JS Business Solutions Blog
Data Privacy is a huge topic these days. We often talk about data security when it comes to protecting your organization’s information, but we often don’t go into a lot of depth when it comes to protecting an individual’s information. It’s important to understand how personal information moves around, so you know what you are up against when it comes to protecting your privacy online. This post is going to be a bit of a deep rabbit hole, but I really want to shine some light on the subject for my readers.
In the dog days of summer, the news media started running a story about how Google’s location tracking services continue to track people even after they order their mobile device’s OS to quit it. A researcher from Princeton proved these claims by traveling through New York and into New Jersey after turning location services off on for hi Android smartphones, only to be tracked through all the Interstate travel. We’ll take an in-depth look at why Google seemingly knows exactly where you are if you want them to or not.
Not too long ago, as of this writing, Microsoft began including Skype in their PCs. As a result, they created accounts for Skype based on a user’s Microsoft account…. Surprise! Now, you may not be comfortable with the prospect of people being able to find you via Skype, which is why we’re offering some tips to hide yourself from others.
As we come up on tax time, we’re reminded just how important the professional services are. There is very little that businesses do without consultation. After all, consultants are just professionals in a field giving you advice on how to navigate forward. Lawyers, financial consultants, accountants, and advertising and marketing specialists are just a few of the crucial people that provide the average business with outside expertise.
One of the most dangerous and upcoming threats out there is cryptojacking. This process involves a malicious entity installing cryptomining malware on a user’s device without their knowledge or consent, allowing for a steady, reliable stream of income. What are the details behind cryptomining, and how can you keep your devices from becoming complicit in the schemes of hackers? Let’s find out.