Artificial Intelligence is Flagging Legitimate Email as Spam in Gmail and Office 365

Generally speaking, we can say tech companies go to great lengths to never have to admit when they’ve made mistakes. Such is the case lately with the 2 most popular cloud-based email providers, Google’s Gmail/GSuite and Microsoft’s Office 365. They’re not being transparent about their latest foible, specifically that their latest “improvements” in artificial intelligence…

The FBI Wants You To Report Fraud

Thank the gods there are smart and thoughtful people on the Internet like my pal, mzbat. So big gratitude to her because everything she touches turns to A W E S O M E. Today, she’s been sharing what she’s learning at Combating Cybersecurity Threats 2019. I’m interested. For starters, what bat’s live-tweeting validates what…

Next Up: MacTech

MacTech is a unique conference held in Los Angeles each November, designed for a niche community of world-class professionals working with Apple technology across contexts, disciplines, and cultures.

Why the GDPR is a Good Idea After All

It’s easy to forget the Internet was built to share information across a global network, not keep it private. Sharing has become an essential part of life and that’s not going to change any time soon. Whenever we have something to share, in any format, there are a multitude of ways, tools, and modes to do that. Even stuff there was no intention of ever sharing somehow ends up out there. So, there’s pros and cons to all of this sharing.

Facebook Hack: Steps to Move Forward

Most people have no idea whether they have or haven’t used their Facebook account to log into other sites and services across the Web. Here’s some practical steps to find out and mitigate the risks.

Eliminate preventable risks to protect your business from loss.

Cyber Resilience Strategy is not a nice-to-have. The illusion of Cyber Security is gone. Cyber Security incidents will disrupt and compromise your productivity, reputation, and bottom line. They will incur massive losses. As a business leader, when unplanned events (like cyber attacks) disrupt your business, your employees, partners, and clients count on you to know…

California’s New Privacy Rules

Resilience is about protecting our interests, like privacy, and being prepared to act when unplanned events compromises them. California is leading the way in the US where protecting our privacy is concerned. What states will follow?

PANEL: Social Engineering

I recently had the honor and pleasure of sitting on a panel beside some of the most expert talent in the industry to discuss another polarizing topic: Social Engineering.

The Underrated Power
of Lists.

In meetings, I doodle + draw. It helps me listen + remember things, connect pictures to notions, memories to actions. It helps me quickly process things that are said into actionable tactics + strategies. These often turn into lists. As I get older, I do this more and more, which means I’m starting to get…

Keep this brochure!

No one likes to think about crisis preparedness. That’s why so many people are not prepared when a crisis occurs. Nudging people to be prepared is no small feat. It requires equal parts emotional consideration, comprehensive intention + just enough assertive urgency in order to be successful. It’s a rare thing when it’s even a…

Farmers Fight for Our Right to Hack

It’s fair to say that many of us, especially in the States, don’t know or much care about where our food comes from. That’s unfortunate enough but what even less people may be aware of is how cool farming cultures are. Farmers survive by quickly learning how to do many things when they need to…

10/65 Film Festival

WIMZKL is a proud sponsor of this year’s 10 Second Film Festival on behalf of Evanston’s District 65 Green Teams supporting sustainability awareness + education in our schools + community to help foster the next generation of environmental stewards. Watch some of this year’s favorite entries.

Case Study – Resilience in Chicago

The Resilience Diagnostic defines, prioritizes, and quickly identifies practical, concrete steps to eliminate preventable risks across your organization. We require 40-60 hours to achieve this, depending on the complexity of your operation.