 5 challenges facing data professionals in 2019:</span></p>
<h2>New Technology</h2>
<p><span style="font-weight: 400;">Technology advances rapidly and, as a data professional, you will surely be aware of this. The real challenge is deciding which of the new technologies will work to the best interest of improving your organization and which is better to avoid. For example, most data professionals claim that they now work with Artificial Intelligence. </span></p>
<p><span style="font-weight: 400;">This will clearly, to some extent make a data professional’s life easier, though it will mean significant economic investment on your company’s part, as well as an investment of time for you to learn how the new technology works.</span></p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-19601 size-full" src="https://www.colocationamerica.com/wp-content/uploads/2019/02/challenges-for-data-professionals.jpg" alt="big data challenges" width="600" height="348" srcset="https://www.colocationamerica.com/wp-content/uploads/2019/02/challenges-for-data-professionals.jpg 600w, https://www.colocationamerica.com/wp-content/uploads/2019/02/challenges-for-data-professionals-300x174.jpg 300w, https://www.colocationamerica.com/wp-content/uploads/2019/02/challenges-for-data-professionals-252x146.jpg 252w, https://www.colocationamerica.com/wp-content/uploads/2019/02/challenges-for-data-professionals-50x29.jpg 50w, https://www.colocationamerica.com/wp-content/uploads/2019/02/challenges-for-data-professionals-129x75.jpg 129w" sizes="(max-width:767px) 480px, 600px" /></p>
<p><span style="font-weight: 400;">Advanced technology may take up a lot of the time of data professionals as they may be forced to learn new skills as technology and hardware development. As well as this, new technology may also lead to the obsolescence of some data, leading to challenges in the industry.</span></p>
<h2>Big Data</h2>
<p><span style="font-weight: 400;">For better or worse, we now live in a world of ‘big data’, in which companies and institutions have the power and the technology to compile huge amounts of data in order to build knowledge of consumption patterns, or political views, and of a host of other things. <a href="https://www.colocationamerica.com/blog/algorithms-for-data-scientists">As a data professional</a>, this is clearly both a threat and an opportunity. A threat as there are challenges to analyzing the data, and an opportunity because your skills will clearly be needed. </span></p>
<p><span style="font-weight: 400;">As well as this, the accessibility of data is expected to grow at a higher rate in the next few years. The major challenge is that more than 80 percent of it is unstructured data. This is data that doesn’t have a defined style of data organization, and it may be text heavy and include things such as emails. </span></p>
<p><span style="font-weight: 400;">Due to the proliferation of internet sites, unstructured data is becoming more widespread than organized data, and this presents challenges to data professionals, as unstructured data is more complicated, and thus more costly, to analyze. However, unstructured data analysts have the potential to reveal more important, and thus more valuable, information through the data, though sometimes this becomes very difficult or impossible to interpret.</span></p>
<p><img decoding="async" class="aligncenter wp-image-19602 size-full" src="https://www.colocationamerica.com/wp-content/uploads/2019/02/data-professionals-challenges.png" alt="data science challenge" width="600" height="357" srcset="https://www.colocationamerica.com/wp-content/uploads/2019/02/data-professionals-challenges.png 600w, https://www.colocationamerica.com/wp-content/uploads/2019/02/data-professionals-challenges-300x179.png 300w, https://www.colocationamerica.com/wp-content/uploads/2019/02/data-professionals-challenges-245x146.png 245w, https://www.colocationamerica.com/wp-content/uploads/2019/02/data-professionals-challenges-50x30.png 50w, https://www.colocationamerica.com/wp-content/uploads/2019/02/data-professionals-challenges-126x75.png 126w" sizes="(max-width:767px) 480px, 600px" /></p>
<p><span style="font-weight: 400;">In fact, a good indicator of the trend towards big data, and the challenges that it brings is that many data professionals feel ‘overwhelmed by data’. There is simply too much out there, and it sometimes feels too difficult to know what is good data and what is not, which to put into the data set and which to discard. </span></p>
<p><span style="font-weight: 400;">The accessibility of data, coupled with the fact that much of it is potentially quite difficult to analyze, is one of the biggest challenges facing data professionals.</span></p>
<h2>Data From Multiple Sources</h2>
<p><span style="font-weight: 400;">As a data professional, you may obtain your <a href="https://www.colocationamerica.com/blog/starting-data-journalism">data from multiple sources</a>. Data from multiple sources might be contradictory, or lacking in reliability, or it may even have a political agenda. In fact, the reliability of data was one of the biggest concerns of data professionals in the last year. </span></p>
<p><span style="font-weight: 400;">This is because many companies that either gather or use data will then go on to share this with multiple other sources. For you, the challenge is clearly in </span><a href="https://www.forbes.com/sites/gregpetro/2019/02/15/5-things-retailers-and-brands-need-to-know-about-data-in-2019/#298e15043a9e" target="_blank" rel="noopener noreferrer"><span style="font-weight: 400;">knowing which data you should trust</span></a><span style="font-weight: 400;">: which should you use to further your knowledge, and which should you discard as inaccurate or unreliable. </span></p>
<p><span style="font-weight: 400;">Perhaps the best way to meet this challenge is to carefully choose the sources of your data. If you do this, you can ensure that the data you are using is appropriate and will help your business to grow.</span></p>
<h2>Creating Value</h2>
<p><span style="font-weight: 400;">Data professionals focus on providing their services in line with an organization’s users and an organization’s departmental needs. Some organizations may outsource their data operations, so data professionals may effectively work as freelancers. This may be a good thing, as it creates flexibility. However, there is an element of insecurity.</span></p>
<p><span style="font-weight: 400;">The challenge for you is to ensure that the service you provide for your employer </span><a href="https://www.ibmbigdatahub.com/blog/top-five-questions-chief-data-officers-2019" target="_blank" rel="noopener noreferrer"><span style="font-weight: 400;">creates value for the organization</span></a><span style="font-weight: 400;">. As we have said, data has never been so accessible. This is an opportunity for you, but also a challenge, as you will need to justify your role in a business, especially since big data can now be accessed by non-professionals at the push of a button.</span></p>
<h2>Cooperating between Multiple Departments</h2>
<p><span style="font-weight: 400;">Professionals in different departments may want their data sourced from a specific source. Harmony between the departments is consequently essential. This is because data that comes in different formats or that needs to be cleaned or reformatted, will merely make data integration impossible and will make your life harder and your company run less efficiently. </span></p>
<p><span style="font-weight: 400;">This is why data professionals have cited format consistency or data as being vitally important, indeed one of the greatest challenges faced by data professionals, and why professionals are pushing for data integration.</span></p>
<p><span style="font-weight: 400;">In conclusion, data professionals will face many obstacles in their field, but this doesn’t mean that they cannot face these challenges head-on. Living as we do in a knowledge society, in which data is a huge economic asset (in fact it may become one of the only economic assets in the next few decades), there has never been a more rewarding time to be a data professional, both in terms of the challenges you will face in work an also in relation to the wage a well-qualified data professional can command.</span></p>
<p>The post <a href="https://www.colocationamerica.com/blog/5-challenges-for-data-professionals">Top 5 Challenges for Data Professionals in 2019</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.colocationamerica.com/blog/5-challenges-for-data-professionals/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>This Week in Getting Hacked: Steam Room Edition</title>
		<link>https://www.colocationamerica.com/blog/twigh-steam-edition</link>
					<comments>https://www.colocationamerica.com/blog/twigh-steam-edition#respond</comments>
		
		<dc:creator><![CDATA[scott]]></dc:creator>
		<pubDate>Fri, 01 Jun 2018 20:33:27 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<guid isPermaLink="false">https://www.colocationamerica.com/?p=18215</guid>

					<description><![CDATA[<p>Welcome back to ‘This Week in Getting Hacked’—the world’s greatest cybersecurity-related link dump! Each week, we bring you the best news stories from the cybersecurity field, letting you know who’s getting hacked, who’s hacking, what data is leaking, and about<span class="excerpt-hellip"> […]</span></p>
<p>The post <a href="https://www.colocationamerica.com/blog/twigh-steam-edition">This Week in Getting Hacked: Steam Room Edition</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Welcome back to ‘This Week in Getting Hacked’—the world’s greatest cybersecurity-related link dump! Each week, we bring you the best news stories from the cybersecurity field, letting you know who’s getting hacked, who’s hacking, what data is leaking, and about what you should take with caution. So strap in, change your password, and let’s find out who’s getting hacked this week!</em><br />
<em>On to the links….</em><br />
<strong>Popular Gaming Provider Steam has been compromised</strong>. So stop buying those sale game you&#8217;re never going to play and change your password. We should probably also mention that this vulnerability has been present for at least 10 years.<br />
<img decoding="async" class="aligncenter size-full wp-image-18216" src="https://coloam.hostadillo.com/wp-content/uploads/2018/06/steam-logo.png" alt="steam hack" width="600" height="186" srcset="https://www.colocationamerica.com/wp-content/uploads/2018/06/steam-logo.png 600w, https://www.colocationamerica.com/wp-content/uploads/2018/06/steam-logo-300x93.png 300w, https://www.colocationamerica.com/wp-content/uploads/2018/06/steam-logo-260x81.png 260w, https://www.colocationamerica.com/wp-content/uploads/2018/06/steam-logo-50x16.png 50w, https://www.colocationamerica.com/wp-content/uploads/2018/06/steam-logo-150x47.png 150w" sizes="(max-width:767px) 480px, 600px" /><br />
The vulnerability let attackers take total control of a Steam user&#8217;s computer and all 125 million users were vulnerable.<br />
Steam has since <a href="https://motherboard.vice.com/en_us/article/9k8qv5/steam-exploit-left-users-vulnerable-for-10-years" target="_blank" rel="noopener noreferrer">patched it in March 2018</a> before releasing details of the vulnerability in May. Valve, Steam&#8217;s parent company, did not respond to comments.<br />
<strong>GDPR went into effect on the 25th and already Facebook and Google were hit with $8.8 billion in lawsuits on the very first day</strong>. There really isn&#8217;t much more to say here other than <em>man</em> people were waiting for this, huh?<br />
Just ready to pounce on the Internet&#8217;s largest companies.<br />
<center><iframe src="https://www.youtube.com/embed/_J5IZxI_xKk" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></center>While both Facebook and Google updated their terms but <a href="https://www.theverge.com/2018/5/25/17393766/facebook-google-gdpr-lawsuit-max-schrems-europe">Austrian privacy activist, Max Schrems</a>, has voiced, &#8220;they totally know that it&#8217;s going to be a violation. They don&#8217;t even try to hide it.&#8221; Which is basically what we always say. Go Schrems.<br />
<strong>Budget Android phones are being sold with Malware pre-installed</strong>. 141 low-budget Android phones have been found with Malware infested firmware. The <a href="https://www.bleepingcomputer.com/news/security/malware-found-in-the-firmware-of-141-low-cost-android-devices/" target="_blank" rel="noopener noreferrer">organization behind this has</a> been around for a while and thought to have been eradicated. However, the only real harm they do is overlain ads on top of other apps, but that&#8217;s still SUPER ANNOYING.<br />
<img decoding="async" class="aligncenter size-full wp-image-18217" src="https://coloam.hostadillo.com/wp-content/uploads/2018/06/budget-android-malware.png" alt="malware low cost android" width="536" height="420" srcset="https://www.colocationamerica.com/wp-content/uploads/2018/06/budget-android-malware.png 536w, https://www.colocationamerica.com/wp-content/uploads/2018/06/budget-android-malware-300x235.png 300w, https://www.colocationamerica.com/wp-content/uploads/2018/06/budget-android-malware-186x146.png 186w, https://www.colocationamerica.com/wp-content/uploads/2018/06/budget-android-malware-50x39.png 50w, https://www.colocationamerica.com/wp-content/uploads/2018/06/budget-android-malware-96x75.png 96w" sizes="(max-width:767px) 480px, 536px" /><br />
Someone, please stop these people from just being total idiots.<br />
<strong>Amazon&#8217;s Alexa has been spying on darn near everything you&#8217;ve been saying around it</strong>. And its been doing some strange things with those recordings. We won&#8217;t get into many of the stories here (you can read them by clicking this), what we&#8217;re more interested in what Amazon has to say. They provided Recode with the following explanation:</p>
<blockquote><p>Echo woke up due to a word in background conversation sounding like “Alexa.” Then, the subsequent conversation was heard as a “send message” request. At which point, Alexa said out loud “To whom?” At which point, the background conversation was interpreted as a name in the customers contact list. Alexa then asked out loud, “[contact name], right?” Alexa then interpreted background conversation as “right”. As unlikely as this string of events is, we are evaluating options to make this case even less likely.”</p></blockquote>
<p>Hmmm. Hopefully we&#8217;ll get some further updates out of this one.</p>
<p>The post <a href="https://www.colocationamerica.com/blog/twigh-steam-edition">This Week in Getting Hacked: Steam Room Edition</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.colocationamerica.com/blog/twigh-steam-edition/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>This Week in Getting Hacked: Everyone Knows Where You Are at All Times Edition</title>
		<link>https://www.colocationamerica.com/blog/twigh-location-information-edition</link>
					<comments>https://www.colocationamerica.com/blog/twigh-location-information-edition#respond</comments>
		
		<dc:creator><![CDATA[scott]]></dc:creator>
		<pubDate>Fri, 18 May 2018 13:41:39 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<guid isPermaLink="false">https://www.colocationamerica.com/?p=18179</guid>

					<description><![CDATA[<p>Welcome back to ‘This Week in Getting Hacked’—the world’s greatest cybersecurity-related link dump! Each week, we bring you the best news stories from the cybersecurity field, letting you know who’s getting hacked, who’s hacking, what data is leaking, and about<span class="excerpt-hellip"> […]</span></p>
<p>The post <a href="https://www.colocationamerica.com/blog/twigh-location-information-edition">This Week in Getting Hacked: Everyone Knows Where You Are at All Times Edition</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Welcome back to ‘This Week in Getting Hacked’—the world’s greatest cybersecurity-related link dump! Each week, we bring you the best news stories from the cybersecurity field, letting you know who’s getting hacked, who’s hacking, what data is leaking, and about what you should take with caution. So strap in, change your password, and let’s find out who’s getting hacked this week!</em><br />
<em>On to the links….</em><br />
<strong>If you live in the United States and you have a cell phone</strong>, your real-time location information is being sold to third parties. How surprising. Every single U.S. cell-phone carrier is selling your real-time location data.<br />
<img decoding="async" class="aligncenter size-post-slider-side wp-image-18180" src="https://www.colocationamerica.com/wp-content/uploads/2018/05/real-time-location-information.jpg" alt="location information" width="600" height="325" /><br />
Why are they allowed to do this? <a href="https://www.androidcentral.com/all-major-us-carriers-give-your-real-time-location-info-third-parties">Because of a loophole</a> in the Electronic Communications Privacy Act, of course. A service called &#8220;Securus&#8221; which is mainly used to track calls made to inmates can also be used for any cell phone anywhere.<br />
The FCC has been asked to investigate, but we&#8217;re not holding our breath that anything will be done.<br />
<strong>We&#8217;re sorry if you&#8217;ve eaten at Chili&#8217;s recently</strong>, and not just because you could have eaten a better meal practically anywhere else, but because there&#8217;s been a card breach!<br />
Kudos to Chili&#8217;s, though, because the breach happened on May 11 and the <a href="https://www.bleepingcomputer.com/news/security/card-breach-announced-at-chili-s-restaurant-chain/">company announced the offense</a> on the very same day instead of waiting around and trying to do some odd type of PR.<br />
<img decoding="async" class="aligncenter size-full wp-image-18181" src="https://coloam.hostadillo.com/wp-content/uploads/2018/05/chilis-hack.jpg" alt="chilis security hack" width="600" height="218" srcset="https://www.colocationamerica.com/wp-content/uploads/2018/05/chilis-hack.jpg 600w, https://www.colocationamerica.com/wp-content/uploads/2018/05/chilis-hack-300x109.jpg 300w, https://www.colocationamerica.com/wp-content/uploads/2018/05/chilis-hack-260x94.jpg 260w, https://www.colocationamerica.com/wp-content/uploads/2018/05/chilis-hack-50x18.jpg 50w, https://www.colocationamerica.com/wp-content/uploads/2018/05/chilis-hack-150x55.jpg 150w" sizes="(max-width:767px) 480px, 600px" /><br />
The details of the hack are that if you made a payment with your card at a Chili&#8217;s between March &#8211; April 2018, there&#8217;s a chance your information has been compromised. We love you, Chili&#8217;s, but please start making better food.<br />
<strong>The police can track your location through your cell phone, and people want to know why. </strong>Running off of our first story, Senator Ron Wyden sent letters to the four major mobile carriers and the FCC demanding answers into why law enforcement <a href="https://www.nytimes.com/2018/05/10/technology/cellphone-tracking-law-enforcement.html">needs real-time location information</a> for everyone.<br />
We understand that it would make law enforcement&#8217;s jobs more comfortable, but it&#8217;s also <a href="https://motherboard.vice.com/en_us/article/evk484/securus-law-enforcement-track-phones-senator-wyden-letters">questionable in regards to privacy</a> for sure.<br />
Wyden argues that &#8220;the fact that Securus provides this service at all suggests that AT&amp;T does not sufficiently control access to your customers’ private information.&#8221; He goes on to say:</p>
<blockquote><p>“Americans should be able to obtain this information from wireless carriers, just as they can obtain from the consumer credit agencies a list of the private parties who have accessed their credit reports,” the letter reads.&#8221;</p></blockquote>
<p>Much more to come on this story.<br />
<strong>This next hack tells the tale of a real hero. </strong>A 16-year-old tried a phishing scheme against his teacher to <a href="https://securityboulevard.com/2018/05/16-year-old-arrested-after-phishing-scheme-against-teachers-to-change-grades/">change his grades</a>. We sure wish we could say to you he was successful, but, alas, he was arrested. 14 felony counts detained, to be exact.<br />
<img decoding="async" class="aligncenter size-full wp-image-18182" src="https://coloam.hostadillo.com/wp-content/uploads/2018/05/16-year-old-hack.jpg" alt="" width="600" height="291" srcset="https://www.colocationamerica.com/wp-content/uploads/2018/05/16-year-old-hack.jpg 600w, https://www.colocationamerica.com/wp-content/uploads/2018/05/16-year-old-hack-300x146.jpg 300w, https://www.colocationamerica.com/wp-content/uploads/2018/05/16-year-old-hack-260x126.jpg 260w, https://www.colocationamerica.com/wp-content/uploads/2018/05/16-year-old-hack-50x24.jpg 50w, https://www.colocationamerica.com/wp-content/uploads/2018/05/16-year-old-hack-150x73.jpg 150w" sizes="(max-width:767px) 480px, 600px" /><br />
David Rotaro, send manipulative emails to his teachers which tricked them into clicking a link which took them to a page Rotaro created which mimicked their teacher portal.<br />
Rotaro hoped to use this fake page to gather their log-in information and change his grades himself.<br />
Hilarious, but please don&#8217;t ever try this.</p>
<p>The post <a href="https://www.colocationamerica.com/blog/twigh-location-information-edition">This Week in Getting Hacked: Everyone Knows Where You Are at All Times Edition</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.colocationamerica.com/blog/twigh-location-information-edition/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>This Week in Getting Hacked: 7-Zip Users Beware Edition!</title>
		<link>https://www.colocationamerica.com/blog/twigh-7-zip-edition</link>
					<comments>https://www.colocationamerica.com/blog/twigh-7-zip-edition#respond</comments>
		
		<dc:creator><![CDATA[scott]]></dc:creator>
		<pubDate>Fri, 11 May 2018 13:47:24 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<guid isPermaLink="false">https://www.colocationamerica.com/?p=18127</guid>

					<description><![CDATA[<p>Welcome back to ‘This Week in Getting Hacked’—the world’s greatest cybersecurity-related link dump! Each week, we bring you the best news stories from the cybersecurity field, letting you know who’s getting hacked, who’s hacking, what data is leaking, and about<span class="excerpt-hellip"> […]</span></p>
<p>The post <a href="https://www.colocationamerica.com/blog/twigh-7-zip-edition">This Week in Getting Hacked: 7-Zip Users Beware Edition!</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Welcome back to ‘This Week in Getting Hacked’—the world’s greatest cybersecurity-related link dump! Each week, we bring you the best news stories from the cybersecurity field, letting you know who’s getting hacked, who’s hacking, what data is leaking, and about what you should take with caution. So strap in, change your password, and let’s find out who’s getting hacked this week!</em><br />
<em>On to the links…</em></p>
<hr />
<p><strong>Boy, the Equifax story just never ends.</strong> For about the ninth time, Equifax has revealed the &#8220;<strong>FULL</strong>&#8221; extent of the biggest security hack in history (something which I thought they had already done about eight other times). <a href="https://www.theregister.co.uk/2018/05/08/equifax_breach_may_2018/" target="_blank" rel="noopener noreferrer">Here are the stats</a>:</p>
<ul>
<li>146 million people were affected</li>
<li>99 million addresses</li>
<li>209,000 payment cards</li>
<li>38,000 drivers&#8217; licenses</li>
<li>3,200 passports</li>
</ul>
<p>YIKES. The good news is that the number of people affected didn&#8217;t change, but the bad news is&#8230; passports? Equifax was apparently unaware people were uploading their passport information to their servers in another case of them being really inept. Check out the link above for more details and we&#8217;ll be sure to update you when the next full extent of the hack is revealed.</p>
<hr />
<p><strong>If you use 7-Zip because you don&#8217;t like using WINRAR&#8217;s free trial for nine years</strong>, well, there&#8217;s a security flaw. That&#8217;s right! One of the most popular unzipping tools out there affects all software versions before the publication of this post.<br />
So if you use it, please update it. For now, please check out their trailer (yes, they have a trailer):<br />
<center><iframe src="https://www.youtube.com/embed/N48Z0nG0bcQ" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></center><strong>Pacemakers need updates too. </strong>Over 350,000 cardiac devices need a security patch according to the US Food and Drug Administration warns that devices made by Abbott&#8217;s (formerly St. Jude Medical) are open to cyber-attacks which include sudden loss of battery.<br />
The radio-frequency controlled devices are good devices, but the people who would hack them are most certainly not. Schedule an appointment to get the update now, please.</p>
<hr />
<p><strong>ALERT* This is a Nutella story ALERT* </strong>This Week in Getting Hacked has now seen everything. World Password Day was 7 days ago and none of you celebrated it. Neither did I. I had better things to do. Much like the person running Nutella&#8217;s Twitter account who apparently thinks &#8220;Nutella&#8221; is a fantastic password. Check it out:<br />
&nbsp;</p>
<blockquote class="twitter-tweet" data-lang="en">
<p dir="ltr" lang="en">Today it&#8217;s World Password Day: choose a word that&#8217;s already in your heart. Like &#8220;Nutella&#8221;, for example! <a href="https://twitter.com/hashtag/WorldPasswordDay?src=hash&amp;ref_src=twsrc%5Etfw">#WorldPasswordDay</a> <a href="https://twitter.com/hashtag/Nutella?src=hash&amp;ref_src=twsrc%5Etfw">#Nutella</a> <a href="https://t.co/Q9EERc6244">pic.twitter.com/Q9EERc6244</a></p>
<p>— Nutella (@NutellaGlobal) <a href="https://twitter.com/NutellaGlobal/status/992027051765981184?ref_src=twsrc%5Etfw">May 3, 2018</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<hr />
<p><i>That’s it for this week, folks. Please change your passwords and disable Cortana when not in use. People are smart. You are not.</i></p>
<p>The post <a href="https://www.colocationamerica.com/blog/twigh-7-zip-edition">This Week in Getting Hacked: 7-Zip Users Beware Edition!</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.colocationamerica.com/blog/twigh-7-zip-edition/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Millennial Executive: STEM Grant Edition</title>
		<link>https://www.colocationamerica.com/blog/me-sorry-2018</link>
					<comments>https://www.colocationamerica.com/blog/me-sorry-2018#respond</comments>
		
		<dc:creator><![CDATA[scott]]></dc:creator>
		<pubDate>Thu, 10 May 2018 17:39:19 +0000</pubDate>
				<category><![CDATA[Business News]]></category>
		<guid isPermaLink="false">https://www.colocationamerica.com/?p=18121</guid>

					<description><![CDATA[<p>In case you missed it, our Vice President of Online Strategies has her own blog called “The Millennial Executive.” Since the SOM blog (Samantha on Monday) started on this site, we don’t want our readers to miss out on her newest<span class="excerpt-hellip"> […]</span></p>
<p>The post <a href="https://www.colocationamerica.com/blog/me-sorry-2018">Millennial Executive: STEM Grant Edition</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>In case you missed it, our Vice President of Online Strategies has her own blog called “The Millennial Executive.” Since the SOM blog (Samantha on Monday) started on this site, we don’t want our readers to miss out on her newest article!</em><br />
<em>The article is published over on The Millennial Executive and has been partially reproduced here with permission from the editor.</em><br />
<em>Below, Samantha is telling 2018 how to sorry she is when dealing with the STEM Grant</em>:</p>
<hr />
<p>In less than a month, I turn 29 years old. In that short amount of time, I’ve learned everything I need to know about the world. Ok, ok, ok, I just lied.<br />
The truth is, in the wise paraphrasing of Socrates’ words, I know nothing.<br />
For those of you less familiar with Plato’s <a href="http://classics.mit.edu/Plato/apology.html">The Apology of Socrates</a>, let me give you the gist: Socrates is on trial for corrupting the youth of Athens (and some other stuff). His defense? How could he be corrupting the youth with knowledge when, he himself, has none? (Confused? No worries, there is a reason they call it the Socratic Paradox). To get to the point, Socrates understands that his knowledge is limited. Unlike other “wise men” who exert their wisdom onto others, it takes a truly wise man/woman to be aware of their own ignorance.<br />
And to that point, let me rephrase my previous statement: I am a wise woman who admits that she does not know everything.<br />
Now I am going to admit this whole “I don’t know everything” thing is something that does not come easy for me. After all, I am a self-proclaimed arrogant a**hole who believes in her own perfection (jokingly, of course). I have spent my entire adult life consulting others on what to do by way of asserting my confidence in my areas of expertise.<br />
However, as I grow older, I am reminded that my experience and academic achievements do not qualify me to “know it all.” I must continue to reach out to those with more knowledge than me. Then again, in the words of my Mom’s Dad, “you can take all the advice in the world, but it does not help if it goes in one ear and out the other.”<br />
<img decoding="async" class="aligncenter size-full wp-image-16018" src="https://www.colocationamerica.com/wp-content/uploads/2017/03/colocation-america-stem-grant-small.png" alt="" width="500" height="126" srcset="https://www.colocationamerica.com/wp-content/uploads/2017/03/colocation-america-stem-grant-small.png 500w, https://www.colocationamerica.com/wp-content/uploads/2017/03/colocation-america-stem-grant-small-300x76.png 300w, https://www.colocationamerica.com/wp-content/uploads/2017/03/colocation-america-stem-grant-small-260x66.png 260w, https://www.colocationamerica.com/wp-content/uploads/2017/03/colocation-america-stem-grant-small-50x13.png 50w, https://www.colocationamerica.com/wp-content/uploads/2017/03/colocation-america-stem-grant-small-150x38.png 150w" sizes="(max-width:767px) 480px, 500px" /><br />
In the case of this year’s STEM Grant, I have heard mountains of advice, I have discussed many solutions, and I can say, in semi-full confidence, that I am moving forward with what I think is best. To sum it up, welcome to the 3rd Funding Cycle of Colocation America’s STEM Grant.<br />
I’m sure the question on some of your minds is, “Why do you need an article to explain this?” The truth is my Mom (for background, check out this <a href="https://web.archive.org/web/20200207030451/http://www.themillennialexecutive.com:80/leadership/thoughts-from-a-nonprofit-funder/">article</a>). My Mom, an expert in the nonprofit field, is one of my biggest advocates, supporters, and, let’s go with, coaches, I have. I am proud to be her daughter and have learned a lot from her.<br />
However… (scary Jaws music in the background)…</p>
<hr />
<p>You can read the rest of the article by <a href="https://web.archive.org/web/20200214065524/http://www.themillennialexecutive.com:80/nonprofit/sorry-2018-stem-grant-edition/" target="_blank" rel="noopener noreferrer">clicking here</a>.<br />
You can also view more of Sam&#8217;s articles on our Business News Page!</p>
<p>The post <a href="https://www.colocationamerica.com/blog/me-sorry-2018">Millennial Executive: STEM Grant Edition</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.colocationamerica.com/blog/me-sorry-2018/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>This Week in Getting Hacked: Twitter Urges You to Change Your Password Edition</title>
		<link>https://www.colocationamerica.com/blog/twigh-change-your-twitter-password-edition</link>
					<comments>https://www.colocationamerica.com/blog/twigh-change-your-twitter-password-edition#respond</comments>
		
		<dc:creator><![CDATA[scott]]></dc:creator>
		<pubDate>Fri, 04 May 2018 16:17:02 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<guid isPermaLink="false">https://www.colocationamerica.com/?p=18032</guid>

					<description><![CDATA[<p>Welcome back to ‘This Week in Getting Hacked’—the world’s greatest cybersecurity-related link dump! Each week, we bring you the best news stories from the cybersecurity field, letting you know who’s getting hacked, who’s hacking, what data is leaking, and about<span class="excerpt-hellip"> […]</span></p>
<p>The post <a href="https://www.colocationamerica.com/blog/twigh-change-your-twitter-password-edition">This Week in Getting Hacked: Twitter Urges You to Change Your Password Edition</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Welcome back to ‘This Week in Getting Hacked’—the world’s greatest cybersecurity-related link dump! Each week, we bring you the best news stories from the cybersecurity field, letting you know who’s getting hacked, who’s hacking, what data is leaking, and about what you should take with caution. So strap in, change your password, and let’s find out who’s getting hacked this week!</em><br />
<em>On to the links…</em><br />
<strong>Twitter is having a plain text issue and is urging all of its 330 million users to change their passwords.</strong> That&#8217;s a lot of users and&#8230;well, maybe some people just need to be locked out of their accounts. Let&#8217;s be honest.<br />
<center><iframe src="https://www.youtube.com/embed/A-_ky8MAGhY" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></center>According to <a href="https://www.theverge.com/2018/5/3/17316684/twitter-password-bug-security-flaw-exposed-change-now" target="_blank" rel="noopener noreferrer">sources</a>, there&#8217;s no actual evidence that the breach will affect anything regarding your account security, but for once a company is taking preventative measures before something bad really happens. Kudos, Twitter.</p>
<hr />
<p><strong>If you drive a Volkswagen or an Audi</strong> you are now vulnerable to remote hacking! Huzzuh! I mean, the hacker can only glean less-than-useful information from you, but <a href="https://www.bleepingcomputer.com/news/security/volkswagen-and-audi-cars-vulnerable-to-remote-hacking/" target="_blank" rel="noopener noreferrer">researchers on the matter suggest</a> they could get GPS information and track you that way.<br />
What&#8217;s more shocking (not) is that researchers found out about the flaws way back in July of 2017 and VW just sat on it. Great. Here&#8217;s <a href="https://www.bleepstatic.com/images/news/u/986406/attacks/Vulnerabilities/VW-letter.png" target="_blank" rel="noopener noreferrer">VW&#8217;s official statement. </a></p>
<hr />
<p><strong>This is a shocking statistic: </strong>Over 20,000,000 Chrome users are victim of Fake Ad Blockers. What? Literally everyone I&#8217;ve talked to (albiet, that&#8217;s significantly fewer than 20,000,000 people) who even knows/wants to use an ad blocker knows of just about two of them.<br />
<img decoding="async" class="aligncenter size-full wp-image-18034" src="https://coloam.hostadillo.com/wp-content/uploads/2018/05/fake-ad-blockers.png" alt="fake chrome ad blockers" width="600" height="479" srcset="https://www.colocationamerica.com/wp-content/uploads/2018/05/fake-ad-blockers.png 600w, https://www.colocationamerica.com/wp-content/uploads/2018/05/fake-ad-blockers-300x240.png 300w, https://www.colocationamerica.com/wp-content/uploads/2018/05/fake-ad-blockers-183x146.png 183w, https://www.colocationamerica.com/wp-content/uploads/2018/05/fake-ad-blockers-50x40.png 50w, https://www.colocationamerica.com/wp-content/uploads/2018/05/fake-ad-blockers-94x75.png 94w" sizes="(max-width:767px) 480px, 600px" /><br />
But <a href="https://adguard.com/en/blog/over-20-000-000-of-chrome-users-are-victims-of-fake-ad-blockers/" target="_blank" rel="noopener noreferrer">according to this article</a>, people are just silly.</p>
<hr />
<p><strong>May the Fourth be with You Everyone: </strong>Rebel scum have hacked into servers on the planet currently being helped by the Empire, Scarif and have stolen top-secret Empire plans for peace-keeping technology.<br />
<img decoding="async" class="aligncenter size-full wp-image-18033" src="https://coloam.hostadillo.com/wp-content/uploads/2018/05/rebel-scum.png" alt="" width="600" height="292" srcset="https://www.colocationamerica.com/wp-content/uploads/2018/05/rebel-scum.png 600w, https://www.colocationamerica.com/wp-content/uploads/2018/05/rebel-scum-300x146.png 300w, https://www.colocationamerica.com/wp-content/uploads/2018/05/rebel-scum-260x127.png 260w, https://www.colocationamerica.com/wp-content/uploads/2018/05/rebel-scum-50x24.png 50w, https://www.colocationamerica.com/wp-content/uploads/2018/05/rebel-scum-150x73.png 150w" sizes="(max-width:767px) 480px, 600px" /><br />
ARE WE BLIND!? DEPLOY THE GARRISON!</p>
<article id="post-17281" class="post-17281 post type-post status-publish format-standard has-post-thumbnail category-cyber-security">
<div class="gdlr-standard-style">
<div class="gdlr-blog-content">
<hr />
<p><em>That’s it for this week, folks. Please change your passwords and disable Cortana when not in use. People are smart. You are not. </em>
</div>
</div>
</article>
<p>The post <a href="https://www.colocationamerica.com/blog/twigh-change-your-twitter-password-edition">This Week in Getting Hacked: Twitter Urges You to Change Your Password Edition</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.colocationamerica.com/blog/twigh-change-your-twitter-password-edition/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>This Week in Getting Hacked: Geek Squad Is in Bed with the FBI Edition</title>
		<link>https://www.colocationamerica.com/blog/twigh-geek-squad-fbi-edition</link>
					<comments>https://www.colocationamerica.com/blog/twigh-geek-squad-fbi-edition#respond</comments>
		
		<dc:creator><![CDATA[scott]]></dc:creator>
		<pubDate>Fri, 09 Mar 2018 13:39:53 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<guid isPermaLink="false">https://www.colocationamerica.com/?p=17027</guid>

					<description><![CDATA[<p>Welcome back to ‘This Week in Getting Hacked’—the world’s greatest cybersecurity-related link dump! Each week, we bring you the best news stories from the cybersecurity field, letting you know who’s getting hacked, who’s hacking, what data is leaking, and about<span class="excerpt-hellip"> […]</span></p>
<p>The post <a href="https://www.colocationamerica.com/blog/twigh-geek-squad-fbi-edition">This Week in Getting Hacked: Geek Squad Is in Bed with the FBI Edition</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Welcome back to ‘This Week in Getting Hacked’—the world’s greatest cybersecurity-related link dump! Each week, we bring you the best news stories from the cybersecurity field, letting you know who’s getting hacked, who’s hacking, what data is leaking, and about what you should take with caution. So strap in, change your password, and let’s find out who’s getting hacked this week!</em><br />
<em>On to the links…</em><br />
<strong>Believe it or not the world-famous Geek Squad is in CAHOOTS with the FBI.</strong> No. Way.<br />
The Best Buy owned electronics repair company has been &#8220;secretly&#8221; parsing computers for information the FBI might want to know about.<br />
<img decoding="async" class="aligncenter size-full wp-image-17028" src="https://www.colocationamerica.com/wp-content/uploads/2017/01/geek-squad.jpg" alt="geek squad fbi" width="600" height="383" /><br />
Th evidence is as follows: the FBI&#8217;s Cyber Working Group toured Geek Squad&#8217;s repair facility in Kentucky and they have been working so close, that they actually developed a process for <a href="https://www.engadget.com/2018/03/07/eff-geek-squad-fbi-relationship/" target="_blank" rel="noopener noreferrer">reporting suspicious content</a>. This is mostly is cases for child pornography and things nature, but we find the fact that this is &#8220;outrageous&#8221; as pretty funny.<br />
<strong>Remember Facebook&#8217;s VPN, &#8220;Onavo,&#8221; from a few weeks back?</strong> Well, apparently it&#8217;s still doing the <a href="https://betanews.com/2018/03/07/facebook-onavo-vpn-data-collection/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed+-+bn+-+BetaNews+Latest+News+Articles" target="_blank" rel="noopener noreferrer">dubious even while disabled</a>.<br />
I feel like at this point, we&#8217;re never going to escape the giant Internet companies like Facebook, Google, etc. They&#8217;re always doing something that we <em>kind of</em> like. So we&#8217;ll use it. Then we find out they&#8217;re selling all of our information to advertisers and we get upset. But we don&#8217;t stop using their services.<br />
<img decoding="async" class="aligncenter size-full wp-image-17029" src="https://www.colocationamerica.com/images/facebook-onavo-again.jpg" alt="facebook onavo" width="600" height="288" /><br />
And they know they <em>kind of</em> upset us, so they make things that we&#8217;ll think for a brief second is useful, until we find out it&#8217;s just a way for them to make money. It&#8217;s a vicious cycle and I need more friends&#8230;.<br />
<strong>Speaking of Internet Giants—Researchers have found a way to bypass Windows Passwords using Cortana.</strong> You know, the thing that&#8217;s supposed to be YOUR assistant.<br />
<img decoding="async" class="aligncenter size-full wp-image-17030" src="https://www.colocationamerica.com/images/cortana-hack.jpg" alt="hacked ms cortana" width="600" height="337" /><br />
The Halo-named Microsoft assistant can be exploited to do all sorts of things, like tell you your commute, what the weather will be, and to install malware once it&#8217;s <a href="https://motherboard.vice.com/en_us/article/xw53jk/researchers-bypassed-windows-password-locks-with-cortana-voice-commands" target="_blank" rel="noopener noreferrer">gotten past your password</a>.<br />
Wait, what?<br />
<em>That&#8217;s it for this week, folks. Please change your passwords and disable Cortana when not in use. People are smart. You are not. </em></p>
<p>The post <a href="https://www.colocationamerica.com/blog/twigh-geek-squad-fbi-edition">This Week in Getting Hacked: Geek Squad Is in Bed with the FBI Edition</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.colocationamerica.com/blog/twigh-geek-squad-fbi-edition/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>International Women’s Day: Top 5 Women in the Data Center Industry 2018</title>
		<link>https://www.colocationamerica.com/blog/top-five-women-data-center-2018</link>
					<comments>https://www.colocationamerica.com/blog/top-five-women-data-center-2018#respond</comments>
		
		<dc:creator><![CDATA[scott]]></dc:creator>
		<pubDate>Thu, 08 Mar 2018 00:01:15 +0000</pubDate>
				<category><![CDATA[Technology News]]></category>
		<guid isPermaLink="false">https://www.colocationamerica.com/?p=17014</guid>

					<description><![CDATA[<p>The 7th Annual Top 5 Most Influential Women in the Data Center Industry List: Today is a day to smile. Today is a day to clap. Today is a day to remember the past and Today is a day to<span class="excerpt-hellip"> […]</span></p>
<p>The post <a href="https://www.colocationamerica.com/blog/top-five-women-data-center-2018">International Women’s Day: Top 5 Women in the Data Center Industry 2018</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3>The 7th Annual Top 5 Most Influential Women in the Data Center Industry List:</h3>
<blockquote><p>Today is a day to smile.<br />
Today is a day to clap.<br />
Today is a day to remember the past and<br />
Today is a day to look to the future.<br />
&nbsp;<br />
Today is a day to listen.<br />
Today is a day to learn.<br />
Today is a day to say Thank You and<br />
Today is a day to be kind.</p></blockquote>
<p>Today is International Women’s Day.<br />
For the last six years, on this very day, International Women’s Day, I have announced the <em>Top 5 Most Influential Women in the Data Center Industry List</em>. This year is no different.<br />
Below are five women who make an impact in, and out of, the data center every day. Yes, they hold positions of high importance in their respective companies but it’s what they do outside of their “job” that is truly inspiring.<br />
These five women join a list of 30 other amazing women who work hard everyday to ensure that the world is a better place through technology. It is a pleasure to announce this year’s installment of the <em>Top 5 Most Influential Women in the Data Center Industry List </em>in celebration of International Women’s Day 2018.</p>
<hr>
<h3><strong>Delfina Eberly</strong>, Vice President of Infrastructure for Facebook (<a href="https://twitter.com/facebook" target="_blank" rel="noopener noreferrer">@Facebook</a>)</h3>
<p><img decoding="async" class="aligncenter wp-image-17015 size-medium" src="https://www.colocationamerica.com/images/delfina-eberly-300x225.jpg" alt="eberly facebook" width="300" height="225"><br />
Eberly is <em>the</em> Facebook veteran that has been keeping you connected. She oversees the social network’s data center infrastructure and ensures that it is both scalable and secure. Eberly has assisted Facebook in making its data centers as efficient as possible. From cooling to staff, Facebook, with the aid of Eberly’s team, has created <a href="http://www.businessinsider.com/inside-facebooks-data-centers-2015-9#air-hitting-the-severs-cant-be-too-cold-either-here-is-a-mixing-room-where-cold-outdoor-air-combines-with-server-exhaust-heat-to-regulate-the-temperature-15" target="_blank" rel="noopener noreferrer">custom servers, racks</a>, and automation software to help process more than 10 <em>trillion </em>queries a day.<br />
Beyond her impact on the data center level, Eberly has been influential on building a more inclusive workforce. Credited as contributing to Facebook’s diversity, Eberly speaks at conferences and workshops on how to get more Latinos and women involved in technology and leadership roles. Not one to boast about past achievements (her lack of a bio online proves that), Eberly is helping shape the way we connect on-and-offline, now and in the future.</p>
<hr>
<h3><strong>Charisse Richards</strong> (<a href="https://twitter.com/charisserichar1" target="_blank" rel="noopener noreferrer">@charisserichar1</a>), CIO &amp; Chief of Staff for Iron Mountain Data Centers (@IODataCenters)</h3>
<p><img decoding="async" class="aligncenter wp-image-17016 size-full" src="https://www.colocationamerica.com/images/charisse-richards.jpg" alt="richards iron mountain data centers" width="200" height="200"><br />
Richards is a passionate leader with a strong track record of motivating teams to drive strategic initiatives. This experience will become particularly handy as she assists Iron Mountain with their <a href="http://www.ironmountain.com/about-us/news-events/news-categories/press-releases/2017/december/iron-mountain-to-acquire-io-data-centers-u-s-operations" target="_blank" rel="noopener noreferrer">recent acquisitions</a> including the U.S. operations of IO Data centers, FORTRUST data center, and two Credit Suisse data centers. With these acquisitions will come great responsibility, something Richards, with over 15 years of experience in the field, seems more than comfortable with.<br />
Prior to Iron Mountain Data Centers, Richards worked as Sr. Director, Service Management and Support at Choice Hotels. Her work with communication and collaboration, on a global level, has established Richards as a trusted leader. When she is not developing new IT strategies, mentoring staff, or examining new opportunities and challenges, Richards can be found at Women in Leadership Symposiums including the one <a href="http://wilsymposium.com/locations/archives/2019-symposiums/2019-arizona/" target="_blank" rel="noopener noreferrer">today in Phoenix</a>.</p>
<hr>
<h3><strong>Nicola Peill-Moelter, Ph.D.</strong>, (<a href="https://twitter.com/greenqween" target="_blank" rel="noopener noreferrer">@greenqween</a>), Senior Director of Environmental Sustainability for Akamai (<a href="https://twitter.com/Akamai" target="_blank" rel="noopener noreferrer">@Akamai</a>)</h3>
<p><img decoding="async" class="aligncenter wp-image-17017 size-medium" src="https://www.colocationamerica.com/images/nicola-peill-moelter-300x300.jpg" alt="moelter akamai" width="300" height="300"><br />
With Akamai’s network being <a href="http://www.datacenterdynamics.com/content-tracks/power-cooling/akamais-data-center-carbon-fight/82265.fullarticle" target="_blank" rel="noopener noreferrer">over 1,000 data center</a> locations strong, it is no question that Peill-Moelter’s work affects us all. In 2009, Peill-Moelter established Akamai’s Global Sustainability Program which includes “energy and greenhouse gas management and report, energy efficiency and electron-waste reduction, employee engagement and stakeholder-awareness.” But her favorite activity is collaborating with the engineers on innovative ways of reducing carbon emissions through energy efficient practices.<br />
Perhaps that last activity is her favorite thanks to her BE in Chemical Engineering or the Ph.D. in Environmental Engineering Science from Caltech. Peill-Moelter also has a U.S. Patent, is a member of the Greenhouse Gas Experts Network and the International Society of Sustainability Professionals. Her board work includes the Caltech Alumni Association and the 1:1 Movement. And, yes, some extracurriculars have been removed for space. She is making a difference in sustainability practices one data center at a time.</p>
<hr>
<h3><strong>Kim Stevenson</strong> (<a href="https://twitter.com/Kimsstevenson" target="_blank" rel="noopener noreferrer">@Kimsstevenson</a>), Senior Vice President and General Manager for DCG Solutions Segments for Lenovo (<a href="https://twitter.com/LenovoDC" target="_blank" rel="noopener noreferrer">@LenovoDC</a>)</h3>
<p><img decoding="async" class="aligncenter wp-image-17018 size-medium" src="https://www.colocationamerica.com/images/kim-stevenson-300x225.png" alt="stevenson dcg solutions" width="300" height="225"><br />
Coming up on almost a full year since <a href="https://www.forbes.com/sites/peterhigh/2017/03/28/former-intel-coo-to-lead-data-center-infrastructure-at-lenovo/#a84faba27136" target="_blank" rel="noopener noreferrer">announcing her last day</a> at Intel, Stevenson has done well in her new role at Lenovo. She is responsible for product management business and building end-to-end teams that align with every step of the customer experience. It is her belief that “every business decision today is shaped by technology because it has the power to transform markets, relationships and processes” that makes her such an influential leader in the field.<br />
Before Lenovo and Intel, Stevenson worked at EDS, now DXC Technology, and IBM in several executive positions. In each role, Stevenson utilized her deep understanding of data center technologies and customer needs to propel her business forward. It is because of this that Stevenson has been awarded numerous honors (as in too many awards to write) including Silicon Valley Business Journal’s Best CIO and Huffington Post’s Most Social CIO. Beyond that, she just wants to play some tennis, go kayaking, and maybe paddle board a bit.</p>
<hr>
<h3><strong>Kathleen Hogan, Ph.D.</strong>, Deputy Assistant Secretary for Energy Efficiency, Office of Energy Efficiency and Renewable Energy, U.S. Department of Energy (<a href="https://twitter.com/ENERGY" target="_blank" rel="noopener noreferrer">@ENERGY</a>)</h3>
<p><img decoding="async" class="aligncenter wp-image-17019 size-full" src="https://www.colocationamerica.com/images/Kathleen-Hogan.jpg" alt="hogan usdoe" width="161" height="201"><br />
It’s no question the biggest drain data centers have on our world is, well, energy use. That is where Hogan comes in. In her role, Hogan oversees more than $600 million, annually, for energy efficiency policy, program, and research. By creating policy and guidelines for energy-efficient practices, Hogan influences the designs and procedures of data centers around the U.S. She even helped create a <a href="https://mashable.com/2014/09/30/doe-energy-efficiency/#YWrE6OieXuqq" target="_blank" rel="noopener noreferrer">“solution network”</a> which aided companies in sharing best practices in hopes of accelerating the spread of efficient technologies.<br />
Throughout her career, Hogan has developed and managed numerous programs to reduce the U.S.’ energy use. Her amazing work has earned her a Presidential Rank Award and induction into the Energy Efficiency Hall of Fame of the U.S. Energy Association. Heck, she is even a contributor to the Nobel Peace Prize awarded to the Intergovernmental Panel on Climate Change. In 2016, Hogan was awarded the Career Achievement Medal by the Partnership for Public Service (known as the “Oscars” of government service). Although she has received a “career” award, we know she will continue to promote energy efficiency.</p>
<hr>
<h3><span style="color: #333333;"><a style="color: #333333; text-decoration: underline;" href="https://www.colocationamerica.com/blog/international-womens-day-2017">&lt;— Top 5 Women in Tech 2017</a></span></h3>
<hr>
<p><em><strong>Editor’s Note:</strong> When trying to identify key players, many aspects were considered. To dwindle down the list I considered the company the women work for, their positions within the company and, of course my own opinion. Because of space and time allotted, corporate lawyers (general counsel), chief financial officers, marketing directors, and human resource directors were not included though their work is vital to the success of the company. The women included above are considered to have influence in the decision making process and the direction in which the company goes. It is important to note that the list was formed by acquiring readily available data via the internet and thus may be missing some key players who do not have their position listed on their company’s website.</em></p>
<p>The post <a href="https://www.colocationamerica.com/blog/top-five-women-data-center-2018">International Women’s Day: Top 5 Women in the Data Center Industry 2018</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.colocationamerica.com/blog/top-five-women-data-center-2018/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>This Week in Getting Hacked: Google Trolls Microsoft Edition</title>
		<link>https://www.colocationamerica.com/blog/twigh-google-trolls-microsoft-edition</link>
					<comments>https://www.colocationamerica.com/blog/twigh-google-trolls-microsoft-edition#respond</comments>
		
		<dc:creator><![CDATA[scott]]></dc:creator>
		<pubDate>Fri, 23 Feb 2018 13:06:39 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<guid isPermaLink="false">https://www.colocationamerica.com/?p=16998</guid>

					<description><![CDATA[<p>Welcome back to ‘This Week in Getting Hacked’—the world’s greatest cybersecurity-related link dump! Each week, we bring you the best news stories from the cybersecurity field, letting you know who’s getting hacked, who’s hacking, what data is leaking, and about<span class="excerpt-hellip"> […]</span></p>
<p>The post <a href="https://www.colocationamerica.com/blog/twigh-google-trolls-microsoft-edition">This Week in Getting Hacked: Google Trolls Microsoft Edition</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Welcome back to ‘This Week in Getting Hacked’—the world’s greatest cybersecurity-related link dump! Each week, we bring you the best news stories from the cybersecurity field, letting you know who’s getting hacked, who’s hacking, what data is leaking, and about what you should take with caution. So strap in, change your password, and let’s find out who’s getting hacked this week!</em><br />
<em>On to the links…</em><br />
<strong>Google, in their quest to make everyone use their Chrome browser, disclosed a Microsoft Edge security flaw before it was patched</strong>. Kind of funny, right? Google spotted the flaw back in November and gave <a href="https://www.theverge.com/platform/amp/2018/2/19/17027138/google-microsoft-edge-security-flaw-disclosure" target="_blank" rel="noopener noreferrer">Microsoft 90 days to fix it before going public</a>.<br />
<img decoding="async" class="aligncenter size-full wp-image-17000" src="https://www.colocationamerica.com/images/edge-vs-chrome.jpg" alt="google vs microsoft" width="600" height="331" /><br />
Microsoft did not meet the deadline, so Google went public.<br />
Funny enough, Microsoft clapped Google last October about a Chrome security flaw and now the two tech-giants are going back and forth like children. Fun to watch. I&#8217;m sure they&#8217;ll take a break soon&#8230;.<br />
<strong>Google disclosed ANOTHER Microsoft security flaw, this time in Windows 10</strong>. Oh, HELL naw. I love that these two companies are keeping each other honest in the security game and the fact that they give each other neat little deadlines before going public is so cute. <a href="https://www.theverge.com/2018/2/21/17036084/google-microsoft-windows-10-security-flaw-disclosure" target="_blank" rel="noopener noreferrer">Here&#8217;s the details on this security flaw</a>.<br />
<img decoding="async" class="aligncenter size-full wp-image-16999" src="https://www.colocationamerica.com/wp-content/uploads/2014/07/Google-fiber.jpeg" alt="google ms clapping" width="600" height="337" /><br />
Play nice, kids.<br />
<strong>Ever wanted to monetize your Spotify playlist? Ask this Bulgarian dude.</strong> In what&#8217;s being called a sorta-scam, well, let&#8217;s just let the <a href="https://www.inverse.com/article/41573-spotify-bulgarian-playlist-list-scam" target="_blank" rel="nofollow noopener noreferrer">article describe what happened</a> because it&#8217;s so ridiculous:</p>
<blockquote><p>The most probably explanation for all this is that someone or someones in Bulgaria set up 1,200 computers with premium Spotify accounts, then had them play the songs on “Soulful Music” constantly. While it would cost $12,000 to set up all those accounts, the payoff would be worth it.<br />
The report estimates it would be possible to squeeze out at least 72 million plays of the songs out of those 1,200 accounts, which would be the equivalent of $288,000 each month. A little finagling of the playlists so each song played for the bare minimum 30 seconds could up that number to north of 100 million, or about $415,000.</p></blockquote>
<p>All of this never broke any of Spotify&#8217;s rules, so&#8230; there&#8217;s your quick-money scheme for the week. This classifies as a hack because of the pure determination in gaming Spotify&#8217;s system.<br />
<em>And finally&#8230;.</em><br />
<strong>People were trying to log into their Chase bank accounts and getting other people&#8217;s accounts. </strong>The problem has been fixed and JP Morgan states no unauthorized transactions took place, but good lord.<br />
<iframe src="https://www.bloomberg.com/api/embed/iframe?id=5b5d81bf-202b-4d50-af1d-45f04975fd42" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe><br />
This is one of the largest banks in the country and this is a huge problem. Good thing it wasn&#8217;t worse.<br />
<em>That&#8217;s it for this week. Stay safe out there!</em></p>
<p>The post <a href="https://www.colocationamerica.com/blog/twigh-google-trolls-microsoft-edition">This Week in Getting Hacked: Google Trolls Microsoft Edition</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.colocationamerica.com/blog/twigh-google-trolls-microsoft-edition/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>This Week in Getting Hacked: Why Skype Should Just Leave Us Alone Already Edition</title>
		<link>https://www.colocationamerica.com/blog/twigh-skype-is-bad-edition</link>
					<comments>https://www.colocationamerica.com/blog/twigh-skype-is-bad-edition#respond</comments>
		
		<dc:creator><![CDATA[scott]]></dc:creator>
		<pubDate>Fri, 16 Feb 2018 13:02:32 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<guid isPermaLink="false">https://www.colocationamerica.com/?p=16978</guid>

					<description><![CDATA[<p>Welcome back to ‘This Week in Getting Hacked’—the world’s greatest cybersecurity-related link dump! Each week, we bring you the best news stories from the cybersecurity field, letting you know who’s getting hacked, who’s hacking, what data is leaking, and about<span class="excerpt-hellip"> […]</span></p>
<p>The post <a href="https://www.colocationamerica.com/blog/twigh-skype-is-bad-edition">This Week in Getting Hacked: Why Skype Should Just Leave Us Alone Already Edition</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Welcome back to ‘This Week in Getting Hacked’—the world’s greatest cybersecurity-related link dump! Each week, we bring you the best news stories from the cybersecurity field, letting you know who’s getting hacked, who’s hacking, what data is leaking, and about what you should take with caution. So strap in, change your password, and let’s find out who’s getting hacked this week!</em><br />
<em>On to the links…</em></p>
<hr />
<p><strong>If you&#8217;re like many people, myself included, forced into using Skype, well, you can get hacked.</strong> The app I complain about the most is in headlines this <a href="http://www.zdnet.com/article/skype-cannot-fix-security-bug-without-a-massive-code-rewrite/" target="_blank" rel="noopener noreferrer">week for a &#8220;nasty&#8221; security bug</a> that allows low-level access to every corner of your operating system.<br />
<iframe src="https://www.youtube.com/embed/qixiBYv5aXs" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe><br />
Skype&#8217;s updater client can allow attackers to infiltrate and access a user&#8217;s operating system. Here&#8217;s the kicker, Microsoft says they won&#8217;t immediately fix the bug because they would basically have to re-write Skype from the ground up (oh, no, because it works so well&#8230;).<br />
So, until they fix it, every time the Skype updater runs to keep your software running at the levels of stink expected from the app, more and more malware gets put on your system. Yay! Hopefully Microsoft can just open up the API <em>just a little bit</em> so other, better, messaging apps can give you your Skype messages.<br />
Until then, I&#8217;ll go back to using an app for business that barely notifies me I have messages.</p>
<hr />
<p><strong>Facebook, always thinking about your security, is imploring you to download a security app that&#8217;s literally just malware. </strong>That&#8217;s right—download Facebook&#8217;s Onavo Protect, a secure wireless networking app, and Facebook will then be able to track EVERYTHING you do on your phone.<br />
<img decoding="async" class="aligncenter size-full wp-image-16979" src="https://www.colocationamerica.com/images/facebook-onavo.jpg" alt="facebook spyware" width="600" height="338" /><br />
Like they don&#8217;t know enough about you already, this is just a fancy (and perhaps misleading) way for the social-media giant to wriggle their way into collecting more data on you.<br />
Just remember, typically when an app is free—YOU&#8217;RE the product, not the consumer. Now, I&#8217;m going to go back under my new Facebook VPN and try to get some work done in peace. Excuse me.</p>
<hr />
<p><strong>In one of the easiest &#8220;hacks&#8221; of all time, an unsecured Amazon server revealed over 119,000 Passports and Photo IDs of FedEx employees.</strong> The publicly accessible Amazon S3 server had IDs from all over the world and as of now there&#8217;s no indication that the information has been used maliciously.<br />
Head of communications for Kromtech Security Center, Bob Diachenko, said on the matter:</p>
<blockquote><p>&#8220;This case highlights just how important it is to audit digital assets when a company acquires another and to ensure that customer data is secured and properly stored before, during, and after the sale,” Kromtech said in a statement. “During the integration or migration phase is usually the best time to identify any security and data privacy risks.&#8221;</p></blockquote>
<p><strong>You know we couldn&#8217;t do one of these without talking about cryptocurrency these days: Hackers are using Government Websites to mine bitcoin.</strong> Thousands of .gov sites have been hacked in a cryptojacking scheme using malware called Coinhive.<br />
<img decoding="async" class="aligncenter size-full wp-image-16980" src="https://www.colocationamerica.com/images/coinhive-government-websites.jpg" alt="coinhive" width="600" height="375" /><br />
Coinhive sits in a website&#8217;s code and infects visitor&#8217;s machines to use for the mining of cryptocurrency.<br />
When are we going to learn?<br />
<em>That&#8217;s all for this week. Change your passwords folks.</em></p>
<p>The post <a href="https://www.colocationamerica.com/blog/twigh-skype-is-bad-edition">This Week in Getting Hacked: Why Skype Should Just Leave Us Alone Already Edition</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.colocationamerica.com/blog/twigh-skype-is-bad-edition/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Object Caching 35/113 objects using Redis
Page Caching using Disk: Enhanced 
Lazy Loading (feed)
Minified using Disk

Served from: colocationamerica.com @ 2026-04-02 23:00:03 by W3 Total Cache
-->