Red Cross blog: A life-long learner, profile of Stan Brasch

What makes any of us become an American Red Cross volunteer? Does it happen because of a change in our life circumstances, or because of a particular crisis or other event?

Stan Brasch recalls the moment it began for him: it was about three years ago when he retired from federal government service. He had returned to St. Louis after many years in Kansas City where he served with the Kansas National Guard and later the U.S. Army Reserves for a total of over 30 years.

“I wanted to help with the disaster recovery efforts,” he said. Brasch had already had extensive training for the U.S. Department of Transportation in delivering their own rapid response to emergencies.

You can read more about Stan on the Red Cross blog here.

Measuring your Covid KPIs

A friend of mine has been noting several of her family’s key performance indicators (KPIs) during the Covid Times. Things like how many minutes her family collectively naps and exercises each day, or the number of days they have cooked dinner together (vs. getting takeout) or total episodes of Tiger King they have watched. At first I thought it was very cute and clever but now I think this idea is worth a closer look. After months under lockdown, we all need some solid data to measure how we are holding up under the strain. And you all know how much of a data nerd I am.

This week the NY Times published its own instructive “pandemic rules”. The piece included accounting for the number of close contacts, managing your exposure “budget” and keeping higher-risk activities as short as possible. All are worthy goals.

Here are a few more of the ones that I have discovered from my wife and I being under lockdown.

  1. Number of bottles of wines remaining before resupply. Early on in the Covid period, we didn’t venture out for anything. I wanted to order at my favorite wine shop and pickup at the curb. Their website was terrible and it took forever to find things that would have taken me about 15 minutes if I was shopping at the physical store. Thankfully we aren’t big drinkers but we will eventually have to restock.
  2. Rolls of toilet paper remaining on hand. No more needs to be said of this.
  3. Instacart fulfillment wait times. When we began in March, we already were big users of Instacart for grocery delivery. Orders which were usually filled within hours of completing the carts suddenly took days or even a week as newbies jumped on board this system. Thankfully they have gotten things back under control and now are back to a few hours to fill.
  4. Teenage eye rolls per day. Thankfully we are empty nesters, otherwise the first metric might have to be adjusted. But hearing from parents of teens who are sheltered together more has been interesting. Some teens are finding out what mom and dad actually “do” during the work day instructive, and perhaps are more sympathetic when sharing the communal “office.”
  5. Number of Zoom minutes consumed by non-work activities. As Zoom has become the de facto connective and social tissue of our lives, its use varies depending on our social needs.
  6. Steps. We have always tracked our daily step count, but finding places to walk where you aren’t dodging folks can be tricky.
  7. Proportion of non-masked people encountered. Across our region this varies by place, time of day and other factors. Hard to have any hard and fast rules here. But we both are using them as much as possible when we are out.

If you have suggestions on other metrics to determine progress, do share in the comments.

FIR B2B podcast episode #138: Keeping it real

COVID has given new meaning to the value of authenticity. Paul Gillin and I riff on a few examples:

Marketing Week speaks to Salesforce.com’s CMO and what B2B can learn from B2C marketing. One thing is to keep it personal by forgetting about stock photos and telling personal stories. This helps to build trust and deliver better customer relationships. Of course, it helps to have a charismatic and opinionated CEO like Marc Benioff around to inspire the team.

Sprout Social’s Alicia Johnston writes about how to inspire action with your LinkedIn presence. Rather than making your vendor page a promotional smarmy read, take the time to be more aspirational and educational. This can help provide insights and make connections with your community. The piece also discusses ways to experiment to find your best corporate voice and how to time your posts for maximum impact.

Social media influencers are raking in the big bucks, and we think it’s because they build, rather than buy their audiences. But marketers and influencers alike need to keep in mind that paid relationships need to be disclosed, and penalties for failing to do so will grow along with paychecks. But we like this more toward promotion through authentic channels.

Our IT journalist colleague Sally Grotta writes that personal interruptions that once would have been inappropriate are now not just accepted as part of the online conference experience. The interruptions by kids, animals and delivery people make our interactions less formal and more real. Musicians have led the way, with many famous performers inviting us into their living rooms for concerts that seem so much more intimate than when given in a performance hall.

You can listen to our podcast here.

The evolution of the network protocol sniffer

Last month I caught this news item about Microsoft building in a new command-line feature that is commonly called a network protocol sniffer. It is now freely available in Windows 10 and the post documents how to use it. Let’s talk about the evolution of the sniffer and how we come to this present-day development.

If we turn back the clock to the middle 1980s, there was a company called Network General that made the first Sniffer Network Analyzer. The company was founded by Len Shustek and Harry Saal. It went through a series of corporate acquisitions, spin outs and now its IP is owned by NetScout Systems.

The Sniffer was the first machine you could put on a network and trace what packets were being transmitted. It was a custom-built luggable PC that was typical of the “portable” PCs of that era — it weighed about 30 pounds and had a tiny screen by today’s standards. It cost more than $10,000 to purchase, but then you needed to be trained how to use it. You would connect the Sniffer to your network, record the traffic into its hard drives, and then spend hours figuring out what was going on across your network. (Here is a typical information-dense display.) Decoding all the protocols and tracking down the individual endpoints and what they were doing was part art, part science, and a great deal of learning about the various different layers of the network and understanding how applications worked. Many times Sniffer analysts would find bugs in these applications, or in implementations of particular protocols, or fix thorny network configuration issues.

My first brush with the Sniffer was in 1988 when I was an editor at PC Week (now eWeek). Barry Gerber and I were working on one of the first “network topology shootouts” where we pit a network of PCs running on three different wiring schemes against each other. In addition to Ethernet there was also Token Ring (an IBM standard) and Arcnet. We took over one of the networked classrooms at UCLA during spring break and hooked everything up to a Novell network file server that ran the tests. We needed a Sniffer because we had to ensure that we were doing the tests properly and make sure it was a fair contest.

Ethernet ended up wining the shootout, but we did find implementation bugs in the Novell Token Ring drivers. Eventually Ethernet became ubiquitous and today you use it every time you bring up a Wifi connection on your laptop or phone.

Since the early Sniffer days, protocol analysis has moved into the open source realm and WireShark is now the standard application software tool used. It doesn’t require a great deal of training, although you still need to know your seven layer network protocol model. I have used Sniffers on several occasions doing product reviews, and one time helped to debug a particularly thorny network problem for an office of the American Red Cross. We tracked the problem to a faulty network card in one user’s PC which was just flaky enough to operate correctly most of the time.

Today, sniffers can be found in a number of hacking tools, as this article in ComputerWorld documents. And now inside of WIndows 10 itself. How about that?

I asked Saal what he thought about the Microsoft Windows sniffer feature. “It is now almost 35 years since its creation. Seeing that some similar functionality is now hard wired into the guts of Windows 10 is amusing. Microsoft makes a first class Windows GUI tool, NetMon, available for free and of course there is WireShark. Why Microsoft would invest design, programming and test resources into creating a text-based command line tool is beyond me. What unfilled need does it satisfy? Regardless, more is better, so I say good luck to Redmond and the future of Windows.”

Avast blog: Why is eBay port scanning my PC?

Every week brings more security news and this week is  about an interesting piece of Javascript that can run in your browser if you happen to use eBay under a particular set of circumstances. The code can scan your computer and send information back to a security vendor, which could be used to track your movements across the Internet.

You can read my column for the Avast blog where I explain what is port scanning, what information is being collected, why an eBay contractor is doing it — supposedly to reduce fraud — and how security researchers figured out what was going on.

A brief history of lightbulb manufacturing

Given that we are all at home, I was thinking the other day of some of my favorite museums that I have visited during better times. As long-time readers might remember, I am a big fan of the Henry Ford Museum outside of Detroit. I was reminded of all the treasures in their collection when the news broke this week that GE was finally selling off its light bulb division to  Savant, a smart home company. GE had this division for more than a century, and it had been losing money on it for several years.

The light bulb is an iconic product for the company that was founded by Thomas Edison. But the real innovation happened not when Edison came up with the initial invention, but about improvements to how they were made. Back in the 1880s, glassblowers were able to create a bulb every 30 seconds if they got good at doing them. Moving forward thirty years, engineers had developed machines that could produce perhaps ten or twenty bulbs a minute. But that wasn’t fast enough, particularly as electrification was growing quickly.

It took a master glassblower working with a mechanical engineer from Corning to come up with a truly novel idea. A heated ribbon of glass went through a machine that could stamp out hundreds of bulbs per minute. The resulting equipment literally replaced entire factories, and this is what is on display at the Ford Museum. (Parts of Edison’s Menlo Park lab are also on display there too.) Of course, this machine also put legions of glassblowers out of work.

A GE engineer would go on to invent the LED bulb in the 1960s, which was the eventual undoing of incandescent bulbs. Actually, there were LEDs before this time, but they only output infrared light. This invention figured out how to output visible light, and sixty years later we have LED bulbs that can output thousands of colors controlled from our smartphones, from Phillips and Savant, the company that acquired the GE lighting assets.

Check out some of these innovative LED designs that I came across online. And if you ever get the opportunity to visit the museum, you will find it a delight and well worth your time.

Avast blog: The latest security trends from Verizon’s annual breach report

Today Verizon published the latest 2020 Data Breach Investigations Report (DBIR). What sets the DBIR apart is that it combines breach data from multiple sources using the common industry collection, VERIS, a third-party repository where threat data is uploaded and made anonymous. This gives the report a solid authoritative voice, which is one reason why it’s frequently quoted by the security community. Report citations also come from vendor telemetry sources, so it is also a bit self-referential.

I look at overall SMB and ransomware trends, along with the declining popularity of malware in favor of more web app exploits. You can read more about these trends in my blog for Avast.

RSA blog: Do you know where your firewalls are located?

When I was growing up, the evening news (on one of the five total broadcast channels we could watch) would start with the tag line, “It’s ten o’clock, do you know where you children are?” I know, seems so quaint now, especially since many of us haven’t left home in weeks. But the modern equivalent might be, “It’s whatever o’clock. Do you know where your firewalls are?” This is not a rhetorical question and answering it will give you some insight into how your network infrastructure is governed (or not, as the case might be), and what actionable items you’ll need to fix that pronto.

I wrote in last month’s blog as more of us work from home (WFH) we have to go back to basics. One of those basics is in understanding our network topology and where those firewalls are located. A recent informal Twitter survey by researcher Kate Brew showed that less than half of infosec managers don’t even know the basics of their network configurations. They couldn’t even figure out the raw number of firewalls in their network. That is a depressing thought. Now, granted this isn’t a Gallup-level definitive answer, but still probably undercounts the observed on-the-ground truth.

Why is this a big deal? Mainly because our networks are evolving rapidly. Take the situation of new data flows as we have higher proportions of remote users. Or the situation where smartphones are being brought into healthcare facilities and used in different ways by health workers to communicate with patient families. Given that many infosec managers are juggling numerous crises to keep their business networks running, this very basic fact needs quick attention.

It is important now because the bad guys are already sharpened their phishing lures: numerous vendors (and the FBI) report that Covid-related phishing attacks are on the rise. You have to up your game, before someone finds a wormhole and makes off with your most precious data.

But let’s just take this a step further. It isn’t just the number or location of our firewalls, but also what happens to them. Let’s posit that you have put in place a series of “emergency” exceptions to your well-crafted rule set. (Ahem, do you really want to go there?) You did this as a response to fix your network traffic flows to handle the rise in WFH’ers. Great. But let’s move into the future a few years when these exceptions have remained in place, long forgotten and leaving not just a wormhole but the broad side of a barn for your drive-by attack.

This points out that now is the time to get our risk and data governance act together. If we are going to be a 95% WFH operation, then make sure we plan our networks and our security accordingly. In other words, we need to figure out a network topology that will be more secure and have the right tools and hardware, as I mentioned in last month’s blog.

If you view this in another light, the uncertainty over your firewalls is really a proxy for the conflict between the network and security teams at your company. This is an old issue (see this Sandra Gittlen piece in Network World from several years ago) and I am not suggesting that you should combine them into a single unit. Gittlen cites sources who point out that the two teams can collaborate better when they are separated, because they have different roles and jobs to do. Security should track down issues, vulnerabilities and risks; the network folks should fix things and prevent future problems. And both need to work on security from the beginning of any new project, what is commonly called “security by design.” Still, another source says, “There is value in security teams learning networking’s language.”

Take the time to know where your firewalls are located and use this as a teachable moment to better understand how you have set up their rulesets and other basic configuration details.

CIO.com webinar: Managing third-party risk in uncertain times

The world of risk management is undergoing some important changes. Security has become everyone’s concern and is not just the province of the IT department any longer. As our businesses become more dependent upon digital technologies, they become bigger targets for attackers to invade our networks and our endpoints. Understanding where our weakest links are located and how to remove them will become essential to ensure the future health and cybersecurity of our enterprises.

The world of risk management is undergoing big changes, some due to uncertain times with the COVID-19 pandemic. In this webinar done on behalf of Security Scorecard for CIO.com, I explore some of these best practices to assess these risks.

Family tech support questionnaire

As we become more reliant on technology to support our sheltering-in-place, we realize that many older folks are not quite digital natives and don’t feel comfortable with the now-common computing tasks that many of us have jumped on to handle our lives. And that means that more and more of us have become forced into the de-facto family tech support role. As someone in my generation (60-something) who has been a tech family support nerd for more than half of my life, I wonder how many of you are experiencing this situation?

Supporting our non-tech savvy relatives has gotten harder because now so many of us depend on tech to get through the day. The stakes are higher, and the lack of digital literacy can have much higher consequences these days. So to help you out, let’s start by taking stock of the dimensions of digital literacy that you might encounter.

Herewith is a simple questionnaire to give you some idea of how this will all play out in the time of the lockdown.

  1. Can your family members receive and read an email attachment? This is a basic requirement for many online activities, such as reading recipes and receipts from online orders, obtaining documents and other items. While you may be adept at email, your older generation might have difficulty.
  2. How often does your family member check their email? Many of our family members haven’t developed a regular email habit. This could be generational: older folks never learned touch typing and young ‘uns prefer texting. Without regular email scans, these folks can miss important notifications generated by their other online activities too.
  3. Do you and your spouse share a common email or Facebook account? Many elderly folks like to share accounts, but then who does what and when? If they don’t have a regular email habit, this makes the medium much less effective.
  4. Email isn’t the only connecting tech we all use these days. Does your family member use any common messaging app such as texting, Slack, Facebook Messenger, or WhatsApp? This can be a great way to stay in touch with multiple generations if you can agree on a single family platform. I have seen families that can’t find common ground, which makes communication difficult.
  5. Does your family member own a smartphone and can they install a new app on it? Many elderly have older-model “dumb” phones that date from the last century and don’t do anything other than make and receive phone calls. That can limit their effectiveness. If your elderly member has a more modern phone but still  can’t install or configure apps, you’ll have to assign someone for that support role who is located nearby.
  6. Have your family members used Uber or equivalent ride-sharing services? One of the first uses for a smartphone is with mobility: having a ride-sharing service is especially important for those that can’t drive or who don’t have cars. I know plenty of elderly who love their Ubers just as much as millennials. But usually someone has to show them the ropes.
  7. Have your family members done any restaurant curbside pickup or meal delivery? Many restaurants are asking customers to order online or via their smartphone apps. Being able to do this in these lockdown times is a way to help bring a little variety into someone’s life, as long as the family health protocols allow for meal deliveries.
  8. Have you ever read any Twitter posts? Uploaded any Snapchats and Pinterest photos? Often the grandchildren pix are the first mission-critical app for my generation and the learning curve to figure out these social network services can be frustrating.
  9. As we stay at home more, the center of entertainment is the TV, and today’s TVs are really computers in disguise. Does your family member watch any streaming service on their TV, such as Netflix, Hulu, YouTube TV, etc.?  Do they know how to set it up? If not, you will have to support that activity. My own smart TV sometimes loses its network connection, and a hard power cycle is the easiest way to fix that. Something is wrong with that.
  10. Let’s talk about paying for various things online. For many elders, cash is still king. I recall how my dad would never leave the house without hundreds of dollars in his pocket. But these days, cash is often not accepted for fear of viral contact. So seeking non-cash methods is important. One of the first things one of my family members did was get help to set up her online bill paying. She liked it and was happy to be rid of the chores of finding stamps and printed checks. Your family members may not be interested in this process, or they may want to dive in further and use contactless payment cards and online payment processors such as PayPal and Venmo to make it easier to move their funds around and send birthday gifts to the grandkids.
  11. The next step is buying all sorts of things online, including groceries and medicines. You might have a lot of support work needed to help your family member figure out where to do their shopping and how to navigate the piss-poor user interfaces of Instacart and others that are barely functioning right now.
  12. The elderly are big library patrons and these days libraries have moved to their digital efforts. Can your family members check out an ebook from their local library, or purchase an ebook for their Kindle? Many elderly would still prefer printed books and newspapers, but can they order them online from their local booksellers?
  13. One of the more popular apps to virtually meet is Zoom, and it is certainly a lot easier to join in a Zoom than some of its competitors. But how about if grandma wants to run her own book club virtually on Zoom? She might need some help getting it all setup.

As you can see, there is a lot of technology to master and manage. Being the family IT support person has gotten a lot more complicated. And as we depend on tech to get us through these times, it can be frustrating for all of us to solve the issues. Just take a step back, see how much tech we have acquired over the years, and take a deep breath.